last executing test programs: 3m9.260905109s ago: executing program 32 (id=5185): r0 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x100001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000500166198c20e00001811000000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000000000000000000f980000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001100)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000010c0)=ANY=[@ANYRESHEX=r2, @ANYRES32=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x90) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000001000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000001040), 0x12) mkdirat$cgroup(r4, &(0x7f0000000080)='syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x3f) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001080)={0xffffffffffffffff}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) sendmsg$unix(r7, &(0x7f0000000640)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e21}, 0x6e, 0x0}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x966}, 0x0, 0xffffffffffffefff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x12144, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_config_ext={0x4d, 0x6}, 0x0, 0x0, 0x4, 0x8, 0x7a6b, 0xc6, 0x3}, 0xffffffffffffffff, 0x20000000000001, 0xffffffffffffffff, 0xe) 2m37.967285273s ago: executing program 1 (id=5574): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4020940d, &(0x7f00000005c0)=0x80000000000004) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) close(r5) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 2m37.855596808s ago: executing program 0 (id=5577): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x22090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc099ad758a27c85f}, 0xa000, 0xc8, 0x0, 0x5, 0x8000000000000, 0x0, 0x0, 0x0, 0x95ad, 0x0, 0x384}, 0x0, 0x101, 0xffffffffffffffff, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x18) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fefd000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1400000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="004000000200"], 0x50) 2m37.854438008s ago: executing program 5 (id=5578): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8923, &(0x7f00000000c0)={'bond_slave_1\x00', @random="0134014030d9"}) perf_event_open(&(0x7f0000000680)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa15}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYRES16=r3, @ANYRES16=r2], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) 2m37.723551124s ago: executing program 3 (id=5581): openat$ppp(0xffffffffffffff9c, 0x0, 0x100, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x4}, @func={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000700"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000240), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x6b}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000340)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7f6b32e5, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="0b00000005000000020000000200000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000160000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="34cbf9c55466da0eadc249236ab3cbf316717306be4c08c8c7da1f1ee04ab4b4eac14995ebdf620ff778a4e3452587e42a3c6aa1bd35dfd99f23b525893bc3b5f9f3bed1986bf8d0dddd7c5cdada611f9bf641e421ed71a842d84fa289a542f941d6e06b2b14e2a706ce30acf7d82f224f3e30cadd9d15f3dddbb29dbeb9f68fb68bedb91e0b1ef48832778fe36699c7ebf101659a8f476c4a065eac71d6d1e7fafc6f25ec2c9a8f431fe347a2d30e912c5b2397613ce784637ec71e37566eb0548b461f71028459c6f137c18737d58b56949d022bf1eaf486692bb76836a233c7879d740ad0beaf5159d3380442824f536a41bb22d08fe53952b9c6fed2605d53311c71b455655f96ea6a87e41e9211e90170b0a2b1a2098175ebcd33d517085d224122264cddadd82a3d11bc4a33ce66108b22b1abc6243d306d8f6b8a2ddb5373c190d8f859a3174a200936b079f85edcac7fc03fb993ec0ff8b83f1fd3f1b888d192d99c7ede5d381784d25410cccf1b0bf26a54f065e1e3ec59cc5704fb658fc980a0ac4287ef884ee82007554be3f1e163c81468d0c26c95e3e12393776e32800bb4f086f19080c4fca3d72e8569a5627ce98f2ae0bdb3ec42c23847d47e10b1c58da7e9cea990da842d96e3a51ed7d892f7b28a10486424a69a9109ebd4d7d5a3768400ac000a6d7556ca192e5cd45efb82001ac7b53e03036b6019a07ffb545cd3853e077f08a015f6232488c1139a9409c95ed005261e36b307406ba5714ef395129345866109341feb6c7c458ce08c147a983b46375ddb3621cee0312ba1a434bcd6081e1a8ae8b6d518988b9965faf9aff86df8173b93342cceaec357a100e59b4d66553633626b0b12e9622b8f8fdfe26545b87c57f8ce8609fb8e19b0f6d1cd64e8de85c7327f543b2f38cf3086b57f85e1aaa4add723e4bc4e3ea2c27acec1e545ae3fc870bd42422f6eaf17a1f82699c9cadf224ea1e5d1705b49118d91cc3731aeed60e41bf15a9613aeda8e63a29bc7a95b2d993d23269a310b91f69d16a71243c0f4080d3359f5ddd63c7032bef14ab25eb7df4b28b2132bcbf94a281c8f5de79885a6d679f145fca292b599bb09a1864726d86b65d4781408320b968e2224c23ce7a56d8892970043737ae47f071aaeb219716bc21e3304e301eb5cd32aea951a70621eb870214a72e6c474c3a20f5bd8e089ba16326cc9a80a1a4f5f0e8f58629e20b1c73eb8af330744b187a5cfdb410466378313700ca44eb6dcbc8f3d70f58e134202546f0b1a3b61a298f2a1184b1533bdad308fa2f960087e0f239d2ccbaee3889ddc1a2bea2183b98854d255a6f708909134fab83f42f13e7604f602e264f4a3b2b2a08c673c7ce2813218159b472d3b20ecbf26dd2f7b3ba5298a4ff7444ea0936e098c126f590b05e7697ed8a3d52ba1abc7285de2f160b9b081cb775a5ab77aad1bb98d47e3da53fc4c11d4db47de1e4e6f56ad671f5d8389b33260cc546e4f0bf34fec9b2abd209e6b89e6e381367774676ed6e6eaffe42b07241c276f3c84f17a0762de83eb769bdf28991ddbc23758f01c9ecfba4ab2ca2118fcedd7adde9ff47f643c13e3ad2f13b576985128f233e329fe269d5745cd2b30e5762452a4ff58fdec30623175f8d575ced1c43411e2869aadbe6f1e79a010bca334cb08d545bc2808f359b7777d1bb5675ee210574b9f72cdeb071e07eeaa0988086213a37a972647cf21d3a3bcbd7359da327bacad41b93c5e0e494669109dddcec781774f248f5663e4fac187d42ffccf68335de2adac4f8d3e1bf04b95a9464960186ed019773ffeda18f9827a61edc5fc4088eb0965cb1bd8af1185aa3972b8f73839b4611e303bcbc1f84a330f60fa0a7795ea3cffe0e338406533e12c7deef0b5906c513eab4619a8f02fdd65dcfb7297ef971c4601ad079f7ad38278ae3ff455b37d5492af546975535450693fd4593c8157b3fdb16fd3a106d2f1509d1c06dabb8933269d790a1c5e5f7bdd4a57e1e670d7043cfed88c365b5f8eefe530ef7da5322df981723332c088fce89c2ceee23b420f64332243b9c606d67d538810a94e0ffbd37a119d8fc4d6caec0def40e62613873c74feabde63e12cb2016c1d35cf1bb95bf59e01a63be8825cb3118b74b106f21eef5ee2f41e5fb39fdde058050f780d98ced247c66fc3a03ba04edaf14d698859ba303d511cf0845dc5e269aef2287770a247fd5ae1299b45819ff41725f9da3e4dab7770eb83992b53ae9a9de69e764f6e3aee3e27cfb1bacf531a91605894ae209da6d25872fb54bf36b2ed450b51aa8ee4875b9bc7e55753f61e12a323d301faceb2ecff0686b1359343a94774a6a098dc2df440725cd8331f527d4e22f8090d8879ef4765849705b99465d7ebdf661b81c303d13b87270dc1f227d5954fcbc93bbce6fde2a1f8d573d9cd8130c173a14706f1e9dabc4d16a5b003dd3239faf91769e25cf007b0623141e4e57f11746cd62f20d73956fa84c6a12e1756b6671a64bd7a474ba425907e1a61ba6d2ffa1149165a713a141bfec0f1af51afebdb84d5f14eb51acc284403627d6ce48fd028dc04e00ed963de37f85d155c33e2b4ceb09044c4f1c7791348216b674a8831a232a638f8bfb396fabbe1f880944bc5dcac55df8abc78f804306c88617acfd4adfbb5a055d3d3e91abb763ad84e701cc5679498e04600570f4b2e57c70542043dc590ab363215e6ab3f0bd89383748783d01c9227229edac723d4e2eaa061a44f2630691f25ca6093775183fdf432e01322203dd654b336670116a6a52a27ff2032b1103a4e4be0cc2fb05b24352d72e374e90cc3db2a5a691c7f6b8d1058d7730433c742d8ce52074318b1bce9bb104cf90c8b7f65293c2b74434661444f38d94d977e03433440517f6155a3cad2621c5502dd6148b867a40e6a40be4c8265ec2164b5257f06da1784e98991f42003ced4ba67c23b8c654b542d2d31168fd853cf56cc2c464d7a8a9fbcd2715968788f8527c597ab5f917753c1f1708d2c19972373c5a22af71847de22b9f1e9d38a04ea4dd291da3099cb836a696350bf1263c3c275c27b8b82f604625451a24490b0b5367c2fd05e699546ddf17709d2e2c2710f4361d9dd6e2de2b4353b7f4f8141f6f989dc1a798a974565978e4f9ec0c59a7dbc04bcab072c8513b9ca782c22cdd31fb116c10081740fd8f7d0cbd5c54f1069297f20b45d79bb9ace8e851a655fedf47b2dc76fd30b9ba9f09c9b50d6910ffcdec7078c36fe1e9b19dbb110197496349560a43c0ab42b4ce286643e73a92246ecb71e95ce0d54114772f8477c7d5604c1a52d2f680c5868cf08a2688dd9fef492a01836112cec824483e77da93d104a9e18d06bddf9a4007740a0537ac1a5e09900acc65d52680212a15b68b0ef887228e06f533c1ca95b8f9d81b9fc6608cb5bacf4b867922999c69d46048ec3f408866789f49fcb176fc99ed9d3e6c357ed2e3ce2665925773e5d86c2ceaf8f18519a00d9d2e19e9a6b16af0a53fd7df6974f5db00494460e7f3de6ff6b642859335e020513bb525adddabf0d7d6ae85e7e56e32ca8acc07fe86b7b445358966ba3914c1dfa7b814d9e846ff02a6a8c8f5713a0f727024b5d1ea7e4ce7c64f9b24dd3337a3df33714c5404403b0304b25a66fe3ac85083965877117b3d721e7922f0ac7e278feeb8dc09f58cbcfbb81b11d4699737f37ac240a24b9c4b2b587e68974f7ca5561856f32e389d32056f7d58e4de24c11bd5c5afaa441120370d0c48341e1b8146a6bbca8c15f23c155d2533e97a8e6496bc00533ec83be8488d020708d97385a03bcbf57cadc2c1e575e1ac134cdb5047f3f88eae0230751626cea1c85da9b74ddace668afebb2dc66d302ddf3c5f8f21ac0c0535d00839457e7cac9282a8e49d018b077e38ea512cf28eacff5d98e880abfb5af2e7c039d2e1f1edaad2642963ef29d715f754e2715caa6af046a298b285e3582d903be726b608619332e1a82be48b0f5adf6838f41ff776e5290de8269794bce8fb971267d036bd6bd30e42df918125d573ced78263251bcae2b7b40f1ba855b4f2472312ea8752c4a0e09468bd25615a6c00a9b44c484c5507b8400537f20890e9499ec94ed2b6aeff21e57c6e8a93d80097f85ac9316b03a5f768721bf7d041bb9a6a03eabd615e3c4d74f56c429d53b8fec4b5e86c5b311a6cd4a86f03e04dab25ad65b68a8b8d9053993fd2440ff2b81768213084c831d31a0f8c646aff9090b5463cbee452abd6318340ec41b50f1deba7ffb60b326751de3f6dbf9b17714299233d5c43071367ece2e53212e7f4e084fea60850d4d16908d9bbbb531fbf72143fdb62d1b40afde3d0b2ac2c94c32e456bbef62f8d677e332aec8ccc8eedbac61e7b89b32d57157a39ad5c456258d9c36db0edc82c2baead990ee78007ed89c8f450e92d5e209cc25f7c13f5909ca404fddbdbeff89cc42350c91e9f1fdf9753c6e95f71257f8cbb97838684461cd1244c938b9939a4e9c7727902b6f1a5434e0a06d3fc221771dd87572ae801c5ce6886122f0c91dae57440ffc7ace4e8e0041a1d245103aaadbfc2ecff622228daed2b0cd30f7f59b2617f6f0571ee4403d84e652d78b8e64d5450b6483ef70582dcda9351f2dddd3a4ac84f514f708d3af6242501bd041beae78e6b29b517b534148ea91ef85653fec824d6ddb0c0fa2555ab2564ba29227b1046b48a11ee0e6aafda9d0b80b0f05a8d057cbeb16264cb579aea3ba2b2000052d03c77844ab7c", 0xd4d}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2m37.541655102s ago: executing program 5 (id=5582): socketpair(0x2c, 0xa, 0x77, &(0x7f0000000040)) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001080), 0x800, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000070000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r5}, 0x18) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 2m37.500039613s ago: executing program 1 (id=5583): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r0}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000bfd50000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00083300db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2m37.3617644s ago: executing program 4 (id=5584): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) ioctl$TUNSETNOCSUM(r3, 0xc0189436, 0x8000001ffffffd) 2m37.34490242s ago: executing program 1 (id=5585): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000a00)=""/249, 0xf9}], 0x1}, 0x0) close(r2) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0xfff5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='rxrpc_rx_done\x00', 0xffffffffffffffff, 0x0, 0xffff}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000084000000000100000100000000", @ANYRES32, @ANYRESHEX=0x0], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) 2m37.314367082s ago: executing program 0 (id=5586): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="9293ca7e39af4e0f315319824100"/41], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="9293ca7e39af4e0f315319824100"/41], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) (async) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (async) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) 2m37.313445352s ago: executing program 3 (id=5587): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x4e}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0xf) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000009d000085000000860000008500000050000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r5, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)=r6}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r6, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf6, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x80, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000880), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000a80)={0x8, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xa, 0x22, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4b610ba4, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@call={0x85, 0x0, 0x0, 0x77}, @exit, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x8, 0x7, 0xb, 0x80, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000400)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x5, '\x00', r9, @fallback=0x2d, r10, 0x8, &(0x7f00000008c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0xd, 0xc000000, 0x2}, 0x10, r11, r6, 0x1, &(0x7f0000000ac0)=[r5], &(0x7f0000000b00)=[{0x5, 0x4, 0x4, 0xa}], 0x10, 0x4}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m37.312422412s ago: executing program 4 (id=5588): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r3, 0x0, &(0x7f0000001780)=""/4096, 0x200000000000000}, 0x20) 2m37.242327595s ago: executing program 4 (id=5589): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0xfdef) 2m37.197403447s ago: executing program 0 (id=5590): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 2m37.13058005s ago: executing program 1 (id=5591): bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='net_dev_xmit\x00', r0}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000001e40)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r3}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg(r6, &(0x7f0000001540)={&(0x7f00000005c0)=@in6={0xa, 0x4e23, 0x8, @empty, 0x9}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000001080)="4b0c83e7e1d4fc73e32c51c582992681915c0afb7d493414f1d307238c2f69bcf2f5aa199d0b5ecf64daec90775a66419d6b27632e642fb7abe3aa95b77c9f4ed1acd223a88d09d5f431c3ba2f4dd941ce9dfbfe3245d6ce", 0x58}, {&(0x7f0000001100)="2e067c60410fe0862049a613dc2f1eabad89196fecd15f6fc547c8e1550a0dba883d5cc6cf6aa70d612ef0274c96b33c153fe9b945eb11af7fd6d38387e62b18370bc48b1b04ca197826bb2ec9fe5a58d967bc130ea8bcb06696493d23f9e9e20e2a5f1dc279854407fca8843faf20e04796612187884ee3affcbfc9e18e67558ba7800ed2e4d519f802742c0b0d766273598f9a3213c60958ff3b356bbc2080ddc671590fcff5dfe7a8af4df2d475d98aaabeaea2fb771fda0db75dff4f1e199340a98eae2877a044ec774c102c", 0xce}, {&(0x7f0000001200)="5cb4efced34619c1049f3bd63fb20a77a9f6ea71dcb836cbc88cca57432fcd998906ff7ed6ee5c6e2195db7b1b2b5c0f1cc328f6418ef7265180dde27dade4abbede0df77477b86fd9e9301cc988c6a4df47c9142ec50a82d9b86bafb63b8639fe9239d90a32767ee1", 0x69}, {&(0x7f0000000400)="88dc09bdea960661b1ba0b5da7f149f48d9bb02e57dfaf653b5a017111d84fe64b7743", 0x23}, {&(0x7f0000001280)="a2619eadf7d2ef40765b4f14440d6b2084c8f0b8eb0a041acbe5aa09d6a3fbca71863b8062aa34d8abf4bbb0409914c8ddb4527f82a7fcfba8ea5c964fd853e6f6854c87c83ba9c39fd3bdaa19dd7234852a92888207eff24228e580dd8fcf231e142f7b365bc01abc5c185998d207b4e4e5c017abb620c1a40d0da0e40a6b578f241d5247b2c2bf41016fc5c203eb32b1843690fa", 0x95}, {&(0x7f0000002a00)="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", 0x1000}, {&(0x7f0000001340)="3d31740bd0e02228b25ea901f9182e0e9af3a9d2c027ebe7a0637d1feccf3437976d9e6fc6878ff116fb3962111591ad5961dd6750ef99645d07b3f18737b831500897756d9def0b9040acf69864808812502f28ce844f0b76a4f8b01d2429cd32a3ad52ba6712a55e05aad2f9a2c9926a6103006e0ebe578f4af713e4b7d21691e992ea65bd807795c900927653ce32b6710a2b0c655131c9d24687a427774bf9f2af2c24b91d4d233f7b8a6846d1acf74a7a6bde7805ae6e3663ab395f0e4aa63d8b116e43e5689f06b4d9bf6dff133b82ebe8e626915190bb83608c55fc77", 0xe0}, {&(0x7f0000001440)="9c6a3ebcfca15d226149003c27dacc2ea48d152a05d7137614ae7d3bfb4c267560b253f04a01f367a08e82ca9a84f02884499e4d4151f3aaf5146a30918bb3e4e1f4cf58b9ff91df", 0x48}], 0x8, &(0x7f0000003a00)=[{0x1010, 0x118, 0x7, "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"}, {0xf8, 0x0, 0x1ff, "34795548dae39a10955ea455f43e12d1d370b6ea498af4063cbcf91c9b39946fc9766b5543ac4efcf28a69844dff2684d856f0fa4a193fc90197fa2d012d00c4065255893007973e38dadd4b087bf9828e7cece893c30177de1814b7053befa213e333409bfaabbe3a1234180350c97bbd040ca8332d9ae9c7e72153297fb06a0ab40cffc77cc168fead4eefcf77909826f579fb007e69f84ed3a453c52156d5ccaa6d75dfb3df78dce4d4fc45b8215a4934a13ae435dd32fe51bd6e64cc1b7e54404b9435db28ce2cdc1251928c8332cc770e24d16d72cd2484821b21d317fb6f68661d"}, {0x80, 0x0, 0x0, "c08502a15b6b706c53a6dc31080b91fe2c70cc50e5943a5128346c53e49bee12a48126d60063c9dc8a23d5ad1b8a0c92df63b9e8d1f4871fcc1874c8d46ebd364ca49c54cc8f5928436a22609b2358be663bfde924d4be1e46ed26c9ab1fa1db562dbaa902302cfa20761d0c3b30"}, {0xe8, 0x110, 0x500, "4b346f5b6098aa383d6448271283f76cc2eeebc026cba92233a8d0c6e794276293c04e16feddf42c4864020067ce6e6a4749ca3dc39dd822a8c2b1f5393a3ba64231ba91096ebfe3ebf580a80da176ec52f158c9c90b6003ce4b56f5a32962ee94b2ab9aa9f7677c72a4cca786917cb973f86cb59f926e130b45da90a4c6bbce8ba8bdfcb7951f104613fbd1e2f306236ab9fa4efa95105b8a8e086e507d1b6c45e585be5ba211cecade25fcaf34f23b361f938022fc13a2309f59a058d61141272e7bcc07f94b6c70623101bee2a80e7877e68967fe79a6"}, {0x58, 0x6, 0x6, "b0041f99fd106a110a1a014118dafa61c34dd8174212ee23587907debb87b36bdf86542f7daa68b9999565c4a9d514082d8cf69a2c1a01b3d09e6abfd1f45e4d5870"}, {0x100, 0x88, 0xffffffff, "642abb7b182cdeb9329aba8c306f66ada3222716453e965ab025ae9a88fc3bb3845b457296445e61f6cf28c143084d3526642570cd1ad4dcc0d358fe29d1c44cb67bd4ffc329a7d18627b0cc6f0353e4b720465b841623063a00bed5912230b41c5f4d11c1d9ecf5dcf18170b095d37e004e8ef694b3b66ba4bf304352855a4e6b97a2f32228be90230a2aba318b5dc1681231e413af80466ea7ae7e71c649de65acb096eddb1047dcd8c84e357715bc7c0bdd5449ed011a02fcec55a3c5c0ad06f0d4ae318f664ef6ff4b5b4335ae6bbe9650d6f2593d191251ed35032bb469a23e777265b8e9657c5c40b9617d3971"}, {0x110, 0x103, 0x10, "e1d4e1318f82a616d64a22dc53cf48b811fe269d9b83cc97d245e687bc62c7b4aca78c72e9d38218811dd3df3e5b40e84e58d487e8f4b6a60a417d9bc63ff63b443b74102312244b3c773c0885909a40925033570c0492d3dcb855f0368827189ade6e9b2e825d0af85d39ccc8ebf5f70fccc972e5d7f0577f81bcd8ea5c998e122781256f58185801f4b684b7fab5d36db574ef0116314beb8aa43135efb1b04bae44d0bad4c7d17781c38b8c483852442d94d48723a8682c0deb575ad7aaab413b9b8075765ad8e95a488ca80b6a3cd2bf3106928caf2f51435e312d1bfbfb903670e48a521673d206fc6db86bf2450c156cdc971d0a7e6b"}, {0xa0, 0x114, 0x0, "b1e98f0c2e625242c7fdcfe12cdd5dd2c6743f87c5b0d45a8dee5dea49f929d821ff5ed1a4ae1557d5ab14dbcf93682f40ddc95ad748fec83c99d7f0a6adf82de88f1580ad40375b7f4f96dd60fa1630d35e7c8232712fa537921e5bab4167419882c880aaffbb72888bf0155887018b11bd5598a2498fb7eaf177857ef44b804ece2a49869cdde3b3a7131d"}, {0xe0, 0x119, 0x8000, "775810f9dfa431012b6ad616f575935c2a58e5bc21b39e93fbf001304be79b88fd8c4b1ec97574e1b134d4356a411802c748db485b4114ba9bce036cee8b9fc5ed4cd94fbdc22d0e9c9d357fd2570fd4823b57d52d86edf7d8f6bc372923534d6a1466ea640b55f4d28847b4f7597cf8003290fb9377b1c508bdc7e4561b636c45c4e92485f19e0ad9b748eeb9551722508c39b82d7ea89497b84f34c4fdeb2e6927984adffa47d1d27e553bbf8f32634499da915223e669d76c5679594977b8420f5d8fbe35dc48c0560492597d940b"}], 0x1658}, 0x8c0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000001580)={0x1, 0x80, 0x0, 0x1, 0x61, 0xa, 0x0, 0x5, 0x40000, 0x10, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x3, @perf_config_ext={0xffffffffffffffff, 0x7}, 0x11b014, 0x4, 0x5, 0x3, 0x986a, 0x9, 0xfffa, 0x0, 0xe0, 0x0, 0x4}, 0x0, 0x1, r4, 0x3) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0x20a) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 2m37.100166011s ago: executing program 4 (id=5592): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x3, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000600)=0xd, 0x18) perf_event_open(&(0x7f00000006c0)={0x6, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x7602, 0x0, 0x2060, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}, 0x106144, 0x0, 0x7f, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0xfe, 0x0, 0x4, 0x0, 0x7602, 0xfffffffffffffffc, 0x2a002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x9c4b, 0xa}, 0xc464, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x4000004, 0x0, 0x1004}, 0x0, 0x0, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000100000000", @ANYRES16=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xff, 0x2, 0x0, 0x0, 0x0, 0xf, 0x100, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0xa}, 0x0, 0xfffffffffffffffc, 0x0, 0x4, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x44a, 0x2084, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000040), 0xe}, 0x4130, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100, 0x0, 0x3d}, 0x0, 0x0, r2, 0x2) syz_clone(0x24100400, &(0x7f0000000a40)="b8913430a3e1cafa000000003b9d30b175a45f22a1fd26a5a315be7e7e8bc50610e54058cd643175edd9ee84b1eb1d75d8d75576cf5bb92be3e66d8e99187b0edf8f8a8f59556d6469a529ad52", 0x4d, 0x0, &(0x7f00000004c0), 0x0) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0400000004000000040000000466dd4f559343e276acfd9500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(r5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100869dfe60010000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000004000000000000000000000b00000000020000000200000f020000000400f1ff000000000100000025ff000000000000000f02000000b8b300005f"], &(0x7f0000000540)=""/145, 0x50, 0x91, 0x1}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2m37.057718733s ago: executing program 3 (id=5593): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r3, 0x0, &(0x7f0000001780)=""/4096}, 0x20) (fail_nth: 12) 2m37.047777594s ago: executing program 0 (id=5594): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='rxrpc_rx_done\x00', 0xffffffffffffffff, 0x0, 0xffff}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000084000000000100000100000000", @ANYRES32, @ANYRESHEX=0x0], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@o_path={0x0, 0x0, 0x8, r1}, 0x18) perf_event_open(&(0x7f00000021c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r6}, 0x8) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4e, 0x4e, 0x5, [@func={0x6, 0x0, 0x0, 0xc, 0x1}, @type_tag={0x4, 0x0, 0x0, 0x12, 0x1}, @var={0xa, 0x0, 0x0, 0xe, 0x3}, @datasec={0x7, 0x1, 0x0, 0xf, 0x2, [{0x3, 0x3, 0xd7f3}], "f7b3"}, @type_tag={0xd, 0x0, 0x0, 0x12, 0x3}]}, {0x0, [0x30, 0x30, 0x61]}}, &(0x7f0000000580)=""/240, 0x6d, 0xf0, 0x1, 0x1}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@float={0xd, 0x0, 0x0, 0x10, 0x10}]}, {0x0, [0x0, 0x711735914673babc, 0x1e, 0x61, 0x2e]}}, &(0x7f0000000680)=""/99, 0x2b, 0x63, 0x0, 0x8}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRESHEX=r4, @ANYBLOB="1c00000000000300000000000000010045"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r7}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x2a, 0x2, 0x4, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 2m36.502550967s ago: executing program 5 (id=5595): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000100000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='erofs_destroy_inode\x00', r2, 0x0, 0xffffffffe}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000007000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r4 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b9ef8ff00000000bfa200000000020000f8ffffffb703000008000800b7040000000000008500000003000000957d6c0000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2m36.501408277s ago: executing program 1 (id=5596): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r0}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000bfd50000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00083300db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2m36.499941417s ago: executing program 4 (id=5597): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='cq_reschedule\x00', 0xffffffffffffffff, 0x0, 0x3b98}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001100)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x2c, &(0x7f0000001140), 0x4) setsockopt$sock_attach_bpf(r5, 0x1, 0x1b, &(0x7f0000000040), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x72bd1de2ad10b2b3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8940, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) 2m36.165290642s ago: executing program 3 (id=5598): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e", @ANYRES32], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, 0xffffffffffffffff, 0x1d, 0x0, 0x1}, 0x28) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) (async) socketpair(0x1e, 0x0, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000017c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1}, 0x100c, 0x0, 0x0, 0x1, 0x4, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000003c0)=0x1ff, 0x12) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000001880)=ANY=[@ANYRES16, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid_for_children\x00') (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup(r2, &(0x7f00000001c0)='syz0\x00', 0x1ff) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x16004, 0x0, 0x81, 0x5, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) 2m36.164722172s ago: executing program 1 (id=5599): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xa49a4400, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2m36.164357812s ago: executing program 3 (id=5600): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x110e22fff6) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xb, &(0x7f0000001140)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) write$cgroup_type(r1, &(0x7f0000000280), 0x9) 2m36.142228763s ago: executing program 0 (id=5601): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x2e, &(0x7f0000000040)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x4, @perf_bp={&(0x7f0000001080)}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r10, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 2m36.133996984s ago: executing program 5 (id=5602): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0xfdef) 2m35.577747708s ago: executing program 3 (id=5603): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x50}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000000c0), 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000300)=""/162, 0xa2}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f00000003c0)=""/180, 0xb4}, {&(0x7f0000000500)=""/29, 0x1d}, {&(0x7f0000000540)=""/110, 0x6e}], 0x5, &(0x7f00000005c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='f2fs_direct_IO_exit\x00', r2, 0x0, 0x9}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000019c0)={&(0x7f0000000800)="fd1db8ddb286b76b31272095d51bbdd7cd0d042ae36fee8b264b8debe6f51afdb198d393ab506da7683a1620b32bc053164f74c3000113999394beca483e1f5c1e1dbb0880d8491cd1666dca4a949656906718a6029367f35853151e4d543d22ae139c771c0eaf9dd1a928499ed91645cfc489dec87a8c2a85a06d397ec1524504aff6abee6a61ff9c0443a4f1b7b3d319c8bcdba5c16994e52a38ed2ca697fffa5e2e9f2a6a8922a3568fcf360cce3cfb9c1c11d276c1df540e4b38eeb335aed020f2adff9272fa37dfcb9648321058268b2c0048a586050b357e1a0af34111ac520410a02338510aecd7", &(0x7f0000000900)=""/4096, &(0x7f0000001900)="f87c2e59526b", &(0x7f0000001940)="f5db3b31344f0e9d6ef5c240976954bd5d8de91e049aa7b28957f7df62b118448af88d7f64f8319c7a44abbd95fbf7bd3cfb1f16e340234451d439e36ba4531187eee900b812f6511f5865f8019af62158fbe7e321d0febd465792839db31c1f2f715dd61c8bd8c3b4004887e32c076a71c446c12917924afcf089424c", 0x40, r2}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001a00)=ANY=[@ANYBLOB="6ff43386a30000000000000000000000181100aa91bdcb961b277e64d6914a33c413332efe227ea1cc", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff3, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) write$cgroup_subtree(r3, 0x0, 0x0) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2m35.508413551s ago: executing program 4 (id=5604): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x110e22fff6) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) close(0x3) write$cgroup_type(r1, &(0x7f0000000280), 0x9) 2m35.496726692s ago: executing program 0 (id=5605): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) bpf$ITER_CREATE(0xb, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000c40)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000fc0)={&(0x7f0000000c80)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, 0x0}, 0x4040840) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff7) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x4004743d, 0x110e22fff6) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r7}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x2f, 0x20, 0x4}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x20) write$cgroup_type(r5, &(0x7f0000000280), 0xfffffeed) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r9) close(r8) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x88000, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='mm_page_alloc\x00', r11}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000001440)={'\x00', 0x4212}) 2m35.487899382s ago: executing program 5 (id=5606): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13c, 0x13c, 0x6, [@enum={0x8, 0x8, 0x0, 0x6, 0x4, [{0x4}, {0x0, 0x800}, {0xa, 0x3}, {0xc, 0x2}, {0x1, 0x7f}, {0xa, 0x3}, {0x1, 0x2}, {0x6, 0x2}]}, @restrict={0x0, 0x0, 0x0, 0xb, 0x3}, @const={0x1, 0x0, 0x0, 0xa, 0x3}, @union={0xa, 0x7, 0x0, 0x5, 0x0, 0xffff479e, [{0xc, 0x5, 0x9}, {0x7, 0x2, 0x3}, {0x8, 0x1, 0xfffffff8}, {0xf, 0x4, 0x7ff}, {0x2, 0x2, 0x2}, {0x5, 0x2, 0xd9}, {0x6, 0x2, 0x6}]}, @enum={0xb, 0x4, 0x0, 0x6, 0x4, [{0xffffffff}, {0x2, 0x8000}, {0xf, 0x1ff}, {0x8, 0x14}]}, @type_tag={0x8, 0x0, 0x0, 0x12, 0x1}, @ptr={0x1000, 0x0, 0x0, 0x2, 0x2}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xe, 0x5}, {0x6, 0x3}, {0x6, 0x4}]}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x28, 0x1}]}, {0x0, [0x5f, 0x30, 0x2e, 0x30]}}, &(0x7f0000000280)=""/217, 0x15a, 0xd9, 0x0, 0x8, 0x10000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb7, &(0x7f00000004c0)=[{}], 0x8, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0xb4, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xe, 0x11, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x7, 0x1, 0x0, 0x6, 0x2, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f00000007c0)='syzkaller\x00', 0x401, 0x75, &(0x7f0000000800)=""/117, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f00000008c0)=[0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000900)=[{0x4, 0x2, 0x4, 0x1}, {0x1, 0x2, 0xb, 0x1}, {0x3, 0x4, 0xe, 0x9}], 0x10, 0x69d7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x39}], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x5b, &(0x7f0000000080)=""/91, 0x6ea4f9e4b0f6612, 0x68, '\x00', 0x0, @cgroup_sock_addr=0x13, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x2, 0x10, 0xff, 0x8}, 0x10, r1, r2, 0x0, 0x0, 0x0, 0x10, 0xe1}, 0x94) 2m35.479464612s ago: executing program 5 (id=5607): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r0}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x1f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 2m14.978817333s ago: executing program 33 (id=5605): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) bpf$ITER_CREATE(0xb, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000c40)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000fc0)={&(0x7f0000000c80)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, 0x0}, 0x4040840) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff7) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x4004743d, 0x110e22fff6) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r7}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x2f, 0x20, 0x4}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x20) write$cgroup_type(r5, &(0x7f0000000280), 0xfffffeed) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r9) close(r8) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x88000, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='mm_page_alloc\x00', r11}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000001440)={'\x00', 0x4212}) 2m14.933414324s ago: executing program 34 (id=5599): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xa49a4400, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2m14.933208565s ago: executing program 35 (id=5607): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r0}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0ff5b14104fe62cc60e413905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf2364149215108333719acd97cfa107d40224edc5465a93df8513a32ec450bebc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe511195418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4929330142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da8c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000dd11e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15f2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f000010000000000000905ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400bee3dfc8fb24f67c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341b74abaa7c95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb232bbdb9dc33cbd7643866fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595270fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f76dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d2e959efc71f665c4d75cf2458e3322c9062ece84c99a061997a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99f0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d164118e4cbe02400000000ff0700000000cc9d8046c216c1f895778cb25122a2a998de44aeadea2a40da8daccf080842a4867217373934bbd42dcb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcd62981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba495aea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000000001700d6d5210d7560eb92d6a97a27602b81f76386f1535b1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294059323e7a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd704e4214de5946932d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1fc8df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1785eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be2f5656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fd78f9743af932cd6db49a47613808bad959719c0000000000378a921c7f7f6933c2e24c7e800003c9e8095e02985f28de0bbc76d58dd92606b1ef6486c85fa3e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6968d12418a4d2a0d086d8438d415d713acebc5b014e61a543a5a391f03daca80f08f0e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e112645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c000000000000000000000000000000a1c3da144589dcaddb71cf9374843e23f992a237a9040747e0434a8a643990b4059a98411ce867d1af7e8ea89f49e6f564d4dce8a7d6939a9214a7f39e83bd247e03a09dba000000000000000000000000aaf033d47249c8444bc13844cbf1be617d82b269e5ea0c0d525603c0ec543ea581f63893ae414a6683e941fdbdff03cfc5f8744583c0aa766a65321f907927a59d75b47f06895e8471ebc2840ce5bd054df223fb09b9c739ad64cfcfd2d498b0f11056f6c40874cb977c99b6bc1a8732198a17e610082b7ce0365f271b11d4b4a3d4c7d0bb273f406ecd4b26c93151c30f5a269991402d109becb1b9bafcb2b47e940000000000e540d8b0db3774effb7469a21f96e2594b2973ebf7a1bd9ace2ed4d6eb1735f85885be5be74dc2ea5d7d499bd28271b98f187f5879b16b409a04d78175cc8d0f707c822805d7011ed4b22419186dd2b22aadf15828db2ca19d79e1bf2f7989237ee5cb2e1eb7b2bfc92d3aa95a26f060935c4fee8b2d7d0bf3c6d82d04329164bd4ee0b8060183f36762b0440d9082d7c8b06e4c2024f77e1018758d28e7ee290f32a48bfc2aa10b3dba9bff00d2410f3477a8e0df689c880dc9a677cfaa16603527c06625a3363744cea5f2d350224cc0fea76c72ca08507235c67346722f20690fde0790f040f5fd3eff75f9b291cc5e9c686ebaadbe756c6fa039ff441e427ed12578d5cb041ebf729cfaa575cc852fbdb54e60435e6d62b9d270433b220ed9ff1ff042b8d3d866231c460765"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x1f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 2m14.931082714s ago: executing program 36 (id=5603): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x50}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000000c0), 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000300)=""/162, 0xa2}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f00000003c0)=""/180, 0xb4}, {&(0x7f0000000500)=""/29, 0x1d}, {&(0x7f0000000540)=""/110, 0x6e}], 0x5, &(0x7f00000005c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='f2fs_direct_IO_exit\x00', r2, 0x0, 0x9}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000019c0)={&(0x7f0000000800)="fd1db8ddb286b76b31272095d51bbdd7cd0d042ae36fee8b264b8debe6f51afdb198d393ab506da7683a1620b32bc053164f74c3000113999394beca483e1f5c1e1dbb0880d8491cd1666dca4a949656906718a6029367f35853151e4d543d22ae139c771c0eaf9dd1a928499ed91645cfc489dec87a8c2a85a06d397ec1524504aff6abee6a61ff9c0443a4f1b7b3d319c8bcdba5c16994e52a38ed2ca697fffa5e2e9f2a6a8922a3568fcf360cce3cfb9c1c11d276c1df540e4b38eeb335aed020f2adff9272fa37dfcb9648321058268b2c0048a586050b357e1a0af34111ac520410a02338510aecd7", &(0x7f0000000900)=""/4096, &(0x7f0000001900)="f87c2e59526b", &(0x7f0000001940)="f5db3b31344f0e9d6ef5c240976954bd5d8de91e049aa7b28957f7df62b118448af88d7f64f8319c7a44abbd95fbf7bd3cfb1f16e340234451d439e36ba4531187eee900b812f6511f5865f8019af62158fbe7e321d0febd465792839db31c1f2f715dd61c8bd8c3b4004887e32c076a71c446c12917924afcf089424c", 0x40, r2}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001a00)=ANY=[@ANYBLOB="6ff43386a30000000000000000000000181100aa91bdcb961b277e64d6914a33c413332efe227ea1cc", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff3, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) write$cgroup_subtree(r3, 0x0, 0x0) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2m14.906611806s ago: executing program 37 (id=5604): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x110e22fff6) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) close(0x3) write$cgroup_type(r1, &(0x7f0000000280), 0x9) 1.465320786s ago: executing program 2 (id=7099): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r0}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000bfd50000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[], 0xfdef) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.406168078s ago: executing program 2 (id=7101): bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x20, &(0x7f0000000340)={&(0x7f0000000100)=""/219, 0xdb, 0x0, &(0x7f0000000240)=""/237, 0xed}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) (async) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r2}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.35965166s ago: executing program 7 (id=7102): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c9042, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c9042, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES16=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES16=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x8, r0}, 0x18) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x8, r0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1804000000000000000000000000000040000000010000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x80, &(0x7f0000000200)=""/128, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000010000)=ANY=[@ANYBLOB="180200000000000000000000000000180100002064"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000fd31ddfa7ec5d100"/27], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="18001e0000000000006d158b1e1382688f110000dfbce322e85bc7cd2cd4a6ffb038059817ff55d1474dbfda10fe349880204cbafeb05d5f3b33cfaaba21ffab9232b5d6b1bf3d0f2cce446afb7109daf56574787ff1e081f076b261c9b946c9166a2a", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@fallback, 0x0, 0x0, 0x8, &(0x7f0000000340)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000340)}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@fallback, 0x0, 0x0, 0x8, &(0x7f0000000340)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000340)}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r4}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x1ff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000021004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000021004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)=@generic={&(0x7f0000000000)='./file0\x00', r6}, 0x18) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) close(r8) (async) close(r8) 1.272685124s ago: executing program 2 (id=7105): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0xa0041, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="006d6702e7"], 0x5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000200000000000001860000000000000e9ff00000400000018120000f9df816c2a7a46f95c1f39b400b0a16eaec52df7f07cd575d84fa0", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(r7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r11) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) ioctl$TUNSETOFFLOAD(r12, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r11, 0x40047451, &(0x7f0000000180)) 1.234140356s ago: executing program 7 (id=7106): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b701000000000000850000006d00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x50) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r7}, 0x10) close(r6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r1}, 0x10) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) 1.154313369s ago: executing program 6 (id=7110): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe", 0x6}], 0x1}, 0x0) recvmsg(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/58, 0x3a}], 0x1}, 0x40fd) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x4004743d, 0x110e22fff6) write$cgroup_type(r7, &(0x7f0000000280), 0x9) 1.151284469s ago: executing program 2 (id=7111): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r0}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000bfd50000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.082663393s ago: executing program 9 (id=7112): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r5}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, r6, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x2a020600, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000080)) 1.081873683s ago: executing program 8 (id=7113): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r7, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r6) ioctl$SIOCSIFHWADDR(r3, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 910.83428ms ago: executing program 2 (id=7114): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x4, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, 0x0, &(0x7f0000000380)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x100000000, 0x2}, 0x10, 0xc8, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x20, 0x0, 0x40000}, 0x0, 0x1, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000001000000bdb5f4ffffffffff078600080001000023bb80001000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x5, 0x0, 0x0, 0x41100, 0x6a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xa85}, 0x94) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 891.152181ms ago: executing program 7 (id=7115): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='tlb_flush\x00', r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xfffffffe}}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 801.334664ms ago: executing program 8 (id=7116): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff8000}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x200040, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0], 0xfdef) 777.891056ms ago: executing program 6 (id=7117): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x4a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001300)={r4, 0x18000000000002a0, 0x36, 0x0, &(0x7f0000000580)="b9ff03076844048cbabe143d86dd8d0326eb5f439b6187acef0c350e7151d62abd8352eca887e89d739da96340879dfcd473a1017f06", 0x0, 0xb, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 729.011888ms ago: executing program 9 (id=7118): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0900000043010000fd03000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1, 0x0, 0x4}, 0x18) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@fallback, 0xb, 0x257fe418e79fc268, 0x40, &(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async, rerun: 32) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000004c0), 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={@map=r2, r3, 0x9, 0x2000, r1, @value=r6, @void, @void, @void, r5}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r0}, &(0x7f00000000c0), &(0x7f0000000400)}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r0, &(0x7f0000000080), 0x0}, 0x20) (async) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r7}, 0x10) (async) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) 728.100348ms ago: executing program 6 (id=7119): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c9042, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x226140, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, &(0x7f00000001c0), 0x4) ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random="2d311e000008"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 659.541201ms ago: executing program 8 (id=7120): bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x200000a9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000009d000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x2}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000080), 0x0}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000080), 0x0}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000240)=0x6fa6, 0x12) (async) write$cgroup_int(r5, &(0x7f0000000240)=0x6fa6, 0x12) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRES16=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 658.796831ms ago: executing program 9 (id=7121): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={0x0, r1, 0x0, 0xffffffffffffff7e}, 0x5b) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={r0, 0x58, &(0x7f0000000fc0)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x18) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) recvmsg(r5, &(0x7f0000001500)={&(0x7f0000001280)=@x25, 0x80, &(0x7f00000014c0)=[{&(0x7f0000001300)=""/157, 0x9d}, {&(0x7f00000013c0)=""/41, 0x29}], 0x2}, 0x160) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r8) syz_clone(0x47ce78985b32a8d0, &(0x7f00000010c0)="3079a3ba6bfb5c63d346f709421c02036b029a61e246b65e849a35bba9df930b5c", 0x21, &(0x7f0000001100), &(0x7f0000001180), &(0x7f00000011c0)="15b217a6d2aa6e6c54d333e699aae4b7a26422428f044a02b24d4b0ab45d") bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, r9}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 656.991131ms ago: executing program 2 (id=7122): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000100"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x4010, r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="f05c7bdeb018000017008000000000000000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB], 0x128}, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x16, 0x6, &(0x7f0000000400)=ANY=[@ANYRESDEC=r2], &(0x7f0000000080)='GPL\x00', 0x4, 0xc2, &(0x7f0000000980)=""/194, 0x0, 0xa, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000040000000000000001"], 0x50) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r7) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x39, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r10}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x8, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 641.937631ms ago: executing program 7 (id=7123): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@o_path={&(0x7f0000000200)='./file0\x00', 0x0, 0x0, r1}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xe, 0x9, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000005da90000000000000100000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0xca91, 0x69, &(0x7f0000000580)=""/105, 0x40f00, 0x8, '\x00', 0x0, @sk_skb=0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x1, &(0x7f0000000600)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000640)=[{0x0, 0x3, 0xb, 0x1}], 0x10, 0x401}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r1, @ANYRES32=r3, @ANYBLOB="290000b54f71b585d797478505da0d018886b859cea48c8480d5555c04908277a259b25ade25527bbb77a777d63d8a4a8cca46d7127a06bf583fa18cbfa27f366f3132a9dfff0a18b601820aafba7168d1ef24c2953da7deb2149645fb9417ad", @ANYRES32=r4, @ANYBLOB, @ANYRES32=r5, @ANYBLOB, @ANYRES64=0x0], 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2880, 0xc8, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a00000080000000064242"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r9, 0x4004743d, 0x110e22fff6) write$cgroup_type(r9, &(0x7f0000000280), 0x9) 480.786359ms ago: executing program 6 (id=7124): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r0}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000bfd50000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB], 0xfdef) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 370.232514ms ago: executing program 7 (id=7125): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xf6644c86763f0d65, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r5}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0xc73d, 0x2, 0x48, 0x808, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x1, 0xd}, 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x1, 0x0, 0x80000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x50) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r10) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r11, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r9) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000004000000080000000c"], 0x48) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x17, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r13}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 366.778604ms ago: executing program 9 (id=7126): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x4e}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 215.00909ms ago: executing program 6 (id=7127): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe", 0x6}], 0x1}, 0x0) recvmsg(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/58, 0x3a}], 0x1}, 0x40fd) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x4004743d, 0x110e22fff6) write$cgroup_type(r7, &(0x7f0000000280), 0x9) 125.518584ms ago: executing program 9 (id=7128): syz_clone(0x3002500, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x555) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0x3) (async) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x17, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000711205000000000095"], 0x0, 0x5}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) (async) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) socketpair(0x2, 0x3, 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) 52.352617ms ago: executing program 8 (id=7129): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000000800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b78dff00000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006200000095"], &(0x7f0000000680)='syzkaller\x00'}, 0x6b) 51.821697ms ago: executing program 9 (id=7130): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x8, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.memory_pressure_enabled\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc0189436, 0x2000141a) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r0, @ANYBLOB="020001000000000100"/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="010000000500"/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000400000851000000600000018020000", @ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000740)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x41000}, 0x76) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a80)) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) write$cgroup_pid(r7, &(0x7f0000000080), 0x12) r8 = openat$cgroup(r2, &(0x7f0000000600)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r8, &(0x7f0000000640), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7, '\x00', r9, r1, 0x1, 0x4}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='timer_start\x00', r10}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000000000000d3002020207b1af8ff00000000bfa100000000000027010000f8ffffffb702000008000000b70300000080ffff850000000600000006000000000000000000000000fdff0000000000000074c4c4b5e26d0802b034d02672e7ac68d22206d4a488d3e4654b9e52351904506d4751b648a591f83f60445b8dcfbce003cb93c07511c8ca18d07e67c455ef871e823f7ab0b5ad382f7efcb17357e5230e90290c2ca102ce92a019eb41ae118c"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 50.955807ms ago: executing program 8 (id=7131): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f00000002c0), &(0x7f0000000240)=r3}, 0x20) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) (async) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) (async) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0xb, 0x7f, 0x1, 0x6, 0x0, 0x8001, 0x20, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000040), 0xe}, 0x13, 0x4, 0x2, 0x8, 0x8, 0x2, 0x2, 0x0, 0x7, 0x0, 0xec}, r5, 0x7, 0xffffffffffffffff, 0x1) sendmsg$inet(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x4048884) 50.409837ms ago: executing program 6 (id=7132): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x22090, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc099ad758a27c85f}, 0x2002, 0xc8, 0x0, 0x5, 0x8000000000000, 0x0, 0x0, 0x0, 0x95ad, 0x0, 0x384}, 0x0, 0x101, 0xffffffffffffffff, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000008500000086002000950000002c50f49f4e268c634f61ec55e10000000000000000000000000000788b514fe70b941ff0c6a0f9c66c82d5a64b4963a29e4f1e951f18ffa40a7c07928d42968f42d56206bc4f31e2a8355a50a31410a1fc3812a10ced959954f775fb9c9a96eda13634a144b5c5ae8687a628b50236e76e401fec60df54d713dc7cde1158087c5683a0a1b94fa0281f45b5384d79f64f53e47242e7eebc09bab016a2f6da1d035f"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r7}, 0x10) close(r5) recvmsg$unix(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd"], 0xfdef) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) 16.579919ms ago: executing program 7 (id=7133): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000680)={&(0x7f0000000380)="338b69882a7630ba17be469a0d93990100e1b7805b864be85da52ea1e909dd1935e0a253be4d7de65176fe83a3198532886eb8f0e5434f4be553aca88bd5951f4acb8cea680ca340ea51684710b43ebaba45cf8e39e3a6920f3af9dd1203efba", &(0x7f0000000540)=""/80, &(0x7f0000000180)="1595477e04b55b0030efd1ee278e7a4dac7b32da9402fed47fd3ffb1dd403d204f7188", &(0x7f00000005c0)="cd057726dfbb3a17f13fd471fe2c1f53075632ac164a8d5fd6e38cd56a2b37249217174a72edb55355ecbc1a96dc666a02eabf7194c59349ce60c8a78ef9ed21edae7734e35589f78faee6315ca8e7271cb66ba563200f038acefa979e35bef15a41492cda4fdb42c544cb0fb68d940530b32d2b8226d674e6d8d021955121378143baeca4069d90", 0x5, r2}, 0x38) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=r1], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e000000040000000400000009"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="865bead93e838b2337b64aca2745fd257d48e6b16ad673d0553703f21a63a8d7fa19eae22e301c5679b696663c7fcf9abf755d16bb67fb9fc6377f00acf69e284f52af1ce8396588516174c81682bacf73d16139fe162978a0f3ad2f0f7d1008e6f5ce08b1e8a8a53ec1ca0a2c8ce6", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) sendmsg$inet(r4, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802"], 0x0, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r8, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) 0s ago: executing program 8 (id=7134): bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x533b, 0x18}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, 0x0, 0x0, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x496, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0x12a0, 0xa, 0x77ab69fc, 0x3, 0xffffffffffffffff, 0x8, '\x00', r0, 0xffffffffffffffff, 0x5, 0x3, 0x4, 0x9}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c9042, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r7 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r6}, 0x8) close(r7) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r7, r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{0x1}, &(0x7f0000000340), &(0x7f0000000380)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x12, 0x5, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x1}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200150000f30042df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) kernel console output (not intermixed with test programs): ne, BIOS Google 10/02/2025 [ 426.483489][T11656] Call Trace: [ 426.486872][T11656] __dump_stack+0x21/0x24 [ 426.491194][T11656] dump_stack_lvl+0x169/0x1d8 [ 426.495860][T11656] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 426.501997][T11656] ? show_regs_print_info+0x18/0x18 [ 426.507189][T11656] dump_stack+0x15/0x1c [ 426.511334][T11656] should_fail+0x3c1/0x510 [ 426.515736][T11656] ? sk_prot_alloc+0x5c/0x340 [ 426.520401][T11656] __should_failslab+0xa4/0xe0 [ 426.525155][T11656] should_failslab+0x9/0x20 [ 426.529645][T11656] kmem_cache_alloc+0x3d/0x2e0 [ 426.534397][T11656] ? __irq_exit_rcu+0x40/0x150 [ 426.539157][T11656] sk_prot_alloc+0x5c/0x340 [ 426.543653][T11656] sk_alloc+0x38/0x4e0 [ 426.547710][T11656] __vsock_create+0x3e/0x940 [ 426.552283][T11656] vsock_create+0x127/0x3e0 [ 426.557140][T11656] __sock_create+0x38d/0x770 [ 426.561807][T11656] __sys_socketpair+0x218/0x590 [ 426.566641][T11656] __x64_sys_socketpair+0x9b/0xb0 [ 426.571646][T11656] do_syscall_64+0x31/0x40 [ 426.576044][T11656] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 426.582007][T11656] RIP: 0033:0x7f27abbac749 [ 426.586408][T11656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 426.606248][T11656] RSP: 002b:00007f27aa614038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 426.614887][T11656] RAX: ffffffffffffffda RBX: 00007f27abe02fa0 RCX: 00007f27abbac749 [ 426.622843][T11656] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000028 [ 426.630823][T11656] RBP: 00007f27aa614090 R08: 0000000000000000 R09: 0000000000000000 [ 426.638778][T11656] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 426.646736][T11656] R13: 00007f27abe03038 R14: 00007f27abe02fa0 R15: 00007ffff4999358 [ 426.786244][T11679] device pim6reg1 entered promiscuous mode [ 427.931895][T11734] device pim6reg1 entered promiscuous mode [ 428.455716][T11761] device syzkaller0 entered promiscuous mode [ 429.609839][T11782] device sit0 entered promiscuous mode [ 433.258690][T11869] device syzkaller0 entered promiscuous mode [ 434.577610][T11911] device syzkaller0 entered promiscuous mode [ 434.657463][T11914] device sit0 left promiscuous mode [ 434.794151][T11914] device sit0 entered promiscuous mode [ 436.699413][T11956] device veth0_vlan left promiscuous mode [ 436.711757][T11956] device veth0_vlan entered promiscuous mode [ 436.724821][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 436.739683][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 436.748156][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 440.051985][T12049] device syzkaller0 entered promiscuous mode [ 440.649328][T12075] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.656792][T12075] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.157784][T12114] device wg2 entered promiscuous mode [ 441.174024][ T24] audit: type=1400 audit(1764024236.160:173): avc: denied { create } for pid=12104 comm="syz.2.3734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 442.052817][T12146] device wg2 entered promiscuous mode [ 442.391075][T12189] device wg2 left promiscuous mode [ 442.400247][T12185] device sit0 left promiscuous mode [ 442.478616][T12183] device pim6reg1 entered promiscuous mode [ 442.489743][T12189] device wg2 entered promiscuous mode [ 442.497681][T12193] device sit0 entered promiscuous mode [ 442.613527][T12194] device pim6reg1 entered promiscuous mode [ 443.031617][T12209] ªªªªªª™™: renamed from vlan0 [ 443.534189][T12242] device pim6reg1 entered promiscuous mode [ 444.041780][T12259] device syzkaller0 entered promiscuous mode [ 444.161742][T12263] device pim6reg1 entered promiscuous mode [ 444.439501][T12270] device syzkaller0 entered promiscuous mode [ 444.455365][T12272] device pim6reg1 entered promiscuous mode [ 444.724884][T12293] syz.0.3793[12293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.724932][T12293] syz.0.3793[12293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.552058][T12316] device pim6reg1 entered promiscuous mode [ 447.262161][T12351] syz.4.3812[12351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.262222][T12351] syz.4.3812[12351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.279333][T12354] device pim6reg1 entered promiscuous mode [ 449.173544][T12397] device veth0_vlan left promiscuous mode [ 449.179689][T12397] device veth0_vlan entered promiscuous mode [ 449.225938][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 449.255867][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 449.343751][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 449.391430][T12404] device veth0_vlan left promiscuous mode [ 449.433277][T12404] device veth0_vlan entered promiscuous mode [ 449.588534][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 449.645385][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 449.798304][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 450.333566][T12418] device sit0 left promiscuous mode [ 451.292939][T12423] device sit0 left promiscuous mode [ 451.479811][T12426] device sit0 entered promiscuous mode [ 452.796475][T12444] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.809865][T12444] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.025423][T12453] device bridge_slave_1 left promiscuous mode [ 453.035860][T12453] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.043867][T12453] device bridge_slave_0 left promiscuous mode [ 453.050105][T12453] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.352638][T12484] device veth0_vlan left promiscuous mode [ 454.414881][T12484] device veth0_vlan entered promiscuous mode [ 454.421859][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 454.432872][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 454.497673][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 454.558334][T12495] device sit0 left promiscuous mode [ 454.712363][T12498] device pim6reg1 entered promiscuous mode [ 455.302575][T12518] device syzkaller0 entered promiscuous mode [ 457.661972][T12571] device veth0_vlan left promiscuous mode [ 457.747489][T12571] device veth0_vlan entered promiscuous mode [ 462.877339][T12703] device pim6reg1 entered promiscuous mode [ 463.183952][T12711] device pim6reg1 entered promiscuous mode [ 463.413685][T12740] device pim6reg1 entered promiscuous mode [ 463.562018][T12753] device pim6reg1 entered promiscuous mode [ 464.648286][T12807] device pim6reg1 entered promiscuous mode [ 465.710916][T12850] device pim6reg1 entered promiscuous mode [ 465.795321][T12857] device pim6reg1 entered promiscuous mode [ 466.329030][T12885] device pim6reg1 entered promiscuous mode [ 466.380909][T12884] device veth0_vlan left promiscuous mode [ 466.422525][T12884] device veth0_vlan entered promiscuous mode [ 466.653884][T12892] device veth0_vlan left promiscuous mode [ 466.777500][T12892] device veth0_vlan entered promiscuous mode [ 468.271485][T12924] device veth0_vlan left promiscuous mode [ 468.283202][T12924] device veth0_vlan entered promiscuous mode [ 468.290928][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 468.335496][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 468.455784][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 469.166970][T12934] device pim6reg1 entered promiscuous mode [ 470.546698][T12954] device syzkaller0 entered promiscuous mode [ 471.224312][T12971] device pim6reg1 entered promiscuous mode [ 473.567018][T13010] device pim6reg1 entered promiscuous mode [ 475.686213][T13043] device pim6reg1 entered promiscuous mode [ 475.982592][T13057] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.989761][T13057] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.000219][T13057] device bridge0 left promiscuous mode [ 476.077200][T13057] device bridge_slave_1 left promiscuous mode [ 476.130287][T13057] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.224413][T13057] device bridge_slave_0 left promiscuous mode [ 476.230630][T13057] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.617766][T13071] device syzkaller0 entered promiscuous mode [ 476.688407][T13085] device pim6reg1 entered promiscuous mode [ 477.186831][T13094] device sit0 left promiscuous mode [ 477.642235][T13102] device sit0 entered promiscuous mode [ 478.591384][T13128] device pim6reg1 entered promiscuous mode [ 479.119841][T13145] device syzkaller0 entered promiscuous mode [ 479.475816][T13161] device pim6reg1 entered promiscuous mode [ 479.761427][T13178] device syzkaller0 entered promiscuous mode [ 481.000371][T13203] device pim6reg1 entered promiscuous mode [ 481.092607][T13205] device sit0 left promiscuous mode [ 481.413262][T13215] device syzkaller0 entered promiscuous mode [ 481.675254][T13226] device pim6reg1 entered promiscuous mode [ 481.973671][T13242] device syzkaller0 entered promiscuous mode [ 482.115391][T13250] device syzkaller0 entered promiscuous mode [ 482.211436][T13266] device pim6reg1 entered promiscuous mode [ 482.444506][T13302] device syzkaller0 entered promiscuous mode [ 482.477544][T13310] device pim6reg1 entered promiscuous mode [ 484.928453][T13351] device syzkaller0 entered promiscuous mode [ 485.475610][T13356] device pim6reg1 entered promiscuous mode [ 486.832427][T13379] Ÿë: port 1(veth0_to_team) entered blocking state [ 486.959752][T13379] Ÿë: port 1(veth0_to_team) entered disabled state [ 487.089427][T13379] device veth0_to_team entered promiscuous mode [ 487.290681][T13390] device pim6reg1 entered promiscuous mode [ 487.735914][T13432] syz.1.4170[13432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.735969][T13432] syz.1.4170[13432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.875289][T13443] device pim6reg1 entered promiscuous mode [ 488.507439][T13482] syz.2.4185[13482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.507491][T13482] syz.2.4185[13482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.796499][T13487] device syzkaller0 entered promiscuous mode [ 488.814669][T13493] device pim6reg1 entered promiscuous mode [ 489.116536][T13506] ±ÿ: renamed from team_slave_1 [ 489.323480][T13521] device syzkaller0 entered promiscuous mode [ 489.516174][T13523] device pim6reg1 entered promiscuous mode [ 489.943199][T13536] device pim6reg1 entered promiscuous mode [ 490.455154][T13547] device sit0 entered promiscuous mode [ 491.281281][T13583] device pim6reg1 entered promiscuous mode [ 492.244567][T13623] device pim6reg1 entered promiscuous mode [ 492.754630][T13645] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 493.396286][T13667] device pim6reg1 entered promiscuous mode [ 494.307972][T13703] device veth1_macvtap left promiscuous mode [ 494.476954][T13697] device veth1_macvtap entered promiscuous mode [ 494.562300][T13697] device macsec0 entered promiscuous mode [ 494.615102][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 495.120761][T13716] device pim6reg1 entered promiscuous mode [ 496.581541][T13760] device pim6reg1 entered promiscuous mode [ 496.943294][T13772] syz.3.4276[13772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 496.943394][T13772] syz.3.4276[13772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.334652][T13770] device veth0_vlan left promiscuous mode [ 497.362972][T13770] device veth0_vlan entered promiscuous mode [ 500.129266][T13847] device pim6reg1 entered promiscuous mode [ 501.148460][T13879] device wg2 entered promiscuous mode [ 501.176282][T13885] device pim6reg1 entered promiscuous mode [ 502.626022][T13919] device veth0_vlan left promiscuous mode [ 502.671378][T13919] device veth0_vlan entered promiscuous mode [ 502.877145][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 502.923033][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 503.037722][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 504.858035][T13957] device veth0_vlan left promiscuous mode [ 504.883518][T13957] device veth0_vlan entered promiscuous mode [ 506.049992][T13976] syz.1.4340[13976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.082214][T13976] syz.1.4340[13976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.332975][T13984] syz.1.4343[13984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.413593][T13985] syz.1.4343[13985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.462478][T13984] syz.1.4343[13984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.930332][T13999] device pim6reg1 entered promiscuous mode [ 507.015211][T14001] device syzkaller0 entered promiscuous mode [ 508.457692][T14072] device pim6reg1 entered promiscuous mode [ 509.124898][ T24] audit: type=1400 audit(1764024304.110:174): avc: denied { create } for pid=14090 comm="syz.1.4374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 509.762351][T14116] device pim6reg1 entered promiscuous mode [ 511.355386][T14150] device pim6reg1 entered promiscuous mode [ 511.531532][T14173] device syzkaller0 entered promiscuous mode [ 511.651451][T14188] device sit0 left promiscuous mode [ 513.301328][T14227] device syzkaller0 entered promiscuous mode [ 513.354519][T14235] device sit0 entered promiscuous mode [ 513.422094][T14243] device veth1_macvtap left promiscuous mode [ 513.428570][T14243] device macsec0 entered promiscuous mode [ 513.699421][T14263] device pim6reg1 entered promiscuous mode [ 513.970277][T14289] device syzkaller0 entered promiscuous mode [ 513.998503][T14288] device veth0_vlan left promiscuous mode [ 514.012453][T14288] device veth0_vlan entered promiscuous mode [ 515.603005][T14319] device pim6reg1 entered promiscuous mode [ 515.763054][T14323] device sit0 entered promiscuous mode [ 516.502710][T14327] device syzkaller0 entered promiscuous mode [ 517.677160][T14370] device veth0_vlan left promiscuous mode [ 517.870165][T14370] device veth0_vlan entered promiscuous mode [ 518.222877][T14376] device pim6reg1 entered promiscuous mode [ 519.468287][T14413] device wg2 left promiscuous mode [ 519.778673][T14420] device veth0_vlan left promiscuous mode [ 519.787730][T14420] device veth0_vlan entered promiscuous mode [ 523.232275][T14512] device veth0_vlan left promiscuous mode [ 523.256739][T14512] device veth0_vlan entered promiscuous mode [ 523.519762][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 523.528189][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 523.535984][ T9663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 523.555203][T14521] device sit0 left promiscuous mode [ 523.585684][T14525] FAULT_INJECTION: forcing a failure. [ 523.585684][T14525] name failslab, interval 1, probability 0, space 0, times 0 [ 523.713058][T14525] CPU: 0 PID: 14525 Comm: syz.1.4514 Tainted: G W syzkaller #0 [ 523.721926][T14525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 523.731969][T14525] Call Trace: [ 523.735251][T14525] __dump_stack+0x21/0x24 [ 523.739575][T14525] dump_stack_lvl+0x169/0x1d8 [ 523.744410][T14525] ? thaw_kernel_threads+0x220/0x220 [ 523.749678][T14525] ? show_regs_print_info+0x18/0x18 [ 523.754865][T14525] ? pfifo_fast_reset+0xe02/0xef0 [ 523.759877][T14525] dump_stack+0x15/0x1c [ 523.764022][T14525] should_fail+0x3c1/0x510 [ 523.768423][T14525] ? __alloc_skb+0x9e/0x520 [ 523.772938][T14525] __should_failslab+0xa4/0xe0 [ 523.777696][T14525] should_failslab+0x9/0x20 [ 523.782194][T14525] kmem_cache_alloc+0x3d/0x2e0 [ 523.786947][T14525] ? _raw_spin_unlock_bh+0x51/0x60 [ 523.792138][T14525] __alloc_skb+0x9e/0x520 [ 523.796457][T14525] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 523.801726][T14525] rtmsg_ifinfo+0x7a/0x130 [ 523.806130][T14525] dev_close_many+0x27c/0x4d0 [ 523.810794][T14525] ? __dev_open+0x4c0/0x4c0 [ 523.815277][T14525] ? _raw_spin_lock+0x8e/0xe0 [ 523.819940][T14525] ? __kasan_check_read+0x11/0x20 [ 523.824953][T14525] unregister_netdevice_many+0x44c/0x1980 [ 523.830662][T14525] ? __mod_timer+0x7ae/0xb30 [ 523.835237][T14525] ? alloc_netdev_mqs+0xc80/0xc80 [ 523.840243][T14525] ? add_timer+0x68/0x80 [ 523.844469][T14525] ? __queue_delayed_work+0x173/0x200 [ 523.849912][T14525] ? __kasan_check_read+0x11/0x20 [ 523.854911][T14525] unregister_netdevice_queue+0x31c/0x360 [ 523.860604][T14525] ? linkwatch_urgent_event+0x3a0/0x4a0 [ 523.866126][T14525] ? list_netdevice+0x4c0/0x4c0 [ 523.870948][T14525] ? linkwatch_fire_event+0x2d3/0x330 [ 523.876301][T14525] __tun_detach+0xca6/0x1450 [ 523.880894][T14525] ? tun_chr_open+0x540/0x540 [ 523.885631][T14525] tun_chr_close+0x92/0x140 [ 523.890106][T14525] __fput+0x2fb/0x770 [ 523.894059][T14525] ____fput+0x15/0x20 [ 523.898026][T14525] task_work_run+0x127/0x190 [ 523.902597][T14525] exit_to_user_mode_loop+0xcb/0xe0 [ 523.907774][T14525] exit_to_user_mode_prepare+0x76/0xa0 [ 523.913211][T14525] syscall_exit_to_user_mode+0x1d/0x40 [ 523.918656][T14525] do_syscall_64+0x3d/0x40 [ 523.923044][T14525] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 523.928904][T14525] RIP: 0033:0x7f03c73c4749 [ 523.933296][T14525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 523.952869][T14525] RSP: 002b:00007f03c5e2c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 523.961251][T14525] RAX: 0000000000000000 RBX: 00007f03c761afa0 RCX: 00007f03c73c4749 [ 523.969193][T14525] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 523.977141][T14525] RBP: 00007f03c5e2c090 R08: 0000000000000000 R09: 0000000000000000 [ 523.985082][T14525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 523.993025][T14525] R13: 00007f03c761b038 R14: 00007f03c761afa0 R15: 00007ffe94b0d098 [ 525.583985][T14577] FAULT_INJECTION: forcing a failure. [ 525.583985][T14577] name failslab, interval 1, probability 0, space 0, times 0 [ 525.602471][T14577] CPU: 0 PID: 14577 Comm: syz.2.4531 Tainted: G W syzkaller #0 [ 525.611335][T14577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 525.621367][T14577] Call Trace: [ 525.624646][T14577] __dump_stack+0x21/0x24 [ 525.628983][T14577] dump_stack_lvl+0x169/0x1d8 [ 525.633664][T14577] ? show_regs_print_info+0x18/0x18 [ 525.638859][T14577] dump_stack+0x15/0x1c [ 525.643009][T14577] should_fail+0x3c1/0x510 [ 525.647423][T14577] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 525.652875][T14577] __should_failslab+0xa4/0xe0 [ 525.657634][T14577] should_failslab+0x9/0x20 [ 525.662138][T14577] __kmalloc_track_caller+0x5f/0x320 [ 525.667412][T14577] ? kmem_cache_alloc+0x165/0x2e0 [ 525.672428][T14577] ? _raw_spin_unlock_bh+0x51/0x60 [ 525.677531][T14577] ? __alloc_skb+0x9e/0x520 [ 525.682033][T14577] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 525.687476][T14577] __alloc_skb+0xdc/0x520 [ 525.691785][T14577] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 525.697043][T14577] rtmsg_ifinfo+0x7a/0x130 [ 525.701434][T14577] dev_close_many+0x27c/0x4d0 [ 525.706086][T14577] ? __dev_open+0x4c0/0x4c0 [ 525.710566][T14577] ? __kasan_check_read+0x11/0x20 [ 525.715574][T14577] unregister_netdevice_many+0x44c/0x1980 [ 525.721266][T14577] ? __mod_timer+0x7ae/0xb30 [ 525.725839][T14577] ? alloc_netdev_mqs+0xc80/0xc80 [ 525.730838][T14577] ? add_timer+0x68/0x80 [ 525.735060][T14577] ? __queue_delayed_work+0x173/0x200 [ 525.740407][T14577] ? __kasan_check_read+0x11/0x20 [ 525.745504][T14577] unregister_netdevice_queue+0x31c/0x360 [ 525.751197][T14577] ? linkwatch_urgent_event+0x3a0/0x4a0 [ 525.756802][T14577] ? list_netdevice+0x4c0/0x4c0 [ 525.761627][T14577] ? linkwatch_fire_event+0x2d3/0x330 [ 525.766975][T14577] __tun_detach+0xca6/0x1450 [ 525.771632][T14577] ? tun_chr_open+0x540/0x540 [ 525.776282][T14577] tun_chr_close+0x92/0x140 [ 525.780774][T14577] __fput+0x2fb/0x770 [ 525.784731][T14577] ____fput+0x15/0x20 [ 525.788702][T14577] task_work_run+0x127/0x190 [ 525.793268][T14577] exit_to_user_mode_loop+0xcb/0xe0 [ 525.798440][T14577] exit_to_user_mode_prepare+0x76/0xa0 [ 525.803973][T14577] syscall_exit_to_user_mode+0x1d/0x40 [ 525.809517][T14577] do_syscall_64+0x3d/0x40 [ 525.813910][T14577] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 525.819803][T14577] RIP: 0033:0x7f36a7746749 [ 525.824192][T14577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 525.843769][T14577] RSP: 002b:00007f36a61ae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 525.852154][T14577] RAX: 0000000000000000 RBX: 00007f36a799cfa0 RCX: 00007f36a7746749 [ 525.860099][T14577] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 525.868128][T14577] RBP: 00007f36a61ae090 R08: 0000000000000000 R09: 0000000000000000 [ 525.876075][T14577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 525.884026][T14577] R13: 00007f36a799d038 R14: 00007f36a799cfa0 R15: 00007ffea1b1a818 [ 526.917836][T14609] device syzkaller0 entered promiscuous mode [ 527.160423][T14617] FAULT_INJECTION: forcing a failure. [ 527.160423][T14617] name failslab, interval 1, probability 0, space 0, times 0 [ 527.229668][T14617] CPU: 1 PID: 14617 Comm: syz.2.4545 Tainted: G W syzkaller #0 [ 527.238544][T14617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 527.248641][T14617] Call Trace: [ 527.251926][T14617] __dump_stack+0x21/0x24 [ 527.256241][T14617] dump_stack_lvl+0x169/0x1d8 [ 527.260900][T14617] ? thaw_kernel_threads+0x220/0x220 [ 527.266273][T14617] ? skb_put+0x10e/0x1f0 [ 527.270524][T14617] ? show_regs_print_info+0x18/0x18 [ 527.275722][T14617] ? nla_put+0x142/0x1f0 [ 527.279955][T14617] ? skb_trim+0x8d/0x1a0 [ 527.284232][T14617] dump_stack+0x15/0x1c [ 527.288377][T14617] should_fail+0x3c1/0x510 [ 527.292784][T14617] ? netlink_trim+0x193/0x230 [ 527.297444][T14617] __should_failslab+0xa4/0xe0 [ 527.302189][T14617] should_failslab+0x9/0x20 [ 527.306678][T14617] __kmalloc_track_caller+0x5f/0x320 [ 527.311948][T14617] ? netlink_trim+0x193/0x230 [ 527.316698][T14617] pskb_expand_head+0x123/0x1110 [ 527.321630][T14617] netlink_trim+0x193/0x230 [ 527.326126][T14617] netlink_broadcast_filtered+0x78/0x1270 [ 527.331925][T14617] ? __kmalloc_track_caller+0x181/0x320 [ 527.337460][T14617] ? kasan_unpoison+0x67/0x90 [ 527.342131][T14617] ? __kasan_check_write+0x14/0x20 [ 527.347239][T14617] ? rtmsg_ifinfo_build_skb+0xd8/0x180 [ 527.352669][T14617] nlmsg_notify+0xed/0x1b0 [ 527.357056][T14617] rtmsg_ifinfo+0xea/0x130 [ 527.361534][T14617] dev_close_many+0x27c/0x4d0 [ 527.366203][T14617] ? __dev_open+0x4c0/0x4c0 [ 527.370712][T14617] ? prepare_to_wait_event+0x306/0x410 [ 527.376153][T14617] ? __kasan_check_read+0x11/0x20 [ 527.381163][T14617] unregister_netdevice_many+0x44c/0x1980 [ 527.386869][T14617] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 527.392350][T14617] ? _raw_spin_lock+0xe0/0xe0 [ 527.397036][T14617] ? alloc_netdev_mqs+0xc80/0xc80 [ 527.402073][T14617] ? rcu_exp_handler+0x370/0x370 [ 527.407019][T14617] ? __kasan_check_read+0x11/0x20 [ 527.412058][T14617] unregister_netdevice_queue+0x31c/0x360 [ 527.417791][T14617] ? linkwatch_urgent_event+0x3a0/0x4a0 [ 527.423359][T14617] ? list_netdevice+0x4c0/0x4c0 [ 527.428207][T14617] ? linkwatch_fire_event+0x2d3/0x330 [ 527.433580][T14617] __tun_detach+0xca6/0x1450 [ 527.438168][T14617] ? tun_chr_open+0x540/0x540 [ 527.442864][T14617] tun_chr_close+0x92/0x140 [ 527.447374][T14617] __fput+0x2fb/0x770 [ 527.451360][T14617] ____fput+0x15/0x20 [ 527.455342][T14617] task_work_run+0x127/0x190 [ 527.459930][T14617] exit_to_user_mode_loop+0xcb/0xe0 [ 527.465122][T14617] exit_to_user_mode_prepare+0x76/0xa0 [ 527.470575][T14617] syscall_exit_to_user_mode+0x1d/0x40 [ 527.476047][T14617] do_syscall_64+0x3d/0x40 [ 527.480466][T14617] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 527.486357][T14617] RIP: 0033:0x7f36a7746749 [ 527.490769][T14617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 527.510474][T14617] RSP: 002b:00007f36a61ae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 527.518972][T14617] RAX: 0000000000000000 RBX: 00007f36a799cfa0 RCX: 00007f36a7746749 [ 527.527117][T14617] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 527.535435][T14617] RBP: 00007f36a61ae090 R08: 0000000000000000 R09: 0000000000000000 [ 527.543419][T14617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 527.551388][T14617] R13: 00007f36a799d038 R14: 00007f36a799cfa0 R15: 00007ffea1b1a818 [ 527.693939][T14610] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.719287][T14610] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.727924][T14610] device bridge_slave_0 entered promiscuous mode [ 527.745391][T14610] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.752637][T14610] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.760153][T14610] device bridge_slave_1 entered promiscuous mode [ 527.851673][T14610] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.858773][T14610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 527.866066][T14610] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.873092][T14610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 528.493586][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.560549][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.632918][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 528.670303][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 528.721702][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 528.749949][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 528.777980][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.785077][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 528.844215][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 528.892720][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 528.921668][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.928942][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 529.066217][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 529.101918][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 529.169467][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 529.247680][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 529.345686][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 529.362682][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 529.385098][T14610] device veth0_vlan entered promiscuous mode [ 529.430926][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 529.440462][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 529.460979][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 529.470887][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 529.512369][T14669] FAULT_INJECTION: forcing a failure. [ 529.512369][T14669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 529.525497][T14669] CPU: 1 PID: 14669 Comm: syz.0.4559 Tainted: G W syzkaller #0 [ 529.534327][T14669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 529.544370][T14669] Call Trace: [ 529.547647][T14669] __dump_stack+0x21/0x24 [ 529.551945][T14669] dump_stack_lvl+0x169/0x1d8 [ 529.556607][T14669] ? thaw_kernel_threads+0x220/0x220 [ 529.561862][T14669] ? show_regs_print_info+0x18/0x18 [ 529.567065][T14669] ? __update_load_avg_cfs_rq+0xaf/0x2f0 [ 529.572678][T14669] dump_stack+0x15/0x1c [ 529.576805][T14669] should_fail+0x3c1/0x510 [ 529.581188][T14669] should_fail_usercopy+0x1a/0x20 [ 529.586180][T14669] strncpy_from_user+0x24/0x2e0 [ 529.591019][T14669] ? update_load_avg+0x4dc/0x14f0 [ 529.596058][T14669] strncpy_from_user_nofault+0x73/0x150 [ 529.601581][T14669] bpf_probe_read_user_str+0x2a/0x70 [ 529.606840][T14669] bpf_prog_bc7c5c6b9645592f+0x35/0x4b8 [ 529.612358][T14669] bpf_trace_run3+0xcb/0x230 [ 529.616917][T14669] ? bpf_trace_run2+0x200/0x200 [ 529.621739][T14669] ? __this_cpu_preempt_check+0x13/0x20 [ 529.627294][T14669] ? tracing_record_taskinfo_sched_switch+0x80/0x3a0 [ 529.633939][T14669] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 529.640406][T14669] __bpf_trace_sched_switch+0xb/0x10 [ 529.645677][T14669] __traceiter_sched_switch+0x85/0xc0 [ 529.651027][T14669] __schedule+0x10a2/0x1310 [ 529.655498][T14669] ? release_firmware_map_entry+0x18d/0x18d [ 529.661361][T14669] ? prepare_to_wait_event+0x306/0x410 [ 529.666788][T14669] schedule+0x13c/0x1d0 [ 529.670912][T14669] synchronize_rcu_expedited+0x474/0x5e0 [ 529.676509][T14669] ? synchronize_rcu+0x110/0x110 [ 529.681417][T14669] ? __kasan_check_write+0x14/0x20 [ 529.686641][T14669] ? _raw_spin_lock+0x8e/0xe0 [ 529.691402][T14669] ? _raw_spin_trylock_bh+0x130/0x130 [ 529.696754][T14669] ? rcu_exp_handler+0x370/0x370 [ 529.701660][T14669] ? __mutex_lock+0x853/0xc50 [ 529.706309][T14669] ? fput_many+0xe7/0x1a0 [ 529.710695][T14669] ? fput+0x1a/0x20 [ 529.714474][T14669] ? io_schedule+0xe0/0xe0 [ 529.718862][T14669] ? __kasan_check_read+0x11/0x20 [ 529.723869][T14669] synchronize_net+0x28/0x40 [ 529.728435][T14669] __tun_detach+0x774/0x1450 [ 529.732995][T14669] ? mutex_trylock+0xa0/0xa0 [ 529.737553][T14669] ? tun_chr_open+0x540/0x540 [ 529.742209][T14669] tun_chr_close+0x92/0x140 [ 529.746681][T14669] __fput+0x2fb/0x770 [ 529.750630][T14669] ____fput+0x15/0x20 [ 529.754604][T14669] task_work_run+0x127/0x190 [ 529.759166][T14669] exit_to_user_mode_loop+0xcb/0xe0 [ 529.764343][T14669] exit_to_user_mode_prepare+0x76/0xa0 [ 529.769784][T14669] syscall_exit_to_user_mode+0x1d/0x40 [ 529.775209][T14669] do_syscall_64+0x3d/0x40 [ 529.779593][T14669] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 529.785449][T14669] RIP: 0033:0x7f27abbac749 [ 529.789836][T14669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 529.809581][T14669] RSP: 002b:00007f27aa614038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 529.818053][T14669] RAX: 0000000000000000 RBX: 00007f27abe02fa0 RCX: 00007f27abbac749 [ 529.826099][T14669] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 529.834039][T14669] RBP: 00007f27aa614090 R08: 0000000000000000 R09: 0000000000000000 [ 529.842023][T14669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 529.849983][T14669] R13: 00007f27abe03038 R14: 00007f27abe02fa0 R15: 00007ffff4999358 [ 529.866709][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 529.878419][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 529.896958][T14610] device veth1_macvtap entered promiscuous mode [ 529.905626][ T9662] device veth0_to_team left promiscuous mode [ 529.912393][ T9662] Ÿë: port 1(veth0_to_team) entered disabled state [ 529.929594][ T9662] device bridge_slave_1 left promiscuous mode [ 529.943786][ T9662] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.961385][ T9662] device bridge_slave_0 left promiscuous mode [ 529.971181][ T9662] bridge0: port 1(bridge_slave_0) entered disabled state [ 529.991962][ T9662] device veth0_vlan left promiscuous mode [ 530.216596][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 530.232939][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 530.350634][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 530.363671][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 531.044565][T14695] device syzkaller0 entered promiscuous mode [ 531.739266][T14711] device syzkaller0 entered promiscuous mode [ 531.843923][T14713] FAULT_INJECTION: forcing a failure. [ 531.843923][T14713] name failslab, interval 1, probability 0, space 0, times 0 [ 531.856579][T14713] CPU: 1 PID: 14713 Comm: syz.0.4571 Tainted: G W syzkaller #0 [ 531.865421][T14713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 531.875567][T14713] Call Trace: [ 531.878858][T14713] __dump_stack+0x21/0x24 [ 531.883198][T14713] dump_stack_lvl+0x169/0x1d8 [ 531.887869][T14713] ? thaw_kernel_threads+0x220/0x220 [ 531.893245][T14713] ? show_regs_print_info+0x18/0x18 [ 531.898440][T14713] ? stack_trace_save+0x98/0xe0 [ 531.903282][T14713] dump_stack+0x15/0x1c [ 531.907433][T14713] should_fail+0x3c1/0x510 [ 531.911942][T14713] ? __alloc_skb+0x9e/0x520 [ 531.916431][T14713] __should_failslab+0xa4/0xe0 [ 531.921258][T14713] should_failslab+0x9/0x20 [ 531.925739][T14713] kmem_cache_alloc+0x3d/0x2e0 [ 531.930486][T14713] ? find_next_bit+0xc9/0x100 [ 531.935140][T14713] ? cpumask_next+0x12/0x30 [ 531.939705][T14713] __alloc_skb+0x9e/0x520 [ 531.944012][T14713] inet6_rt_notify+0x287/0x470 [ 531.948750][T14713] ? rt6_nh_dump_exceptions+0x690/0x690 [ 531.954274][T14713] fib6_del+0xbf9/0xf60 [ 531.958409][T14713] ? fib6_locate+0x460/0x460 [ 531.962975][T14713] ? update_load_avg+0x4dc/0x14f0 [ 531.967984][T14713] ? fib6_ifdown+0x2eb/0x4e0 [ 531.972547][T14713] fib6_clean_node+0x296/0x520 [ 531.977287][T14713] ? node_free_rcu+0x30/0x30 [ 531.981855][T14713] fib6_walk_continue+0x4fc/0x700 [ 531.986857][T14713] fib6_walk+0x153/0x290 [ 531.991117][T14713] fib6_clean_all+0x16a/0x230 [ 531.995857][T14713] ? tracing_record_taskinfo+0x7c/0x220 [ 532.001390][T14713] ? rt6_sync_down_dev+0x130/0x130 [ 532.006480][T14713] ? fib6_del+0xf60/0xf60 [ 532.010782][T14713] ? node_free_rcu+0x30/0x30 [ 532.015345][T14713] ? rt6_sync_down_dev+0x130/0x130 [ 532.020544][T14713] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 532.026355][T14713] rt6_disable_ip+0x119/0x6a0 [ 532.031057][T14713] ? wake_up_process+0x10/0x20 [ 532.035811][T14713] ? insert_work+0x282/0x310 [ 532.040381][T14713] ? __queue_work+0x951/0xca0 [ 532.045036][T14713] ? fib6_ifdown+0x4e0/0x4e0 [ 532.049606][T14713] ? __kasan_check_read+0x11/0x20 [ 532.054714][T14713] addrconf_ifdown+0x144/0x1800 [ 532.059567][T14713] ? addrconf_cleanup+0x1c0/0x1c0 [ 532.064597][T14713] ? __kasan_check_write+0x14/0x20 [ 532.069697][T14713] ? mutex_lock+0x8c/0xe0 [ 532.074005][T14713] ? mutex_trylock+0xa0/0xa0 [ 532.078583][T14713] ? nf_nat_masq_schedule+0x490/0x490 [ 532.084027][T14713] ? __kasan_check_write+0x14/0x20 [ 532.089248][T14713] addrconf_notify+0x3bd/0xe90 [ 532.094284][T14713] raw_notifier_call_chain+0x90/0x100 [ 532.099642][T14713] dev_close_many+0x330/0x4d0 [ 532.104306][T14713] ? __dev_open+0x4c0/0x4c0 [ 532.108825][T14713] ? __kasan_check_read+0x11/0x20 [ 532.113933][T14713] unregister_netdevice_many+0x44c/0x1980 [ 532.119642][T14713] ? kmem_cache_free+0x100/0x2d0 [ 532.124598][T14713] ? ____kasan_slab_free+0x130/0x160 [ 532.129902][T14713] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 532.135362][T14713] ? _raw_spin_lock+0xe0/0xe0 [ 532.140026][T14713] ? alloc_netdev_mqs+0xc80/0xc80 [ 532.145036][T14713] ? kfree_skbmem+0x10c/0x180 [ 532.149702][T14713] ? __kasan_check_read+0x11/0x20 [ 532.154711][T14713] unregister_netdevice_queue+0x31c/0x360 [ 532.160410][T14713] ? linkwatch_urgent_event+0x3a0/0x4a0 [ 532.166043][T14713] ? list_netdevice+0x4c0/0x4c0 [ 532.170875][T14713] ? linkwatch_fire_event+0x2d3/0x330 [ 532.176245][T14713] __tun_detach+0xca6/0x1450 [ 532.180819][T14713] ? tun_chr_open+0x540/0x540 [ 532.185467][T14713] tun_chr_close+0x92/0x140 [ 532.189951][T14713] __fput+0x2fb/0x770 [ 532.193910][T14713] ____fput+0x15/0x20 [ 532.197911][T14713] task_work_run+0x127/0x190 [ 532.202479][T14713] exit_to_user_mode_loop+0xcb/0xe0 [ 532.207650][T14713] exit_to_user_mode_prepare+0x76/0xa0 [ 532.213107][T14713] syscall_exit_to_user_mode+0x1d/0x40 [ 532.218545][T14713] do_syscall_64+0x3d/0x40 [ 532.222936][T14713] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 532.228802][T14713] RIP: 0033:0x7f27abbac749 [ 532.233194][T14713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 532.252780][T14713] RSP: 002b:00007f27aa614038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 532.261330][T14713] RAX: 0000000000000000 RBX: 00007f27abe02fa0 RCX: 00007f27abbac749 [ 532.269295][T14713] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 532.277246][T14713] RBP: 00007f27aa614090 R08: 0000000000000000 R09: 0000000000000000 [ 532.285215][T14713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 532.293263][T14713] R13: 00007f27abe03038 R14: 00007f27abe02fa0 R15: 00007ffff4999358 [ 535.200998][T14787] device veth0_vlan left promiscuous mode [ 535.207395][T14787] device veth0_vlan entered promiscuous mode [ 536.189787][T14815] device pim6reg1 entered promiscuous mode [ 538.300735][T14894] device syzkaller0 entered promiscuous mode [ 538.488298][T14897] device syzkaller0 left promiscuous mode [ 539.590590][T14910] device veth0_vlan left promiscuous mode [ 539.597239][T14910] device veth0_vlan entered promiscuous mode [ 539.809221][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 539.834069][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 539.878355][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 542.822653][T14989] syz.1.4653[14989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.822749][T14989] syz.1.4653[14989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.970007][T15092] device syzkaller0 entered promiscuous mode [ 546.123767][T15106] device sit0 entered promiscuous mode [ 546.827490][T15123] device pim6reg1 entered promiscuous mode [ 547.845979][T15186] device pim6reg1 entered promiscuous mode [ 547.939614][T15190] syz.1.4714[15190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 547.939675][T15190] syz.1.4714[15190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 547.939813][T15191] syz.1.4714[15191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 547.968890][T15192] syz.1.4714[15192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 548.007854][T15191] syz.1.4714[15191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 549.252966][T15252] device pim6reg1 entered promiscuous mode [ 550.454227][T15282] device syzkaller0 entered promiscuous mode [ 550.747771][T15286] device syzkaller0 entered promiscuous mode [ 550.855659][T15289] device pim6reg1 entered promiscuous mode [ 551.337701][T15329] device pim6reg1 entered promiscuous mode [ 551.405273][T15331] device pim6reg1 entered promiscuous mode [ 552.049199][T15356] device pim6reg1 entered promiscuous mode [ 552.633190][T15362] device veth0_vlan left promiscuous mode [ 552.698425][T15362] device veth0_vlan entered promiscuous mode [ 552.827197][T15364] device veth0_vlan left promiscuous mode [ 552.944681][T15364] device veth0_vlan entered promiscuous mode [ 553.127255][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 553.163023][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 553.269542][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 553.335189][T15379] device pim6reg1 entered promiscuous mode [ 554.671811][T15424] device pim6reg1 entered promiscuous mode [ 554.831001][T15432] device pim6reg1 entered promiscuous mode [ 555.867730][T15459] device pim6reg1 entered promiscuous mode [ 555.974319][T15469] syz.4.4798[15469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.974364][T15469] syz.4.4798[15469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.021778][T15541] syzkaller0: create flow: hash 1266898539 index 0 [ 557.077954][T15539] device syzkaller0 entered promiscuous mode [ 557.087968][ T286] syzkaller0: tun_net_xmit 48 [ 557.127090][T15548] device pim6reg1 entered promiscuous mode [ 557.174449][T15541] syzkaller0 (unregistered): delete flow: hash 1266898539 index 0 [ 559.766414][T15641] device pim6reg1 entered promiscuous mode [ 559.908859][T15657] device sit0 entered promiscuous mode [ 560.924120][T15700] device pim6reg1 entered promiscuous mode [ 561.050150][T15707] bridge0: port 2(bridge_slave_1) entered disabled state [ 561.062318][T15707] bridge0: port 1(bridge_slave_0) entered disabled state [ 561.351943][T15715] device bridge_slave_1 left promiscuous mode [ 561.358247][T15715] bridge0: port 2(bridge_slave_1) entered disabled state [ 561.366001][T15715] device bridge_slave_0 left promiscuous mode [ 561.372388][T15715] bridge0: port 1(bridge_slave_0) entered disabled state [ 561.859401][T15755] device pim6reg1 entered promiscuous mode [ 562.113958][T15770] device pim6reg1 entered promiscuous mode [ 563.378699][T15827] device sit0 left promiscuous mode [ 563.441806][T15827] device sit0 entered promiscuous mode [ 564.824322][T15893] syz.3.4930[15893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 564.824376][T15893] syz.3.4930[15893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 565.064024][T15880] device syzkaller0 entered promiscuous mode [ 565.169711][T15902] device wg2 entered promiscuous mode [ 565.237779][T15918] device syzkaller0 entered promiscuous mode [ 565.487879][T15931] device veth0_vlan left promiscuous mode [ 565.511623][T15931] device veth0_vlan entered promiscuous mode [ 566.365855][T15964] device syzkaller0 entered promiscuous mode [ 566.522233][T15963] device pim6reg1 entered promiscuous mode [ 566.736839][T15971] device pim6reg1 entered promiscuous mode [ 567.976274][T16016] ÿÿÿÿÿÿ: renamed from vlan1 [ 568.093923][T16029] device pim6reg1 entered promiscuous mode [ 568.634126][T16047] device pim6reg1 entered promiscuous mode [ 569.175538][T16071] device pim6reg1 entered promiscuous mode [ 570.507372][T16098] device wg2 entered promiscuous mode [ 570.617755][T16102] device veth0_vlan left promiscuous mode [ 570.773341][T16102] device veth0_vlan entered promiscuous mode [ 571.071422][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 571.091188][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 571.111390][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 571.296199][T16114] device pim6reg1 entered promiscuous mode [ 571.476672][T16118] device wg2 left promiscuous mode [ 571.646798][T16118] device wg2 entered promiscuous mode [ 572.871657][T16141] device syzkaller0 entered promiscuous mode [ 573.059168][T16150] syz.4.5010[16150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.059389][T16150] syz.4.5010[16150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.245978][T16158] device syzkaller0 entered promiscuous mode [ 573.934955][T16178] device syzkaller0 entered promiscuous mode [ 574.893160][T16217] device syzkaller0 entered promiscuous mode [ 575.545459][T16258] device syzkaller0 entered promiscuous mode [ 575.717079][T16264] device wg2 left promiscuous mode [ 576.809721][T16293] device syzkaller0 entered promiscuous mode [ 576.826779][T16296] FAULT_INJECTION: forcing a failure. [ 576.826779][T16296] name failslab, interval 1, probability 0, space 0, times 0 [ 576.839427][T16296] CPU: 1 PID: 16296 Comm: syz.0.5056 Tainted: G W syzkaller #0 [ 576.848261][T16296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 576.858308][T16296] Call Trace: [ 576.861593][T16296] __dump_stack+0x21/0x24 [ 576.865911][T16296] dump_stack_lvl+0x169/0x1d8 [ 576.870580][T16296] ? show_regs_print_info+0x18/0x18 [ 576.875775][T16296] dump_stack+0x15/0x1c [ 576.880003][T16296] should_fail+0x3c1/0x510 [ 576.884463][T16296] ? __alloc_skb+0x9e/0x520 [ 576.888959][T16296] __should_failslab+0xa4/0xe0 [ 576.893718][T16296] should_failslab+0x9/0x20 [ 576.898219][T16296] kmem_cache_alloc+0x3d/0x2e0 [ 576.902982][T16296] ? unwind_get_return_address+0x4d/0x90 [ 576.908620][T16296] __alloc_skb+0x9e/0x520 [ 576.912985][T16296] ? __kasan_check_write+0x14/0x20 [ 576.918098][T16296] __napi_alloc_skb+0x158/0x2e0 [ 576.923029][T16296] napi_get_frags+0x6b/0x170 [ 576.927610][T16296] tun_get_user+0xa2c/0x3090 [ 576.932194][T16296] ? ____kasan_slab_free+0x125/0x160 [ 576.937471][T16296] ? __kasan_slab_free+0x11/0x20 [ 576.942404][T16296] ? putname+0xfe/0x150 [ 576.946601][T16296] ? __x64_sys_openat+0x136/0x160 [ 576.951817][T16296] ? tun_do_read+0x1c00/0x1c00 [ 576.956676][T16296] ? kstrtouint_from_user+0x1a0/0x200 [ 576.962134][T16296] ? __fsnotify_parent+0x5f5/0x6c0 [ 576.967233][T16296] ? avc_policy_seqno+0x1b/0x70 [ 576.972074][T16296] ? selinux_file_permission+0x2a5/0x510 [ 576.977700][T16296] ? fsnotify_perm+0x66/0x4b0 [ 576.982368][T16296] tun_chr_write_iter+0x1bf/0x270 [ 576.987365][T16296] vfs_write+0x725/0xd60 [ 576.991581][T16296] ? kernel_write+0x3c0/0x3c0 [ 576.996232][T16296] ? __fget_files+0x2c4/0x320 [ 577.000878][T16296] ? __fdget_pos+0x1f7/0x380 [ 577.005442][T16296] ? ksys_write+0x71/0x240 [ 577.009914][T16296] ksys_write+0x140/0x240 [ 577.014300][T16296] ? __ia32_sys_read+0x90/0x90 [ 577.019036][T16296] ? debug_smp_processor_id+0x17/0x20 [ 577.024468][T16296] __x64_sys_write+0x7b/0x90 [ 577.029042][T16296] do_syscall_64+0x31/0x40 [ 577.033448][T16296] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 577.039318][T16296] RIP: 0033:0x7f27abbac749 [ 577.043712][T16296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 577.063473][T16296] RSP: 002b:00007f27aa5f3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 577.071864][T16296] RAX: ffffffffffffffda RBX: 00007f27abe03090 RCX: 00007f27abbac749 [ 577.079818][T16296] RDX: 000000000000fdef RSI: 0000200000000380 RDI: 0000000000000006 [ 577.087789][T16296] RBP: 00007f27aa5f3090 R08: 0000000000000000 R09: 0000000000000000 [ 577.095736][T16296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 577.103684][T16296] R13: 00007f27abe03128 R14: 00007f27abe03090 R15: 00007ffff4999358 [ 577.236858][T16304] device pim6reg1 entered promiscuous mode [ 578.608604][T16344] device pim6reg1 entered promiscuous mode [ 579.123062][T16351] device veth0_vlan left promiscuous mode [ 579.129165][T16351] device veth0_vlan entered promiscuous mode [ 579.148994][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 579.201444][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 579.218177][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 580.402114][T16377] device pim6reg1 entered promiscuous mode [ 580.688681][T16394] device pim6reg1 entered promiscuous mode [ 581.607002][T16422] device pim6reg1 entered promiscuous mode [ 582.868364][T16468] device pim6reg1 entered promiscuous mode [ 584.134182][T16522] : renamed from pim6reg1 [ 585.417686][T16553] device pim6reg1 entered promiscuous mode [ 585.716532][T16564] device syzkaller0 entered promiscuous mode [ 586.038458][T16572] device syzkaller0 entered promiscuous mode [ 586.497344][T16622] device pim6reg1 entered promiscuous mode [ 586.833490][T16626] device sit0 left promiscuous mode [ 588.049101][T16684] device veth0_vlan left promiscuous mode [ 588.195153][T16684] device veth0_vlan entered promiscuous mode [ 588.656559][T16693] device pim6reg1 entered promiscuous mode [ 588.791426][T16701] device pim6reg1 entered promiscuous mode [ 589.987288][T16726] device pim6reg1 entered promiscuous mode [ 590.026376][T16729] FAULT_INJECTION: forcing a failure. [ 590.026376][T16729] name failslab, interval 1, probability 0, space 0, times 0 [ 590.052279][T16729] CPU: 1 PID: 16729 Comm: syz.1.5197 Tainted: G W syzkaller #0 [ 590.061140][T16729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 590.071177][T16729] Call Trace: [ 590.074451][T16729] __dump_stack+0x21/0x24 [ 590.078765][T16729] dump_stack_lvl+0x169/0x1d8 [ 590.083414][T16729] ? thaw_kernel_threads+0x220/0x220 [ 590.088758][T16729] ? show_regs_print_info+0x18/0x18 [ 590.093936][T16729] ? stack_trace_save+0x98/0xe0 [ 590.098759][T16729] ? stack_trace_snprint+0xf0/0xf0 [ 590.103844][T16729] dump_stack+0x15/0x1c [ 590.107976][T16729] should_fail+0x3c1/0x510 [ 590.112366][T16729] ? dup_task_struct+0x57/0xbd0 [ 590.117194][T16729] __should_failslab+0xa4/0xe0 [ 590.121937][T16729] should_failslab+0x9/0x20 [ 590.126505][T16729] kmem_cache_alloc+0x3d/0x2e0 [ 590.131243][T16729] dup_task_struct+0x57/0xbd0 [ 590.135891][T16729] ? __kasan_check_write+0x14/0x20 [ 590.140975][T16729] ? recalc_sigpending+0x1ac/0x230 [ 590.146061][T16729] copy_process+0x5b2/0x32c0 [ 590.150622][T16729] ? memset+0x35/0x40 [ 590.154579][T16729] ? proc_fail_nth_read+0x210/0x210 [ 590.159749][T16729] ? __pidfd_prepare+0x150/0x150 [ 590.164665][T16729] ? rw_verify_area+0x1c0/0x360 [ 590.169497][T16729] ? vfs_write+0xac8/0xd60 [ 590.173919][T16729] ? __kasan_slab_free+0x11/0x20 [ 590.178838][T16729] kernel_clone+0x23f/0x940 [ 590.183318][T16729] ? kernel_write+0x3c0/0x3c0 [ 590.187983][T16729] ? create_io_thread+0x130/0x130 [ 590.192986][T16729] ? mutex_lock+0x8c/0xe0 [ 590.197292][T16729] __x64_sys_clone+0x176/0x1d0 [ 590.202029][T16729] ? __ia32_sys_vfork+0xf0/0xf0 [ 590.206854][T16729] ? ksys_write+0x1eb/0x240 [ 590.211337][T16729] ? debug_smp_processor_id+0x17/0x20 [ 590.216827][T16729] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 590.222866][T16729] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 590.228472][T16729] do_syscall_64+0x31/0x40 [ 590.232867][T16729] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 590.238740][T16729] RIP: 0033:0x7f03c73c4749 [ 590.243216][T16729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 590.262895][T16729] RSP: 002b:00007f03c5e2bfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 590.271281][T16729] RAX: ffffffffffffffda RBX: 00007f03c761afa0 RCX: 00007f03c73c4749 [ 590.279226][T16729] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000630c1000 [ 590.287171][T16729] RBP: 00007f03c5e2c090 R08: 0000000000000000 R09: 0000000000000000 [ 590.295119][T16729] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 590.303064][T16729] R13: 00007f03c761b038 R14: 00007f03c761afa0 R15: 00007ffe94b0d098 [ 590.376080][T16734] device syzkaller0 entered promiscuous mode [ 590.861802][T16760] device pim6reg1 entered promiscuous mode [ 591.225956][T16768] : renamed from veth0_vlan [ 591.994121][T16783] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 592.173870][T16783] device syzkaller0 entered promiscuous mode [ 592.206782][T16796] device pim6reg1 entered promiscuous mode [ 592.213454][T16794] device pim6reg1 entered promiscuous mode [ 593.509621][T16842] device pim6reg1 entered promiscuous mode [ 593.549571][T16844] device syzkaller0 entered promiscuous mode [ 593.685165][T16858] device veth0_vlan left promiscuous mode [ 593.691546][T16858] device veth0_vlan entered promiscuous mode [ 594.735151][T16881] device pim6reg1 entered promiscuous mode [ 594.823529][T16893] device wg2 entered promiscuous mode [ 595.884602][T16917] device wg2 left promiscuous mode [ 596.891818][T16947] device veth0_vlan left promiscuous mode [ 596.911591][T16947] device veth0_vlan entered promiscuous mode [ 598.051375][T16978] device veth0_vlan left promiscuous mode [ 598.197456][T16978] device veth0_vlan entered promiscuous mode [ 598.757781][T16999] device veth0_vlan left promiscuous mode [ 598.777375][T16999] device veth0_vlan entered promiscuous mode [ 599.132452][T17019] device pim6reg1 entered promiscuous mode [ 600.649621][T17050] device pim6reg1 entered promiscuous mode [ 602.154571][T17064] bridge0: port 3(gretap0) entered blocking state [ 602.161029][T17064] bridge0: port 3(gretap0) entered disabled state [ 602.455119][T17064] device gretap0 entered promiscuous mode [ 602.465813][T17064] bridge0: port 3(gretap0) entered blocking state [ 602.472278][T17064] bridge0: port 3(gretap0) entered forwarding state [ 604.320110][T17111] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.359065][T17111] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.381360][T17111] device bridge_slave_0 entered promiscuous mode [ 604.419344][T17111] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.435051][T17111] bridge0: port 2(bridge_slave_1) entered disabled state [ 604.449530][T17111] device bridge_slave_1 entered promiscuous mode [ 604.992856][T17111] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.999937][T17111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 605.007225][T17111] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.014341][T17111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 605.652322][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.660163][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.667762][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 605.675215][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 605.730240][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 605.738882][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 605.747354][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.754500][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.043079][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 606.051682][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 606.070310][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.077398][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 606.099370][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 606.108010][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 606.116672][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 606.125487][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 606.133915][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 606.154062][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 606.188305][T17111] device veth0_vlan entered promiscuous mode [ 606.558900][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 606.606504][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 606.785121][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 606.793161][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 606.800699][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 606.809561][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 606.829012][T17111] device veth1_macvtap entered promiscuous mode [ 607.017498][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 607.042542][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 607.527805][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 607.552600][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 612.089509][T17266] device veth0_vlan left promiscuous mode [ 612.098094][T17266] device veth0_vlan entered promiscuous mode [ 612.152272][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 612.256913][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 612.392009][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 613.227977][T17302] device pim6reg1 entered promiscuous mode [ 614.296338][T17313] device syzkaller0 entered promiscuous mode [ 617.664810][T17394] device pim6reg1 entered promiscuous mode [ 618.004733][T17415] FAULT_INJECTION: forcing a failure. [ 618.004733][T17415] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 618.018044][T17415] CPU: 1 PID: 17415 Comm: syz.3.5415 Tainted: G W syzkaller #0 [ 618.026897][T17415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 618.036936][T17415] Call Trace: [ 618.040247][T17415] __dump_stack+0x21/0x24 [ 618.044608][T17415] dump_stack_lvl+0x169/0x1d8 [ 618.049272][T17415] ? show_regs_print_info+0x18/0x18 [ 618.054448][T17415] ? vfs_write+0xac8/0xd60 [ 618.058842][T17415] dump_stack+0x15/0x1c [ 618.062978][T17415] should_fail+0x3c1/0x510 [ 618.067483][T17415] should_fail_usercopy+0x1a/0x20 [ 618.072499][T17415] _copy_from_user+0x20/0xd0 [ 618.077074][T17415] __se_sys_bpf+0x181/0x680 [ 618.081678][T17415] ? __x64_sys_bpf+0x90/0x90 [ 618.086426][T17415] ? debug_smp_processor_id+0x17/0x20 [ 618.091776][T17415] __x64_sys_bpf+0x7b/0x90 [ 618.096168][T17415] do_syscall_64+0x31/0x40 [ 618.100569][T17415] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 618.106437][T17415] RIP: 0033:0x7f8eff970749 [ 618.110831][T17415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 618.130414][T17415] RSP: 002b:00007f8efe3d8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 618.138809][T17415] RAX: ffffffffffffffda RBX: 00007f8effbc6fa0 RCX: 00007f8eff970749 [ 618.146774][T17415] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 618.154731][T17415] RBP: 00007f8efe3d8090 R08: 0000000000000000 R09: 0000000000000000 [ 618.162858][T17415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 618.170805][T17415] R13: 00007f8effbc7038 R14: 00007f8effbc6fa0 R15: 00007ffe00f8fc98 [ 618.249011][T17428] device pim6reg1 entered promiscuous mode [ 618.721928][T17445] device syzkaller0 entered promiscuous mode [ 618.802685][T17460] device veth0_vlan left promiscuous mode [ 618.810655][T17460] device veth0_vlan entered promiscuous mode [ 618.931588][T17465] device sit0 left promiscuous mode [ 618.973893][T17464] device sit0 entered promiscuous mode [ 619.226976][T17479] device pim6reg1 entered promiscuous mode [ 622.916491][T17583] device veth0_vlan left promiscuous mode [ 622.952544][T17583] device veth0_vlan entered promiscuous mode [ 623.354183][T17596] device veth0_vlan left promiscuous mode [ 623.383161][T17596] device veth0_vlan entered promiscuous mode [ 623.400680][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 623.438967][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 623.533179][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 624.413918][T17629] syz.0.5482[17629] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 624.413972][T17629] syz.0.5482[17629] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.601706][T17650] device veth0_vlan left promiscuous mode [ 625.698034][T17650] device veth0_vlan entered promiscuous mode [ 631.440327][T17761] device sit0 left promiscuous mode [ 632.157594][T17798] device pim6reg1 entered promiscuous mode [ 634.123305][T17885] device veth1_macvtap left promiscuous mode [ 634.129433][T17885] device macsec0 entered promiscuous mode [ 634.677305][T17921] syz.4.5572[17921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 634.677354][T17921] syz.4.5572[17921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 634.821873][T17932] device pim6reg1 entered promiscuous mode [ 634.861899][T17937] @0Ù: renamed from bond_slave_1 [ 635.426760][T17967] syz.3.5587[17967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.426805][T17967] syz.3.5587[17967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.454812][T17962] device sit0 entered promiscuous mode [ 635.589459][T17976] device pim6reg1 entered promiscuous mode [ 635.684943][T17986] FAULT_INJECTION: forcing a failure. [ 635.684943][T17986] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 635.764191][T17986] CPU: 0 PID: 17986 Comm: syz.3.5593 Tainted: G W syzkaller #0 [ 635.773064][T17986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 635.783111][T17986] Call Trace: [ 635.786401][T17986] __dump_stack+0x21/0x24 [ 635.790716][T17986] dump_stack_lvl+0x169/0x1d8 [ 635.795419][T17986] ? show_regs_print_info+0x18/0x18 [ 635.800614][T17986] ? __mod_memcg_state+0xbc/0x230 [ 635.805626][T17986] dump_stack+0x15/0x1c [ 635.809767][T17986] should_fail+0x3c1/0x510 [ 635.814176][T17986] should_fail_alloc_page+0x4f/0x60 [ 635.819356][T17986] __alloc_pages_nodemask+0x109/0x5f0 [ 635.824728][T17986] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 635.830343][T17986] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 635.835879][T17986] ? __mod_node_page_state+0x9e/0xd0 [ 635.841153][T17986] ? lru_cache_add+0x164/0x380 [ 635.845991][T17986] ? __lru_cache_add_inactive_or_unevictable+0x38/0x160 [ 635.853002][T17986] wp_page_copy+0x1d0/0x15d0 [ 635.857577][T17986] ? stack_trace_save+0xe0/0xe0 [ 635.862420][T17986] ? trace_spf_pte_lock+0x110/0x110 [ 635.867609][T17986] ? __set_page_owner+0x3b/0x2a0 [ 635.872573][T17986] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 635.878631][T17986] do_wp_page+0x9a6/0xc80 [ 635.883039][T17986] handle_pte_fault+0xac1/0x3750 [ 635.887965][T17986] handle_mm_fault+0xf3f/0x16a0 [ 635.892811][T17986] ? can_reuse_spf_vma+0xe0/0xe0 [ 635.897837][T17986] ? __kasan_check_write+0x14/0x20 [ 635.902937][T17986] ? down_read_trylock+0x100/0x150 [ 635.908042][T17986] ? __init_rwsem+0x1c0/0x1c0 [ 635.912716][T17986] ? find_vma+0x30/0x150 [ 635.917030][T17986] do_user_addr_fault+0x5a2/0xc80 [ 635.922052][T17986] ? do_kern_addr_fault+0x80/0x80 [ 635.927064][T17986] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 635.932513][T17986] ? _raw_spin_lock+0xe0/0xe0 [ 635.937176][T17986] exc_page_fault+0x5a/0xc0 [ 635.941671][T17986] asm_exc_page_fault+0x1e/0x30 [ 635.946565][T17986] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 635.953135][T17986] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 635.972730][T17986] RSP: 0018:ffffc90000fc7d40 EFLAGS: 00050206 [ 635.978791][T17986] RAX: ffffffff823a9001 RBX: 000000000000b161 RCX: 00000000000028e1 [ 635.986749][T17986] RDX: 000000000000b161 RSI: ffff88813d238880 RDI: 000020000000a000 [ 635.994713][T17986] RBP: ffffc90000fc7d70 R08: 0000000000000001 R09: 0000000000000000 [ 636.002670][T17986] R10: ffffed1027a4762c R11: 0000000000001628 R12: 00007ffffffff000 [ 636.010636][T17986] R13: 000020000000c8e1 R14: ffff88813d230000 R15: 0000200000001780 [ 636.018704][T17986] ? _copy_from_user+0x91/0xd0 [ 636.023463][T17986] ? _copy_to_user+0x78/0x90 [ 636.028060][T17986] map_lookup_and_delete_elem+0x409/0x530 [ 636.033769][T17986] __se_sys_bpf+0x454/0x680 [ 636.038256][T17986] ? __x64_sys_bpf+0x90/0x90 [ 636.042835][T17986] ? debug_smp_processor_id+0x17/0x20 [ 636.048191][T17986] __x64_sys_bpf+0x7b/0x90 [ 636.052590][T17986] do_syscall_64+0x31/0x40 [ 636.056995][T17986] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 636.062877][T17986] RIP: 0033:0x7f8eff970749 [ 636.067280][T17986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 636.086878][T17986] RSP: 002b:00007f8efe3d8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 636.095299][T17986] RAX: ffffffffffffffda RBX: 00007f8effbc6fa0 RCX: 00007f8eff970749 [ 636.103439][T17986] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 636.111403][T17986] RBP: 00007f8efe3d8090 R08: 0000000000000000 R09: 0000000000000000 [ 636.119362][T17986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 636.127327][T17986] R13: 00007f8effbc7038 R14: 00007f8effbc6fa0 R15: 00007ffe00f8fc98 [ 658.007707][T18042] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.014811][T18042] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.022064][T18042] device bridge_slave_0 entered promiscuous mode [ 658.030001][T18042] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.037149][T18042] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.044568][T18042] device bridge_slave_1 entered promiscuous mode [ 658.130194][T18045] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.137320][T18045] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.144854][T18045] device bridge_slave_0 entered promiscuous mode [ 658.153542][T18046] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.160559][T18046] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.167921][T18046] device bridge_slave_0 entered promiscuous mode [ 658.177049][T18044] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.184253][T18044] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.191494][T18044] device bridge_slave_0 entered promiscuous mode [ 658.198846][T18045] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.205986][T18045] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.213465][T18045] device bridge_slave_1 entered promiscuous mode [ 658.223686][T18046] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.230716][T18046] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.238142][T18046] device bridge_slave_1 entered promiscuous mode [ 658.244720][T18044] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.251748][T18044] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.259215][T18044] device bridge_slave_1 entered promiscuous mode [ 658.308405][T18043] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.315533][T18043] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.322989][T18043] device bridge_slave_0 entered promiscuous mode [ 658.337513][T18043] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.344612][T18043] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.351994][T18043] device bridge_slave_1 entered promiscuous mode [ 658.396853][T18042] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.403916][T18042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 658.411161][T18042] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.418297][T18042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.470906][T18046] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.477974][T18046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 658.485244][T18046] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.492258][T18046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.529922][T18045] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.536990][T18045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 658.544261][T18045] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.551265][T18045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.580094][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 658.587935][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 658.596351][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.604110][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.611404][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.618895][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.626358][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.654083][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 658.662571][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.669579][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 658.686022][ T9663] device bridge_slave_1 left promiscuous mode [ 658.692152][ T9663] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.699642][ T9663] device bridge_slave_0 left promiscuous mode [ 658.705865][ T9663] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.714067][ T9663] device bridge_slave_1 left promiscuous mode [ 658.720159][ T9663] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.727598][ T9663] device bridge_slave_0 left promiscuous mode [ 658.733811][ T9663] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.741792][ T9663] device veth0_vlan left promiscuous mode [ 658.747796][ T9663] device veth1_macvtap left promiscuous mode [ 658.753879][ T9663] device veth0_vlan left promiscuous mode [ 659.025209][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 659.033716][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 659.041710][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 659.050294][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.057343][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.065377][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 659.073561][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.080564][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.099075][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 659.107312][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 659.115392][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 659.124380][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 659.132349][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 659.140509][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 659.149171][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 659.172215][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 659.179674][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 659.187677][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 659.196398][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 659.205153][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.212213][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.219752][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 659.228551][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 659.236797][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.243901][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.253994][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 659.261470][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 659.274339][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 659.286673][T18042] device veth0_vlan entered promiscuous mode [ 659.297491][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 659.305668][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 659.313735][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 659.322118][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 659.331432][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.338494][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.346346][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 659.354553][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 659.362560][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 659.370808][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 659.379232][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.386269][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.394069][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 659.402553][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 659.414982][T18045] device veth0_vlan entered promiscuous mode [ 659.431952][T18042] device veth1_macvtap entered promiscuous mode [ 659.440005][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 659.448636][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 659.456219][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 659.465139][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 659.472683][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 659.480355][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 659.488540][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 659.496291][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 659.504067][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 659.512878][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 659.520986][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.528111][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.535663][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 659.544130][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 659.552416][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.559421][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.566848][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 659.575160][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 659.583378][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 659.590982][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 659.609651][T18045] device veth1_macvtap entered promiscuous mode [ 659.618974][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 659.627454][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 659.635490][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 659.648851][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 659.661764][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 659.670109][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 659.696946][T18043] device veth0_vlan entered promiscuous mode [ 659.706453][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 659.715467][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 659.723226][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 659.731148][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 659.739817][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 659.748505][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 659.757089][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 659.765775][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 659.774254][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 659.782930][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 659.790986][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 659.799432][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 659.813284][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 659.821685][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 659.839966][T18046] device veth0_vlan entered promiscuous mode [ 659.850374][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 659.859113][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 659.877980][T18046] device veth1_macvtap entered promiscuous mode [ 659.898794][T18044] device veth0_vlan entered promiscuous mode [ 659.910037][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 659.919792][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 659.927998][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 659.937428][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 659.945384][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 659.953404][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 659.960935][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 659.969602][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 659.989849][T18043] device veth1_macvtap entered promiscuous mode [ 660.011592][T18044] device veth1_macvtap entered promiscuous mode [ 660.027921][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 660.043116][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 660.063022][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 660.071870][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 660.081251][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 660.090717][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 660.106588][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 660.115061][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 660.144130][T18074] device wg2 entered promiscuous mode [ 660.153320][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 660.161733][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 660.171622][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 660.179976][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 660.188550][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 660.197272][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 662.197719][ T9663] bridge0: port 3(gretap0) entered disabled state [ 662.208748][ T9663] device gretap0 left promiscuous mode [ 662.218255][ T9663] bridge0: port 3(gretap0) entered disabled state [ 662.480381][ T9663] device bridge_slave_1 left promiscuous mode [ 662.486711][ T9663] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.494582][ T9663] device bridge_slave_0 left promiscuous mode [ 662.500817][ T9663] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.515578][ T9663] device veth1_macvtap left promiscuous mode [ 662.524218][ T9663] device veth1_macvtap left promiscuous mode [ 662.533501][ T9663] device veth0_vlan left promiscuous mode [ 662.543640][ T9663] device veth1_macvtap left promiscuous mode [ 662.550269][ T9663] device veth0_vlan left promiscuous mode [ 665.663785][T18205] device veth0_vlan left promiscuous mode [ 665.822356][T18205] device veth0_vlan entered promiscuous mode [ 666.184944][T18211] device veth0_vlan left promiscuous mode [ 666.272816][T18211] device veth0_vlan entered promiscuous mode [ 666.641751][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 666.655300][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 666.670645][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 666.830671][T18223] syz.8.5655[18223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.864677][T18223] syz.8.5655[18223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.967396][T18225] syz.7.5654[18225] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.037760][T18225] syz.7.5654[18225] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 670.874834][T18310] device veth0_vlan left promiscuous mode [ 671.091388][T18310] device veth0_vlan entered promiscuous mode [ 673.063884][T18369] device veth0_vlan left promiscuous mode [ 673.080328][T18369] device veth0_vlan entered promiscuous mode [ 673.240204][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 673.253927][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 673.269533][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 675.495245][T18438] device pim6reg1 entered promiscuous mode [ 676.208496][T18470] device pim6reg1 entered promiscuous mode [ 677.450881][T18516] device pim6reg1 entered promiscuous mode [ 677.599105][T18524] device pim6reg1 entered promiscuous mode [ 677.730023][T18524] device syzkaller0 entered promiscuous mode [ 677.897439][T18538] device pim6reg1 entered promiscuous mode [ 678.400065][T18575] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.407311][T18575] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.801678][T18593] device wg2 entered promiscuous mode [ 681.247613][T18667] syz.9.5788[18667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.247681][T18667] syz.9.5788[18667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 685.206035][T18766] device syzkaller0 entered promiscuous mode [ 685.417451][T18776] device pim6reg1 entered promiscuous mode [ 685.469388][T18783] FAULT_INJECTION: forcing a failure. [ 685.469388][T18783] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 685.486693][T18783] CPU: 1 PID: 18783 Comm: syz.6.5825 Tainted: G W syzkaller #0 [ 685.495545][T18783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 685.505676][T18783] Call Trace: [ 685.508967][T18783] __dump_stack+0x21/0x24 [ 685.513287][T18783] dump_stack_lvl+0x169/0x1d8 [ 685.517960][T18783] ? show_regs_print_info+0x18/0x18 [ 685.523149][T18783] dump_stack+0x15/0x1c [ 685.527376][T18783] should_fail+0x3c1/0x510 [ 685.531774][T18783] should_fail_usercopy+0x1a/0x20 [ 685.536783][T18783] _copy_from_user+0x20/0xd0 [ 685.541359][T18783] sock_do_ioctl+0x1b2/0x330 [ 685.545946][T18783] ? __kasan_slab_free+0x11/0x20 [ 685.550873][T18783] ? sock_show_fdinfo+0xa0/0xa0 [ 685.555714][T18783] ? selinux_file_ioctl+0x377/0x480 [ 685.560997][T18783] ? mutex_trylock+0xa0/0xa0 [ 685.565571][T18783] ? __fget_files+0x2c4/0x320 [ 685.570232][T18783] sock_ioctl+0x504/0x710 [ 685.574545][T18783] ? sock_poll+0x360/0x360 [ 685.578942][T18783] ? __fget_files+0x2c4/0x320 [ 685.583618][T18783] ? security_file_ioctl+0x84/0xa0 [ 685.588714][T18783] ? sock_poll+0x360/0x360 [ 685.593119][T18783] __se_sys_ioctl+0x121/0x1a0 [ 685.597777][T18783] __x64_sys_ioctl+0x7b/0x90 [ 685.602361][T18783] do_syscall_64+0x31/0x40 [ 685.606765][T18783] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 685.612639][T18783] RIP: 0033:0x7ffad2487749 [ 685.617042][T18783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 685.636815][T18783] RSP: 002b:00007ffad0eef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 685.645239][T18783] RAX: ffffffffffffffda RBX: 00007ffad26ddfa0 RCX: 00007ffad2487749 [ 685.653183][T18783] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000c [ 685.661129][T18783] RBP: 00007ffad0eef090 R08: 0000000000000000 R09: 0000000000000000 [ 685.669074][T18783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 685.677019][T18783] R13: 00007ffad26de038 R14: 00007ffad26ddfa0 R15: 00007ffe3e0c1178 [ 686.716445][T18824] FAULT_INJECTION: forcing a failure. [ 686.716445][T18824] name failslab, interval 1, probability 0, space 0, times 0 [ 686.751223][T18824] CPU: 0 PID: 18824 Comm: syz.9.5838 Tainted: G W syzkaller #0 [ 686.760176][T18824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 686.770306][T18824] Call Trace: [ 686.773587][T18824] __dump_stack+0x21/0x24 [ 686.777892][T18824] dump_stack_lvl+0x169/0x1d8 [ 686.782543][T18824] ? show_regs_print_info+0x18/0x18 [ 686.787757][T18824] ? avc_has_perm_noaudit+0x240/0x240 [ 686.793099][T18824] dump_stack+0x15/0x1c [ 686.797225][T18824] should_fail+0x3c1/0x510 [ 686.801790][T18824] ? qdisc_alloc+0x79/0x740 [ 686.806267][T18824] __should_failslab+0xa4/0xe0 [ 686.811009][T18824] should_failslab+0x9/0x20 [ 686.815573][T18824] __kmalloc+0x60/0x330 [ 686.819799][T18824] qdisc_alloc+0x79/0x740 [ 686.824106][T18824] ? __kasan_check_write+0x14/0x20 [ 686.829192][T18824] qdisc_create_dflt+0x6b/0x3a0 [ 686.834016][T18824] dev_activate+0x292/0x11c0 [ 686.838583][T18824] __dev_open+0x3aa/0x4c0 [ 686.842899][T18824] ? dev_open+0x230/0x230 [ 686.847212][T18824] ? _raw_spin_unlock_bh+0x51/0x60 [ 686.852385][T18824] ? dev_set_rx_mode+0x212/0x2c0 [ 686.857295][T18824] ? __kasan_check_read+0x11/0x20 [ 686.862296][T18824] __dev_change_flags+0x20a/0x6a0 [ 686.867293][T18824] ? dev_get_flags+0x1e0/0x1e0 [ 686.872031][T18824] ? selinux_capable+0x29c/0x380 [ 686.876939][T18824] ? selinux_capset+0xf0/0xf0 [ 686.881588][T18824] dev_change_flags+0x88/0x1a0 [ 686.886329][T18824] dev_ifsioc+0x113/0xa50 [ 686.890643][T18824] ? dev_ioctl+0xb80/0xb80 [ 686.895070][T18824] dev_ioctl+0x550/0xb80 [ 686.899289][T18824] sock_do_ioctl+0x235/0x330 [ 686.903862][T18824] ? __kasan_slab_free+0x11/0x20 [ 686.908770][T18824] ? sock_show_fdinfo+0xa0/0xa0 [ 686.913597][T18824] ? selinux_file_ioctl+0x377/0x480 [ 686.918859][T18824] ? mutex_trylock+0xa0/0xa0 [ 686.923429][T18824] ? __fget_files+0x2c4/0x320 [ 686.928083][T18824] sock_ioctl+0x504/0x710 [ 686.932388][T18824] ? sock_poll+0x360/0x360 [ 686.936774][T18824] ? __fget_files+0x2c4/0x320 [ 686.941427][T18824] ? security_file_ioctl+0x84/0xa0 [ 686.946514][T18824] ? sock_poll+0x360/0x360 [ 686.950904][T18824] __se_sys_ioctl+0x121/0x1a0 [ 686.955586][T18824] __x64_sys_ioctl+0x7b/0x90 [ 686.960152][T18824] do_syscall_64+0x31/0x40 [ 686.964548][T18824] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 686.970412][T18824] RIP: 0033:0x7fe1907e6749 [ 686.974803][T18824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 686.994389][T18824] RSP: 002b:00007fe18f24e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 687.002863][T18824] RAX: ffffffffffffffda RBX: 00007fe190a3cfa0 RCX: 00007fe1907e6749 [ 687.010810][T18824] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000c [ 687.018756][T18824] RBP: 00007fe18f24e090 R08: 0000000000000000 R09: 0000000000000000 [ 687.026795][T18824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 687.034741][T18824] R13: 00007fe190a3d038 R14: 00007fe190a3cfa0 R15: 00007ffde325a9a8 [ 687.046131][T18824] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 687.054098][T18824] device pim6reg1 entered promiscuous mode [ 689.088652][T18890] FAULT_INJECTION: forcing a failure. [ 689.088652][T18890] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 689.122220][T18890] CPU: 0 PID: 18890 Comm: syz.8.5857 Tainted: G W syzkaller #0 [ 689.131085][T18890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 689.141137][T18890] Call Trace: [ 689.144428][T18890] __dump_stack+0x21/0x24 [ 689.148919][T18890] dump_stack_lvl+0x169/0x1d8 [ 689.153582][T18890] ? show_regs_print_info+0x18/0x18 [ 689.158762][T18890] dump_stack+0x15/0x1c [ 689.162924][T18890] should_fail+0x3c1/0x510 [ 689.167342][T18890] should_fail_usercopy+0x1a/0x20 [ 689.172355][T18890] _copy_from_user+0x20/0xd0 [ 689.177058][T18890] sock_do_ioctl+0x1b2/0x330 [ 689.181632][T18890] ? __kasan_slab_free+0x11/0x20 [ 689.186551][T18890] ? sock_show_fdinfo+0xa0/0xa0 [ 689.191382][T18890] ? selinux_file_ioctl+0x377/0x480 [ 689.196561][T18890] ? mutex_trylock+0xa0/0xa0 [ 689.201318][T18890] ? __fget_files+0x2c4/0x320 [ 689.205990][T18890] sock_ioctl+0x504/0x710 [ 689.210388][T18890] ? sock_poll+0x360/0x360 [ 689.214786][T18890] ? __fget_files+0x2c4/0x320 [ 689.219459][T18890] ? security_file_ioctl+0x84/0xa0 [ 689.224560][T18890] ? sock_poll+0x360/0x360 [ 689.228958][T18890] __se_sys_ioctl+0x121/0x1a0 [ 689.233742][T18890] __x64_sys_ioctl+0x7b/0x90 [ 689.238395][T18890] do_syscall_64+0x31/0x40 [ 689.242804][T18890] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 689.248674][T18890] RIP: 0033:0x7ff1b7cb3749 [ 689.253077][T18890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 689.272746][T18890] RSP: 002b:00007ff1b671b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 689.281166][T18890] RAX: ffffffffffffffda RBX: 00007ff1b7f09fa0 RCX: 00007ff1b7cb3749 [ 689.289111][T18890] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000a [ 689.297055][T18890] RBP: 00007ff1b671b090 R08: 0000000000000000 R09: 0000000000000000 [ 689.305291][T18890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 689.313268][T18890] R13: 00007ff1b7f0a038 R14: 00007ff1b7f09fa0 R15: 00007fffd3ab5848 [ 689.364239][T18892] device pim6reg1 entered promiscuous mode [ 689.853218][T18930] FAULT_INJECTION: forcing a failure. [ 689.853218][T18930] name failslab, interval 1, probability 0, space 0, times 0 [ 689.922892][T18930] CPU: 0 PID: 18930 Comm: syz.9.5874 Tainted: G W syzkaller #0 [ 689.931774][T18930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 689.941836][T18930] Call Trace: [ 689.945136][T18930] __dump_stack+0x21/0x24 [ 689.949463][T18930] dump_stack_lvl+0x169/0x1d8 [ 689.954133][T18930] ? show_regs_print_info+0x18/0x18 [ 689.959346][T18930] ? avc_has_perm_noaudit+0x240/0x240 [ 689.964750][T18930] dump_stack+0x15/0x1c [ 689.968914][T18930] should_fail+0x3c1/0x510 [ 689.973329][T18930] ? qdisc_alloc+0x79/0x740 [ 689.977829][T18930] __should_failslab+0xa4/0xe0 [ 689.982698][T18930] should_failslab+0x9/0x20 [ 689.987203][T18930] __kmalloc+0x60/0x330 [ 689.991357][T18930] qdisc_alloc+0x79/0x740 [ 689.995680][T18930] ? __kasan_check_write+0x14/0x20 [ 690.000888][T18930] qdisc_create_dflt+0x6b/0x3a0 [ 690.005740][T18930] dev_activate+0x292/0x11c0 [ 690.010330][T18930] __dev_open+0x3aa/0x4c0 [ 690.014655][T18930] ? dev_open+0x230/0x230 [ 690.018984][T18930] ? _raw_spin_unlock_bh+0x51/0x60 [ 690.024097][T18930] ? dev_set_rx_mode+0x212/0x2c0 [ 690.029125][T18930] ? __kasan_check_read+0x11/0x20 [ 690.034146][T18930] __dev_change_flags+0x20a/0x6a0 [ 690.039168][T18930] ? dev_get_flags+0x1e0/0x1e0 [ 690.044040][T18930] ? selinux_capable+0x29c/0x380 [ 690.048979][T18930] ? selinux_capset+0xf0/0xf0 [ 690.053663][T18930] dev_change_flags+0x88/0x1a0 [ 690.058423][T18930] dev_ifsioc+0x113/0xa50 [ 690.062747][T18930] ? dev_ioctl+0xb80/0xb80 [ 690.067171][T18930] dev_ioctl+0x550/0xb80 [ 690.071503][T18930] sock_do_ioctl+0x235/0x330 [ 690.076100][T18930] ? __kasan_slab_free+0x11/0x20 [ 690.081042][T18930] ? sock_show_fdinfo+0xa0/0xa0 [ 690.085903][T18930] ? selinux_file_ioctl+0x377/0x480 [ 690.091109][T18930] ? mutex_trylock+0xa0/0xa0 [ 690.095689][T18930] ? __fget_files+0x2c4/0x320 [ 690.100356][T18930] sock_ioctl+0x504/0x710 [ 690.104677][T18930] ? sock_poll+0x360/0x360 [ 690.109082][T18930] ? __fget_files+0x2c4/0x320 [ 690.113837][T18930] ? security_file_ioctl+0x84/0xa0 [ 690.118937][T18930] ? sock_poll+0x360/0x360 [ 690.123354][T18930] __se_sys_ioctl+0x121/0x1a0 [ 690.128019][T18930] __x64_sys_ioctl+0x7b/0x90 [ 690.132640][T18930] do_syscall_64+0x31/0x40 [ 690.137048][T18930] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 690.142926][T18930] RIP: 0033:0x7fe1907e6749 [ 690.147331][T18930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 690.167027][T18930] RSP: 002b:00007fe18f24e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 690.175443][T18930] RAX: ffffffffffffffda RBX: 00007fe190a3cfa0 RCX: 00007fe1907e6749 [ 690.183604][T18930] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000a [ 690.191582][T18930] RBP: 00007fe18f24e090 R08: 0000000000000000 R09: 0000000000000000 [ 690.199554][T18930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 690.207532][T18930] R13: 00007fe190a3d038 R14: 00007fe190a3cfa0 R15: 00007ffde325a9a8 [ 690.228649][T18930] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 690.240913][T18930] device pim6reg1 entered promiscuous mode [ 691.444007][T18968] device wg2 left promiscuous mode [ 691.571030][T18966] device wg2 entered promiscuous mode [ 692.138444][T18985] device veth0_vlan left promiscuous mode [ 692.279840][T18985] device veth0_vlan entered promiscuous mode [ 693.365677][T19031] device pim6reg1 entered promiscuous mode [ 693.819749][T19046] device pim6reg1 entered promiscuous mode [ 693.834892][T19046] FAULT_INJECTION: forcing a failure. [ 693.834892][T19046] name failslab, interval 1, probability 0, space 0, times 0 [ 693.862043][T19046] CPU: 1 PID: 19046 Comm: syz.7.5909 Tainted: G W syzkaller #0 [ 693.870918][T19046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 693.880976][T19046] Call Trace: [ 693.884272][T19046] __dump_stack+0x21/0x24 [ 693.888594][T19046] dump_stack_lvl+0x169/0x1d8 [ 693.893261][T19046] ? show_regs_print_info+0x18/0x18 [ 693.898450][T19046] dump_stack+0x15/0x1c [ 693.902604][T19046] should_fail+0x3c1/0x510 [ 693.907017][T19046] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 693.912654][T19046] __should_failslab+0xa4/0xe0 [ 693.917496][T19046] should_failslab+0x9/0x20 [ 693.921990][T19046] __kmalloc_track_caller+0x5f/0x320 [ 693.927261][T19046] ? kmem_cache_alloc+0x165/0x2e0 [ 693.932272][T19046] ? __alloc_skb+0x9e/0x520 [ 693.936768][T19046] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 693.942222][T19046] __alloc_skb+0xdc/0x520 [ 693.946545][T19046] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 693.951913][T19046] rtmsg_ifinfo+0x7a/0x130 [ 693.956319][T19046] __dev_notify_flags+0xdb/0x500 [ 693.961246][T19046] ? __dev_change_flags+0x6a0/0x6a0 [ 693.966432][T19046] ? __dev_change_flags+0x513/0x6a0 [ 693.971708][T19046] ? dev_get_flags+0x1e0/0x1e0 [ 693.976463][T19046] ? selinux_capable+0x29c/0x380 [ 693.981391][T19046] ? selinux_capset+0xf0/0xf0 [ 693.986064][T19046] dev_change_flags+0xe8/0x1a0 [ 693.990827][T19046] dev_ifsioc+0x113/0xa50 [ 693.995146][T19046] ? dev_ioctl+0xb80/0xb80 [ 693.999641][T19046] dev_ioctl+0x550/0xb80 [ 694.003873][T19046] sock_do_ioctl+0x235/0x330 [ 694.008452][T19046] ? sock_show_fdinfo+0xa0/0xa0 [ 694.013295][T19046] ? selinux_file_ioctl+0x377/0x480 [ 694.018483][T19046] ? mutex_trylock+0xa0/0xa0 [ 694.023158][T19046] ? __fget_files+0x2c4/0x320 [ 694.027833][T19046] sock_ioctl+0x504/0x710 [ 694.032168][T19046] ? sock_poll+0x360/0x360 [ 694.036645][T19046] ? __fget_files+0x2c4/0x320 [ 694.041444][T19046] ? security_file_ioctl+0x84/0xa0 [ 694.046561][T19046] ? sock_poll+0x360/0x360 [ 694.050977][T19046] __se_sys_ioctl+0x121/0x1a0 [ 694.055646][T19046] __x64_sys_ioctl+0x7b/0x90 [ 694.060241][T19046] do_syscall_64+0x31/0x40 [ 694.064759][T19046] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 694.070653][T19046] RIP: 0033:0x7f9d0876f749 [ 694.075252][T19046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 694.094966][T19046] RSP: 002b:00007f9d071d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 694.103393][T19046] RAX: ffffffffffffffda RBX: 00007f9d089c5fa0 RCX: 00007f9d0876f749 [ 694.111384][T19046] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 000000000000000c [ 694.119355][T19046] RBP: 00007f9d071d7090 R08: 0000000000000000 R09: 0000000000000000 [ 694.127322][T19046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 694.135287][T19046] R13: 00007f9d089c6038 R14: 00007f9d089c5fa0 R15: 00007fff1bb6e858 [ 694.305705][T19056] device veth1_to_batadv entered promiscuous mode [ 695.679832][T19101] device syzkaller0 entered promiscuous mode [ 695.704615][T19112] device veth0_vlan left promiscuous mode [ 695.756314][T19112] device veth0_vlan entered promiscuous mode [ 695.992498][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 696.032672][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 696.132414][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 699.081708][T19233] device veth0_vlan left promiscuous mode [ 699.185106][T19233] device veth0_vlan entered promiscuous mode [ 699.536295][T19242] device pim6reg1 entered promiscuous mode [ 699.881798][T19268] device pim6reg1 entered promiscuous mode [ 701.567580][T19330] device syzkaller0 entered promiscuous mode [ 701.735321][ T441] syzkaller0: tun_net_xmit 48 [ 702.286932][T19349] bridge0: port 2(bridge_slave_1) entered disabled state [ 702.294462][T19349] bridge0: port 1(bridge_slave_0) entered disabled state [ 702.360245][T19355] syz.6.6000[19355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 702.360333][T19355] syz.6.6000[19355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 702.509789][T19363] device syzkaller0 entered promiscuous mode [ 707.471179][T19537] device syzkaller0 entered promiscuous mode [ 709.236608][T19641] device veth0_vlan left promiscuous mode [ 709.348265][T19641] device veth0_vlan entered promiscuous mode [ 709.427743][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 709.466410][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 709.474348][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 709.646980][T19679] device pim6reg1 entered promiscuous mode [ 712.234537][T19819] device pim6reg1 entered promiscuous mode [ 712.727212][T19861] device syzkaller0 entered promiscuous mode [ 713.056822][T19886] FAULT_INJECTION: forcing a failure. [ 713.056822][T19886] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 713.256383][T19886] CPU: 1 PID: 19886 Comm: syz.2.6177 Tainted: G W syzkaller #0 [ 713.265251][T19886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 713.275297][T19886] Call Trace: [ 713.279110][T19886] __dump_stack+0x21/0x24 [ 713.283427][T19886] dump_stack_lvl+0x169/0x1d8 [ 713.288091][T19886] ? show_regs_print_info+0x18/0x18 [ 713.293278][T19886] ? kstrtouint_from_user+0x1a0/0x200 [ 713.298646][T19886] dump_stack+0x15/0x1c [ 713.302852][T19886] should_fail+0x3c1/0x510 [ 713.307258][T19886] should_fail_usercopy+0x1a/0x20 [ 713.312274][T19886] _copy_from_user+0x20/0xd0 [ 713.316855][T19886] ___sys_recvmsg+0x129/0x4f0 [ 713.321524][T19886] ? __sys_recvmsg+0x250/0x250 [ 713.326285][T19886] ? __fdget+0x1a1/0x230 [ 713.330519][T19886] __x64_sys_recvmsg+0x1dd/0x2a0 [ 713.335440][T19886] ? fput+0x1a/0x20 [ 713.339318][T19886] ? ___sys_recvmsg+0x4f0/0x4f0 [ 713.344159][T19886] ? debug_smp_processor_id+0x17/0x20 [ 713.349525][T19886] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 713.355580][T19886] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 713.361209][T19886] do_syscall_64+0x31/0x40 [ 713.365620][T19886] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 713.371540][T19886] RIP: 0033:0x7f47a7589749 [ 713.375950][T19886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 713.395543][T19886] RSP: 002b:00007f47a5ff1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 713.404039][T19886] RAX: ffffffffffffffda RBX: 00007f47a77dffa0 RCX: 00007f47a7589749 [ 713.412089][T19886] RDX: 0000000000001f00 RSI: 0000200000000500 RDI: 0000000000000003 [ 713.420143][T19886] RBP: 00007f47a5ff1090 R08: 0000000000000000 R09: 0000000000000000 [ 713.428214][T19886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 713.436175][T19886] R13: 00007f47a77e0038 R14: 00007f47a77dffa0 R15: 00007ffe12200998 [ 713.736099][T19899] device syzkaller0 entered promiscuous mode [ 714.094134][T19931] device pim6reg1 entered promiscuous mode [ 715.338025][T19991] device pim6reg1 entered promiscuous mode [ 715.521194][T20003] FAULT_INJECTION: forcing a failure. [ 715.521194][T20003] name failslab, interval 1, probability 0, space 0, times 0 [ 715.539555][T20003] CPU: 1 PID: 20003 Comm: syz.8.6217 Tainted: G W syzkaller #0 [ 715.548426][T20003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 715.558557][T20003] Call Trace: [ 715.561852][T20003] __dump_stack+0x21/0x24 [ 715.566163][T20003] dump_stack_lvl+0x169/0x1d8 [ 715.570819][T20003] ? thaw_kernel_threads+0x220/0x220 [ 715.576078][T20003] ? show_regs_print_info+0x18/0x18 [ 715.581249][T20003] dump_stack+0x15/0x1c [ 715.585375][T20003] should_fail+0x3c1/0x510 [ 715.589788][T20003] ? bpf_map_area_alloc+0x49/0xe0 [ 715.594792][T20003] __should_failslab+0xa4/0xe0 [ 715.599629][T20003] should_failslab+0x9/0x20 [ 715.604197][T20003] __kmalloc+0x60/0x330 [ 715.608332][T20003] ? __kasan_check_write+0x14/0x20 [ 715.613417][T20003] bpf_map_area_alloc+0x49/0xe0 [ 715.618241][T20003] htab_map_alloc+0x4b6/0x970 [ 715.622893][T20003] map_create+0x44e/0x2090 [ 715.627281][T20003] __se_sys_bpf+0x203/0x680 [ 715.631754][T20003] ? __x64_sys_bpf+0x90/0x90 [ 715.636326][T20003] ? debug_smp_processor_id+0x17/0x20 [ 715.641677][T20003] __x64_sys_bpf+0x7b/0x90 [ 715.646068][T20003] do_syscall_64+0x31/0x40 [ 715.650503][T20003] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 715.656369][T20003] RIP: 0033:0x7ff1b7cb3749 [ 715.660769][T20003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 715.680350][T20003] RSP: 002b:00007ff1b671b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 715.688873][T20003] RAX: ffffffffffffffda RBX: 00007ff1b7f09fa0 RCX: 00007ff1b7cb3749 [ 715.696829][T20003] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 715.704808][T20003] RBP: 00007ff1b671b090 R08: 0000000000000000 R09: 0000000000000000 [ 715.712851][T20003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 715.721241][T20003] R13: 00007ff1b7f0a038 R14: 00007ff1b7f09fa0 R15: 00007fffd3ab5848 [ 715.745678][T20008] syz.2.6219[20008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.745730][T20008] syz.2.6219[20008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.892088][T20019] device pim6reg1 entered promiscuous mode [ 716.285930][T20036] device pim6reg1 entered promiscuous mode [ 716.705380][ T24] audit: type=1400 audit(1764024511.700:175): avc: denied { create } for pid=20053 comm="syz.9.6234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 716.964322][T20058] device veth0_vlan left promiscuous mode [ 716.979184][T20058] device veth0_vlan entered promiscuous mode [ 717.044136][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 718.227279][ T24] audit: type=1400 audit(1764024513.220:176): avc: denied { create } for pid=20150 comm="syz.7.6267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 719.717337][T20200] device syzkaller0 entered promiscuous mode [ 720.049781][T20213] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 720.093072][T20213] device syzkaller0 entered promiscuous mode [ 720.728089][T20229] device sit0 entered promiscuous mode [ 721.644223][T20275] device sit0 left promiscuous mode [ 721.881339][T20298] device syzkaller0 entered promiscuous mode [ 721.955956][T20285] cgroup: fork rejected by pids controller in /syz6 [ 722.539013][T20336] device sit0 entered promiscuous mode [ 727.287027][T20487] device pim6reg1 entered promiscuous mode [ 727.400537][T20515] syz.2.6367[20515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.400596][T20515] syz.2.6367[20515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.533087][T20527] device syzkaller0 entered promiscuous mode [ 727.792874][T20524] device wg2 entered promiscuous mode [ 727.799014][T20524] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 728.278069][T20554] device syzkaller0 entered promiscuous mode [ 732.892069][T20681] pimreg: tun_chr_ioctl cmd 2147767507 [ 733.133022][ T24] audit: type=1400 audit(1764024528.130:177): avc: denied { create } for pid=20694 comm="syz.8.6421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 733.397836][T20711] device wg2 entered promiscuous mode [ 733.445410][T20716] device syzkaller0 entered promiscuous mode [ 733.494549][T20722] device wg2 left promiscuous mode [ 733.547367][T20722] device veth0_vlan left promiscuous mode [ 733.578740][T20722] device veth0_vlan entered promiscuous mode [ 733.694573][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 733.712749][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 733.744862][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 734.731149][T20796] syz.2.6452[20796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 734.731240][T20796] syz.2.6452[20796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 735.459398][T20823] cgroup: fork rejected by pids controller in [ 735.562712][T20825] device syzkaller0 entered promiscuous mode [ 735.668248][T20823] /syz2 [ 735.793943][T20900] syz.6.6464[20900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 735.794009][T20900] syz.6.6464[20900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 735.844497][T20831] syz.6.6464[20831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 735.901738][T20831] syz.6.6464[20831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 735.960002][T20900] device wg2 entered promiscuous mode [ 736.885469][T21001] device pim6reg1 entered promiscuous mode [ 736.909760][T20978] bridge0: port 1(bridge_slave_0) entered blocking state [ 736.926703][T20978] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.033997][T20978] device bridge_slave_0 entered promiscuous mode [ 737.112629][T20978] bridge0: port 2(bridge_slave_1) entered blocking state [ 737.157606][T20978] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.195692][T20978] device bridge_slave_1 entered promiscuous mode [ 737.432045][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 737.456880][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 737.526932][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 737.544546][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 737.568671][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 737.575768][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 737.602304][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 737.617440][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 737.643832][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 737.651016][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 737.688897][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 737.777549][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 737.831367][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 737.902861][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 737.939616][T20978] device veth0_vlan entered promiscuous mode [ 737.968367][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 737.986976][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 738.062577][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 738.286337][ T296] device bridge_slave_1 left promiscuous mode [ 738.292593][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.300380][ T296] device bridge_slave_0 left promiscuous mode [ 738.306662][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.333598][ T296] device veth1_macvtap left promiscuous mode [ 738.704493][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 738.732837][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 738.764592][T20978] device veth1_macvtap entered promiscuous mode [ 738.785708][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 738.802767][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 738.841554][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 738.863292][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 738.913033][ T9662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 740.998984][T21110] bridge0: port 3(ip6gretap0) entered blocking state [ 741.055235][T21110] bridge0: port 3(ip6gretap0) entered disabled state [ 741.190805][T21110] device ip6gretap0 entered promiscuous mode [ 741.247480][T21110] bridge0: port 3(ip6gretap0) entered blocking state [ 741.254249][T21110] bridge0: port 3(ip6gretap0) entered forwarding state [ 742.867096][T21179] tap0: tun_chr_ioctl cmd 1074025677 [ 742.873079][T21179] tap0: linktype set to 776 [ 743.941708][T21229] device veth1_macvtap left promiscuous mode [ 744.214573][T21237] device veth1_macvtap entered promiscuous mode [ 744.220991][T21237] device macsec0 entered promiscuous mode [ 745.983061][T21299] device pim6reg1 entered promiscuous mode [ 746.298689][T21307] ªªªªªª: renamed from vlan0 [ 748.536385][T21388] syz.9.6604[21388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 748.536451][T21388] syz.9.6604[21388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 749.553304][T21420] device syzkaller0 entered promiscuous mode [ 750.710728][T21482] device wg2 entered promiscuous mode [ 752.846061][T21581] FAULT_INJECTION: forcing a failure. [ 752.846061][T21581] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 752.859271][T21581] CPU: 1 PID: 21581 Comm: syz.2.6665 Tainted: G W syzkaller #0 [ 752.868195][T21581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 752.878335][T21581] Call Trace: [ 752.881629][T21581] __dump_stack+0x21/0x24 [ 752.885954][T21581] dump_stack_lvl+0x169/0x1d8 [ 752.890626][T21581] ? show_regs_print_info+0x18/0x18 [ 752.895818][T21581] ? __kasan_check_write+0x14/0x20 [ 752.900924][T21581] dump_stack+0x15/0x1c [ 752.905075][T21581] should_fail+0x3c1/0x510 [ 752.909483][T21581] should_fail_usercopy+0x1a/0x20 [ 752.914679][T21581] _copy_from_user+0x20/0xd0 [ 752.919279][T21581] ip_tunnel_ioctl+0xbf/0x200 [ 752.923959][T21581] ? ip_tunnel_update+0xca0/0xca0 [ 752.928997][T21581] ? full_name_hash+0xa0/0xf0 [ 752.933673][T21581] dev_ifsioc+0x69b/0xa50 [ 752.937994][T21581] ? dev_ioctl+0xb80/0xb80 [ 752.942416][T21581] dev_ioctl+0x5ea/0xb80 [ 752.946666][T21581] sock_ioctl+0x6a0/0x710 [ 752.950994][T21581] ? sock_poll+0x360/0x360 [ 752.955493][T21581] ? __fget_files+0x2c4/0x320 [ 752.960298][T21581] ? security_file_ioctl+0x84/0xa0 [ 752.965429][T21581] ? sock_poll+0x360/0x360 [ 752.969840][T21581] __se_sys_ioctl+0x121/0x1a0 [ 752.974525][T21581] __x64_sys_ioctl+0x7b/0x90 [ 752.979107][T21581] do_syscall_64+0x31/0x40 [ 752.983517][T21581] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 752.989397][T21581] RIP: 0033:0x7f88a7836749 [ 752.993802][T21581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 753.013479][T21581] RSP: 002b:00007f88a629e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 753.021885][T21581] RAX: ffffffffffffffda RBX: 00007f88a7a8cfa0 RCX: 00007f88a7836749 [ 753.029950][T21581] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 753.037943][T21581] RBP: 00007f88a629e090 R08: 0000000000000000 R09: 0000000000000000 [ 753.045985][T21581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 753.053940][T21581] R13: 00007f88a7a8d038 R14: 00007f88a7a8cfa0 R15: 00007ffc5b7f0958 [ 753.127176][T21595] device wg2 left promiscuous mode [ 753.135443][T21595] device wg2 entered promiscuous mode [ 753.822941][T21624] FAULT_INJECTION: forcing a failure. [ 753.822941][T21624] name failslab, interval 1, probability 0, space 0, times 0 [ 753.902955][T21624] CPU: 0 PID: 21624 Comm: syz.7.6678 Tainted: G W syzkaller #0 [ 753.911841][T21624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 753.921896][T21624] Call Trace: [ 753.925180][T21624] __dump_stack+0x21/0x24 [ 753.929499][T21624] dump_stack_lvl+0x169/0x1d8 [ 753.934167][T21624] ? thaw_kernel_threads+0x220/0x220 [ 753.939438][T21624] ? fib6_clean_all+0x1cd/0x230 [ 753.944288][T21624] ? show_regs_print_info+0x18/0x18 [ 753.949480][T21624] ? rt6_sync_up+0x150/0x150 [ 753.954045][T21624] ? fib6_del+0xf60/0xf60 [ 753.958353][T21624] dump_stack+0x15/0x1c [ 753.962483][T21624] should_fail+0x3c1/0x510 [ 753.966876][T21624] ? __alloc_skb+0x9e/0x520 [ 753.971526][T21624] __should_failslab+0xa4/0xe0 [ 753.976265][T21624] should_failslab+0x9/0x20 [ 753.980832][T21624] kmem_cache_alloc+0x3d/0x2e0 [ 753.985577][T21624] __alloc_skb+0x9e/0x520 [ 753.989883][T21624] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 753.995143][T21624] rtmsg_ifinfo+0x7a/0x130 [ 753.999535][T21624] netdev_state_change+0x185/0x210 [ 754.004619][T21624] ? netdev_features_change+0x180/0x180 [ 754.010136][T21624] ? avc_has_extended_perms+0x7f0/0xc30 [ 754.015678][T21624] ip_tunnel_update+0x7bf/0xca0 [ 754.020503][T21624] ip_tunnel_ctl+0x11ac/0x1990 [ 754.025255][T21624] ipip_tunnel_ctl+0x145/0x1c0 [ 754.030250][T21624] ip_tunnel_ioctl+0x13d/0x200 [ 754.034987][T21624] ? ip_tunnel_update+0xca0/0xca0 [ 754.039985][T21624] ? full_name_hash+0xa0/0xf0 [ 754.044640][T21624] dev_ifsioc+0x69b/0xa50 [ 754.049031][T21624] ? dev_ioctl+0xb80/0xb80 [ 754.053443][T21624] dev_ioctl+0x5ea/0xb80 [ 754.057668][T21624] sock_ioctl+0x6a0/0x710 [ 754.061969][T21624] ? sock_poll+0x360/0x360 [ 754.066356][T21624] ? __fget_files+0x2c4/0x320 [ 754.071008][T21624] ? security_file_ioctl+0x84/0xa0 [ 754.076106][T21624] ? sock_poll+0x360/0x360 [ 754.080609][T21624] __se_sys_ioctl+0x121/0x1a0 [ 754.085521][T21624] __x64_sys_ioctl+0x7b/0x90 [ 754.090092][T21624] do_syscall_64+0x31/0x40 [ 754.094492][T21624] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 754.100354][T21624] RIP: 0033:0x7f9d0876f749 [ 754.104742][T21624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 754.124409][T21624] RSP: 002b:00007f9d071d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 754.132817][T21624] RAX: ffffffffffffffda RBX: 00007f9d089c5fa0 RCX: 00007f9d0876f749 [ 754.140762][T21624] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 754.148708][T21624] RBP: 00007f9d071d7090 R08: 0000000000000000 R09: 0000000000000000 [ 754.156652][T21624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 754.164597][T21624] R13: 00007f9d089c6038 R14: 00007f9d089c5fa0 R15: 00007fff1bb6e858 [ 756.679911][T21692] device sit0 entered promiscuous mode [ 756.744956][T21694] device wg2 entered promiscuous mode [ 756.751128][T21694] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 757.729676][T21728] device veth0_vlan left promiscuous mode [ 757.978425][T21728] device veth0_vlan entered promiscuous mode [ 757.998739][T21728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 758.038046][T20584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 758.052621][T20584] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 758.060394][T20584] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 760.316890][T21792] device sit0 entered promiscuous mode [ 760.339357][T21791] device veth1_macvtap left promiscuous mode [ 762.408416][T21840] device wg2 left promiscuous mode [ 762.884535][T21847] device wg2 left promiscuous mode [ 762.912661][T21848] device wg2 entered promiscuous mode [ 763.780717][T21862] device veth0_vlan left promiscuous mode [ 763.790344][T21862] device veth0_vlan entered promiscuous mode [ 763.840941][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 763.888964][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 763.897046][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 764.661934][T21913] device veth1_macvtap left promiscuous mode [ 764.668365][T21913] device macsec0 left promiscuous mode [ 764.690095][T21914] device wg2 left promiscuous mode [ 764.762563][T21913] device wg2 entered promiscuous mode [ 769.202910][ T24] audit: type=1400 audit(1764024564.200:178): avc: denied { read } for pid=22154 comm="syz.8.6841" name="cgroup.subtree_control" dev="cgroup2" ino=983 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 772.835163][T22245] device pim6reg1 entered promiscuous mode [ 772.886049][T22246] device syzkaller0 entered promiscuous mode [ 773.059840][T22256] device sit0 left promiscuous mode [ 779.421699][T22372] device syzkaller0 entered promiscuous mode [ 779.501580][T22375] device sit0 entered promiscuous mode [ 780.454051][T22413] device veth1_macvtap left promiscuous mode [ 780.461362][T22413] device macsec0 entered promiscuous mode [ 780.521699][T22418] FAULT_INJECTION: forcing a failure. [ 780.521699][T22418] name failslab, interval 1, probability 0, space 0, times 0 [ 780.542500][T22418] CPU: 0 PID: 22418 Comm: syz.6.6920 Tainted: G W syzkaller #0 [ 780.551373][T22418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 780.561425][T22418] Call Trace: [ 780.564713][T22418] __dump_stack+0x21/0x24 [ 780.569019][T22418] dump_stack_lvl+0x169/0x1d8 [ 780.573671][T22418] ? show_regs_print_info+0x18/0x18 [ 780.578847][T22418] ? rw_verify_area+0x1c0/0x360 [ 780.583672][T22418] ? expand_files+0xde/0x8e0 [ 780.588237][T22418] dump_stack+0x15/0x1c [ 780.592365][T22418] should_fail+0x3c1/0x510 [ 780.596757][T22418] ? sock_alloc_inode+0x1b/0xb0 [ 780.601583][T22418] __should_failslab+0xa4/0xe0 [ 780.606323][T22418] should_failslab+0x9/0x20 [ 780.610805][T22418] kmem_cache_alloc+0x3d/0x2e0 [ 780.615540][T22418] ? find_next_zero_bit+0x83/0x110 [ 780.620624][T22418] ? sockfs_init_fs_context+0xb0/0xb0 [ 780.625967][T22418] sock_alloc_inode+0x1b/0xb0 [ 780.630616][T22418] ? sockfs_init_fs_context+0xb0/0xb0 [ 780.635970][T22418] new_inode_pseudo+0x62/0x210 [ 780.640718][T22418] __sock_create+0x12c/0x770 [ 780.645285][T22418] ? get_unused_fd_flags+0x92/0xa0 [ 780.650377][T22418] __sys_socketpair+0x1a1/0x590 [ 780.655204][T22418] __x64_sys_socketpair+0x9b/0xb0 [ 780.660231][T22418] do_syscall_64+0x31/0x40 [ 780.664625][T22418] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 780.670487][T22418] RIP: 0033:0x7ffad2487749 [ 780.674884][T22418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 780.694466][T22418] RSP: 002b:00007ffad0eef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 780.702854][T22418] RAX: ffffffffffffffda RBX: 00007ffad26ddfa0 RCX: 00007ffad2487749 [ 780.710921][T22418] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000028 [ 780.718864][T22418] RBP: 00007ffad0eef090 R08: 0000000000000000 R09: 0000000000000000 [ 780.726813][T22418] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 780.734759][T22418] R13: 00007ffad26de038 R14: 00007ffad26ddfa0 R15: 00007ffe3e0c1178 [ 780.940834][T22418] socket: no more sockets [ 781.309619][T22446] bridge0: port 1(bridge_slave_0) entered disabled state [ 782.130175][T22479] FAULT_INJECTION: forcing a failure. [ 782.130175][T22479] name failslab, interval 1, probability 0, space 0, times 0 [ 782.162208][T22479] CPU: 1 PID: 22479 Comm: syz.8.6937 Tainted: G W syzkaller #0 [ 782.171079][T22479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 782.181337][T22479] Call Trace: [ 782.184625][T22479] __dump_stack+0x21/0x24 [ 782.188957][T22479] dump_stack_lvl+0x169/0x1d8 [ 782.193628][T22479] ? show_regs_print_info+0x18/0x18 [ 782.198843][T22479] dump_stack+0x15/0x1c [ 782.202987][T22479] should_fail+0x3c1/0x510 [ 782.207409][T22479] ? security_inode_alloc+0x33/0x110 [ 782.212705][T22479] __should_failslab+0xa4/0xe0 [ 782.217474][T22479] should_failslab+0x9/0x20 [ 782.221971][T22479] kmem_cache_alloc+0x3d/0x2e0 [ 782.226727][T22479] ? sock_alloc_inode+0x1b/0xb0 [ 782.231591][T22479] security_inode_alloc+0x33/0x110 [ 782.236705][T22479] inode_init_always+0x70a/0x9b0 [ 782.241638][T22479] new_inode_pseudo+0x91/0x210 [ 782.246533][T22479] __sock_create+0x12c/0x770 [ 782.251128][T22479] ? get_unused_fd_flags+0x92/0xa0 [ 782.256238][T22479] __sys_socketpair+0x1a1/0x590 [ 782.261092][T22479] __x64_sys_socketpair+0x9b/0xb0 [ 782.266109][T22479] do_syscall_64+0x31/0x40 [ 782.270531][T22479] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 782.276601][T22479] RIP: 0033:0x7ff1b7cb3749 [ 782.281009][T22479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 782.300617][T22479] RSP: 002b:00007ff1b671b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 782.309015][T22479] RAX: ffffffffffffffda RBX: 00007ff1b7f09fa0 RCX: 00007ff1b7cb3749 [ 782.317047][T22479] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000028 [ 782.324992][T22479] RBP: 00007ff1b671b090 R08: 0000000000000000 R09: 0000000000000000 [ 782.332955][T22479] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 782.340898][T22479] R13: 00007ff1b7f0a038 R14: 00007ff1b7f09fa0 R15: 00007fffd3ab5848 [ 782.381442][T22479] socket: no more sockets [ 782.431367][T22488] device sit0 left promiscuous mode [ 782.463070][T22484] device veth1_macvtap entered promiscuous mode [ 782.508243][T22484] device macsec0 entered promiscuous mode [ 782.569082][T22490] device wg2 left promiscuous mode [ 782.577462][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 782.589453][T22488] device sit0 entered promiscuous mode [ 783.613367][T22550] device wg2 entered promiscuous mode [ 784.598778][T22622] device sit0 left promiscuous mode [ 784.871364][T22640] device veth0_vlan left promiscuous mode [ 784.877430][T22640] device veth0_vlan entered promiscuous mode [ 784.884319][T22640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 784.893884][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 784.911572][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 784.920145][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 785.576186][T22686] device pim6reg1 entered promiscuous mode [ 785.607187][T22706] device wg2 left promiscuous mode [ 785.764242][T22706] device wg2 entered promiscuous mode [ 785.859654][T22719] device pim6reg1 entered promiscuous mode [ 786.847271][T22767] device syzkaller0 entered promiscuous mode [ 788.572464][T22895] device syzkaller0 entered promiscuous mode [ 788.620747][T22905] syz.7.7060[22905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 788.620793][T22905] syz.7.7060[22905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 788.620973][T22904] syz.7.7060[22904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 788.644246][T22904] syz.7.7060[22904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 788.727592][T22915] device sit0 entered promiscuous mode [ 788.890719][T22922] device wg2 left promiscuous mode [ 788.987679][T22928] device wg2 entered promiscuous mode [ 789.169553][T22948] ÿÿÿÿÿÿ: renamed from vlan1 [ 789.819105][T22978] syz.2.7083[22978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 789.819626][T22978] syz.2.7083[22978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 790.160963][T22991] device pim6reg1 entered promiscuous mode [ 791.200912][T23026] device syzkaller0 entered promiscuous mode [ 791.216679][T23030] device pim6reg1 entered promiscuous mode [ 791.838399][T23076] ªªªªªª: renamed from vlan0 [ 792.059373][T23097] -1: renamed from syzkaller0 [ 792.657774][ T7204] ------------[ cut here ]------------ [ 792.660895][T23134] GPL: port 1(erspan0) entered blocking state [ 792.670869][ T7204] kernel BUG at kernel/bpf/arraymap.c:993! [ 792.677971][ T7204] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 792.684053][ T7204] CPU: 1 PID: 7204 Comm: kworker/1:19 Tainted: G W syzkaller #0 [ 792.691936][T23134] GPL: port 1(erspan0) entered disabled state [ 792.692972][ T7204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 792.692992][ T7204] Workqueue: events prog_array_map_clear_deferred [ 792.693029][ T7204] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 792.693038][ T7204] Code: 95 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 95 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 95 e9 ff 0f 0b e8 c5 95 e9 ff <0f> 0b e8 be 95 e9 ff 0f 0b e8 b7 95 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 792.693044][ T7204] RSP: 0018:ffffc900014d7c18 EFLAGS: 00010293 [ 792.693053][ T7204] RAX: ffffffff817a0e7b RBX: ffff888105de6fd0 RCX: ffff888119c88000 [ 792.693059][ T7204] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 792.693075][ T7204] RBP: ffffc900014d7c98 R08: dffffc0000000000 R09: fffffbfff0c5d4e9 [ 792.771539][ T7204] R10: fffffbfff0c5d4e9 R11: 1ffffffff0c5d4e8 R12: 00000000fffffff0 [ 792.779490][ T7204] R13: ffff88810f2e4000 R14: 0000000000000001 R15: ffff88810f2e4000 [ 792.787440][ T7204] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 792.796433][ T7204] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 792.803090][ T7204] CR2: 000000110c2aeb75 CR3: 000000010ab5f000 CR4: 00000000003506a0 [ 792.811070][ T7204] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 792.819043][ T7204] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 792.826989][ T7204] Call Trace: [ 792.830277][ T7204] ? bpf_prog_6fc39095d8ed1a88+0xb/0xb2c [ 792.835898][ T7204] fd_array_map_delete_elem+0x14c/0x250 [ 792.841417][ T7204] prog_array_map_clear_deferred+0x9e/0x140 [ 792.847290][ T7204] process_one_work+0x6e1/0xba0 [ 792.852118][ T7204] worker_thread+0xa6a/0x13b0 [ 792.856779][ T7204] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 792.862226][ T7204] ? __kasan_check_read+0x11/0x20 [ 792.867230][ T7204] kthread+0x346/0x3d0 [ 792.871272][ T7204] ? worker_clr_flags+0x190/0x190 [ 792.876271][ T7204] ? kthread_blkcg+0xd0/0xd0 [ 792.880835][ T7204] ret_from_fork+0x1f/0x30 [ 792.885225][ T7204] Modules linked in: [ 792.893061][T23134] device erspan0 entered promiscuous mode [ 792.918545][T23142] GPL: port 1(erspan0) entered blocking state [ 792.924688][T23142] GPL: port 1(erspan0) entered forwarding state [ 792.934469][ T7204] ---[ end trace 83f1fe343f5191fb ]--- [ 792.939958][ T7204] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 792.947075][ T7204] Code: 95 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 95 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 95 e9 ff 0f 0b e8 c5 95 e9 ff <0f> 0b e8 be 95 e9 ff 0f 0b e8 b7 95 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 792.982155][ T7204] RSP: 0018:ffffc900014d7c18 EFLAGS: 00010293 [ 792.988317][ T7204] RAX: ffffffff817a0e7b RBX: ffff888105de6fd0 RCX: ffff888119c88000 [ 792.996318][ T7204] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 793.004463][ T7204] RBP: ffffc900014d7c98 R08: dffffc0000000000 R09: fffffbfff0c5d4e9 [ 793.014392][ T7204] R10: fffffbfff0c5d4e9 R11: 1ffffffff0c5d4e8 R12: 00000000fffffff0 [ 793.022677][ T7204] R13: ffff88810f2e4000 R14: 0000000000000001 R15: ffff88810f2e4000 [ 793.030841][ T7204] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 793.040068][ T7204] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 793.046878][ T7204] CR2: 000000110c2bff26 CR3: 000000010c8fe000 CR4: 00000000003506a0 [ 793.055026][ T7204] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 793.063189][ T7204] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 793.071221][ T7204] Kernel panic - not syncing: Fatal exception [ 793.077536][ T7204] Kernel Offset: disabled [ 793.081846][ T7204] Rebooting in 86400 seconds..