last executing test programs: 39.876358714s ago: executing program 3 (id=9532): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x5}, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8982, &(0x7f0000000080)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) syz_clone(0x62005000, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 34.19094956s ago: executing program 2 (id=9543): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df85000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x2e]}}, &(0x7f0000000380)=""/81, 0x1b, 0x51, 0x0, 0x1, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r5, 0x4004743c, 0xf0ff1f00000000) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 33.876044608s ago: executing program 1 (id=9544): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, 0x0, &(0x7f0000000180)}, 0x20) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x8, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r4, 0x18000000000002a0, 0x4f, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={0xffffffffffffffff, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], 0x0, 0x75, &(0x7f00000008c0)=[{}], 0x8, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0xc9, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000280)=""/238, 0xee}], 0x1}, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) 33.489142132s ago: executing program 3 (id=9546): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r2}, 0x10) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) write$cgroup_int(r4, &(0x7f00000001c0), 0xfffffdef) 33.06488178s ago: executing program 2 (id=9548): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000400000008"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000002}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='kyber_latency\x00', r4}, 0x18) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0)=0xe00000000000000, 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x3, 0xd41b, &(0x7f0000000500)) 32.895331545s ago: executing program 1 (id=9549): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000280)=ANY=[@ANYRESHEX], &(0x7f0000000100)='GPL\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000feffffff0000000003000000850000004100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f805ffffb702000008000006b703000003000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x336d}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) (fail_nth: 3) 32.330882095s ago: executing program 3 (id=9551): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x3fd, 0x9, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2, 0x0, 0x400000000000000}, 0x10) 32.247709252s ago: executing program 1 (id=9552): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x20600, 0x0) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000680)={'pimreg\x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000005000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000072000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESOCT=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r8}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x9, r9}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r10}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r12 = openat$cgroup_int(r11, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r12, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 31.593553301s ago: executing program 2 (id=9553): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000000000000000000ecc4b11c00000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="6ac75b9ec841bc1ab7fadecebd1412679c0428007cc42bcd531aa3b2f3537f511ddf1e769313a1c649b65433624c4892ea53ba96888116ecc4006468", 0x3c}, {&(0x7f0000000240)="93c1e16b031a71a51ac1766305e3da6fc484be213f398eef26ceabc258c3b041a334645e681f7e5ecd000e9bb7efcbd4ff5557620d24b8bae265641a428c05e36bec47060c6bf1910044e3d5387dff964ffac0b5cbed3f8803a0c51ae5a4c922c8d580367549c23206ef2b20fe0d04cd40374a77965086a567e4586f700e0d0ef94fd104cde5997274b40c8822f59d9ad1536d864f59867319", 0x99}], 0x2}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) openat$cgroup(0xffffffffffffffff, &(0x7f0000000ac0)='syz0\x00', 0x200002, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000b00)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8929, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) syz_clone(0x20000480, &(0x7f0000000b80)="4023fe94e40677620c8d12d55495bee4e28c2ea6ef47af2681f872f0f60fd41e1ff8b619bc8d1d66a505770da9ec221198b485e249abe322c5fd1e6ca525229997dc86f8ba89", 0x46, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)="a1806980dfa44d2f39f2d5749ac0d6e1d66cc13be00553618cedc4f1a83fcf442b755096373e1856b4a6c548aa1f") syz_clone(0x1000000, &(0x7f0000000cc0)="e730c9d5ab7cd44005703646ee7fac6f003db6860898635f8c514c8229e8a0bbe4781082e5003cb5f97911e68257a585dfbaf71ca84b7233a80844507bf43cbbb7d2973d88b64aea2a413e8642089e52a7d471858e76d281c5e19cc33390d318caacdfd72b9074dd19c9ee86c187dc22b3e4", 0x72, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="d3ed3e91282a81909618f3bf785301fdad4490799fbe17101c0032819bba3f9edcdd90491c3030a10dc8ff953fbd533eec5603e94dad801026746fe4e4850833613a0489c14389d56e3eaeb55553ab4dc9ed6188aedea5ec0f") r1 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, r1, 0x4, 0xffffffffffffffff, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0xc, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80000001}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x45}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r6, 0x0, 0x500000000000000}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 31.38337328s ago: executing program 1 (id=9555): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000cc0)={0x0, 0x6}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000d00)={0x1}, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000dc0)={0x0, 0x67d6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0xd, &(0x7f00000007c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfad}}], &(0x7f0000000840)='syzkaller\x00', 0xbc, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000e40)=[{0x3, 0x3, 0xc, 0xc}, {0x3, 0x2, 0xb, 0xc}, {0x3, 0x2, 0xd, 0x3}, {0x0, 0x5, 0x7, 0x1}], 0x10, 0x1fb}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x600000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) close(0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22ff892f"], 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x40047451, &(0x7f0000000180)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000006c0000006c00000006000000010000000000000c030000000500000004000006040000000f000003ff7f000010000000060000000c000000060000000c000000ff010000030000000100000e0300000001000000050000000000000800000000010000000000000b05000000070000ff0000000b04000000005f5f005f0049fe1b8ecb4328f23ea9d1b2129ef68a4a9ba2f5463b7f3656ae957e1a305e6d"], 0x0, 0x8a, 0x0, 0x0, 0x401}, 0x28) 31.356005732s ago: executing program 3 (id=9556): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000000016230000000000000000850000002000000085000000a000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000ff000000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000180)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0], 0x0, 0xab, &(0x7f0000000280)=[{}], 0x8, 0x10, &(0x7f0000000400), 0x0, 0x0, 0xd, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="85000000b20000001800000027ffffff00000000000500000000000000830000ece91af900852000010400"/52], &(0x7f00000003c0)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001400)=""/4096, 0x1f00, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff, r1, r2, r1], 0x0, 0x10, 0x1947}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000004000000000000000000073010d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') r6 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x94200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000000)='cpu&\t\t') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r8 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x7, 0x0, &(0x7f0000000300)="e02742e8680d00", 0x0, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x4, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000c00000004000000010000053b3a4b000a000000030000000000000000000000000000010500000020000000000000000000000b02000000006100302e610061610061"], 0x0, 0x58}, 0x28) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="03000000f92c136856d200000025edb708000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32=r10, @ANYBLOB="000000000500"/28], 0xfffffffffffffe5f) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r5, 0x4) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x18, 0x4, &(0x7f0000000b00)=@raw=[@alu={0x4, 0x1, 0xc, 0xa, 0x5, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000b40)='syzkaller\x00', 0x2, 0xe3, &(0x7f0000000e00)=""/227, 0x41100, 0x4, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000bc0)={0x1, 0x8, 0x3, 0x5}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000c00)=[0xffffffffffffffff, r11, r11, r1, r1, r1, r1], &(0x7f0000000f00)=[{0x4, 0x1, 0x7, 0x1}, {0x2, 0x4, 0x8, 0x9}, {0x5, 0x3, 0xd, 0x3}, {0x3, 0x2, 0x10, 0x1}], 0x10, 0x3}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003440)=@bpf_ext={0x1c, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x9}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r11}}]}, &(0x7f0000000900)='GPL\x00', 0x9, 0xd8, &(0x7f0000000940)=""/216, 0x1f00, 0xc, '\x00', 0x0, 0x0, r12, 0x8, &(0x7f0000000a80)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000ac0)={0x3, 0xe, 0x2, 0x101}, 0x10, 0xd2ad, r13, 0x2, 0x0, &(0x7f0000003400)=[{0x0, 0x5, 0x6, 0x6}, {0x5, 0x4, 0xf, 0xb}], 0x10, 0xff}, 0x94) 31.197009596s ago: executing program 1 (id=9557): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000400000008"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000002}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='kyber_latency\x00', r4}, 0x18) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0)=0xe00000000000000, 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x3, 0xd41b, &(0x7f0000000500)) 30.987200895s ago: executing program 2 (id=9559): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="61128cb00000000061134c0000000000bf20000000000000070000000f0000003d030100000000009500ffb1000000006926000000000000bf6700000000000036000b000fff52004507faff15300000d60600000ee60000bf050000000000003d63000000000000650700000200000007070000fbffffff1f75000000000000bf54000000000000070000000410f900bd430100000000009500000000000000050000000000000095000000000000001c15a3ce747c693a74b62fd0758b15f09429c09074bc4b2bd2dc480dd7a064b8673e2060162cc43bcba1060999eef9d60bb39d0af449deaa27ea949e8f9000d885deea2783835e29eba8546fc020c1966f8b5f32b095f566edf66b7751828da9dbd5b996b9e8d897e461c01c697671d100000000400036c17fb01dde179c1f26cac1c7b21bde7d1a55d6ebe700b3be005e47ef55e0dd81244b18590e000000000000356d82e43407a6d7fa94b21002f06cd247b126b6349ab62d7b07ba0a71a72145edade9941f49f300a8c8913e0e4ea9e4c77740ab3312edee62a4dc2fc85755d387d8a1bc8eb71fbe11b2216cc8d1f0160c237d929b49d828724b95555b459f4763c6222175c974be2f76fb5f330b015a68587a75c013000000000000000000000003000000000000d6ddc46e58eff8f4fbadfc6a3af8123b7f4240713a4c0cdc9d7820c4eb67cc0f8b5fe9258eeacb5776aebbab3d5c55020000006082778366dadfc36029633e0514cbcee1f3928970bde148c940434f33acd377cbad17673b2d30b6339255c98eba97efb4e9ac1f11be815dd6045592edcbee7f253ec74c7c1313505bd7ff8fd58b3a6569c91dbdef1df585aeaea7346a2a65caee5c85f9eddeeeee3c8a2e523c864ac430eb47cb4d0c8767b9d4125661b5a1a170c04b64da3a99ddb93bf14fae3ca2d1e882375b8dbac83978e136c34f90b33cc0eeb57debcfe26589efc08125d5d62a7e593c9738a50171adf051ea4f07e7e7e770c2016eeacbe8511afffffbea75759a1ea5404f5453c0b5c46c9700808c096cf8cf5223f341cbea3841b5cd224c1b381d56afebe9f99a00e3cd94dc0bb7af9e8709db487cc4d9b3b96723d69d512ddd57b0dee9b9f6ae80a502cce352098603e77f9ecced07fa25e99e9e415414c91f8bfd1c150570512f26c4ee34a64c131dce3800000000000000006c86287945bd8d258442870e000000000000000000000000f7e6a10de4bf7369b0d5b5373829b09bf5b7b34099b27ac7770fca449d4c4ca15f88b588b2429af2e1d1a4e1fa44cb80fcfae6e50d7e5b4675d7e0be706224f34e6eed553b40e2b897e73752fc7d1e4b0f4c5967eefd7448d5fde5841fa464a67267c631052bd7333769a4b8d19d4794357edce762e8136ab9d7ed34a72baffd849b90579b96b3"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000000016230000000000000000850000002000000085000000a000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000180)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0], 0x0, 0xab, &(0x7f0000000280)=[{}], 0x8, 0x10, &(0x7f0000000400), 0x0, 0x0, 0xd, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x10, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="85000000b20000001800000027ffffff00000000000500000000000000830000ece91af900852000010400"/52], &(0x7f00000003c0)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001400)=""/4096, 0x1f00, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff, r1, r2, r1], 0x0, 0x10, 0x1947}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000004000000000000000000073010d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') r6 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x94200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000000)='cpu&\t\t') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x7, 0x0, &(0x7f0000000300)="e02742e8680d00", 0x0, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x4, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000c00000004000000010000053b3a4b000a000000030000000000000000000000000000010500000020000000000000000000000b02000000006100302e610061610061"], 0x0, 0x58}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="03000000f92c136856d200000025edb708000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="000000000500"/28], 0xfffffffffffffe5f) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x8, &(0x7f00000005c0)=@raw=[@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd}}], &(0x7f00000006c0)='GPL\x00', 0x7, 0x1000, &(0x7f0000002400)=""/4096, 0x85b8fa5fe294b815, 0x20, '\x00', r4, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x16695, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000c40)=[{0x5, 0x2, 0xe, 0x5}, {0x1, 0x5, 0xa, 0x5}, {0x0, 0x4, 0xa, 0x4}, {0x0, 0x5, 0xb, 0x6}]}, 0x94) 30.577401971s ago: executing program 1 (id=9557): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000400000008"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000002}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='kyber_latency\x00', r4}, 0x18) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0)=0xe00000000000000, 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x3, 0xd41b, &(0x7f0000000500)) 30.356893521s ago: executing program 32 (id=9557): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000400000008"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000002}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='kyber_latency\x00', r4}, 0x18) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0)=0xe00000000000000, 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x3, 0xd41b, &(0x7f0000000500)) 30.345499242s ago: executing program 2 (id=9561): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0500000000000000", @ANYRES32, @ANYBLOB], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x802, 0xc8, 0x7, 0x0, 0x2, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x80}, 0x103100, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}) close(r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) 30.344748892s ago: executing program 3 (id=9562): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000f80)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x4, r0}, 0x38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0xa60e, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) bpf$MAP_CREATE(0x0, 0x0, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) 30.25702723s ago: executing program 2 (id=9563): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_sys\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x40049409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000e00000000000000000000008500000050000000850000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1118b4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3d, &(0x7f0000000000)='cgroup\x00\x8d\f\xf3\xcd\xc6X$\x01n-Hg\x144-.\xe2\x053\xe2\xf4\xbf[\xe9\xdddU\x91\x9d,\t\x8d\xc3@\x86,\x7f\xe2Z\xe8L\x80\xdbe~c\xbc\x9b\xcf\x9b\x1cH\x95\xf3'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0200"], 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r4, 0xffffffffffffffff, 0x2, 0x0, 0x4000}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a000000095"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r5, 0x0, 0x30, 0x0, &(0x7f0000000680)="7a7fa22c2a1a89df53ef2a2d86dd5a4fd3bfd1ccb0c68d4eeb53c7ec80035cd606d138e743d6928f0cafdaec7c130e58", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, 0x0, 0x20004000) recvmsg(r7, &(0x7f00000004c0)={&(0x7f0000000200)=@phonet, 0x80, 0x0}, 0x2020) close(r8) bpf$PROG_LOAD(0x5, 0x0, 0x0) 30.177515987s ago: executing program 33 (id=9563): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_sys\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x40049409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000e00000000000000000000008500000050000000850000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1118b4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3d, &(0x7f0000000000)='cgroup\x00\x8d\f\xf3\xcd\xc6X$\x01n-Hg\x144-.\xe2\x053\xe2\xf4\xbf[\xe9\xdddU\x91\x9d,\t\x8d\xc3@\x86,\x7f\xe2Z\xe8L\x80\xdbe~c\xbc\x9b\xcf\x9b\x1cH\x95\xf3'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0200"], 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r4, 0xffffffffffffffff, 0x2, 0x0, 0x4000}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a000000095"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r5, 0x0, 0x30, 0x0, &(0x7f0000000680)="7a7fa22c2a1a89df53ef2a2d86dd5a4fd3bfd1ccb0c68d4eeb53c7ec80035cd606d138e743d6928f0cafdaec7c130e58", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, 0x0, 0x20004000) recvmsg(r7, &(0x7f00000004c0)={&(0x7f0000000200)=@phonet, 0x80, 0x0}, 0x2020) close(r8) bpf$PROG_LOAD(0x5, 0x0, 0x0) 30.162961128s ago: executing program 5 (id=9560): bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r1}, &(0x7f0000000a00), &(0x7f0000000a40)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f0000000880), &(0x7f00000008c0)=r0}, 0x20) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x1b, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c30000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x37e2f4aba9289b81, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000040025d58bf656d708b92a0f942c871b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) 30.162382548s ago: executing program 3 (id=9565): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000100)=r0, 0x8) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x20}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1, 0xc}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000800000850000000f00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080200000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r6}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x17, 0x0, 0x0, 0x8000}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYRES32=r8], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000711224000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0300000042000000060000000800000020000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES16=r5, @ANYBLOB='\x00'/28], 0x48) 30.082541735s ago: executing program 34 (id=9565): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000100)=r0, 0x8) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x20}) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1, 0xc}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000800000850000000f00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080200000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r6}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x17, 0x0, 0x0, 0x8000}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYRES32=r8], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000711224000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0300000042000000060000000800000020000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES16=r5, @ANYBLOB='\x00'/28], 0x48) 30.062063217s ago: executing program 35 (id=9560): bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r1}, &(0x7f0000000a00), &(0x7f0000000a40)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f0000000880), &(0x7f00000008c0)=r0}, 0x20) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x1b, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c30000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x37e2f4aba9289b81, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="14000000040025d58bf656d708b92a0f942c871b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) 7.803189456s ago: executing program 8 (id=9666): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x3f, 0x40, 0x42}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, 0x0, &(0x7f0000000b00)=""/151}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r2}, 0x18) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x86043, 0x0) socketpair(0x0, 0x4, 0x9, &(0x7f0000000080)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000900)="d7f18a818c6d486e5cf1246b349d7a9fca097e8a8f3711f7b6b957d1aced7d00000000007b4a924342a153affff677657e3260ff", &(0x7f0000000080), 0xd8, r0}, 0x38) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x1, 0xb3, 0x5, 0xfe, 0x0, 0x81, 0x1000, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4856e799, 0x2, @perf_bp={&(0x7f0000000280), 0x2}, 0xb694, 0x7f, 0x15fc00, 0x5, 0x101, 0x6, 0x2, 0x0, 0x401, 0x0, 0xd0bb}, 0x0, 0xb, r3, 0xa) 7.586841616s ago: executing program 8 (id=9667): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000711224000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000000000085000000a500000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d40)={r7, 0x0, 0xe, 0x0, &(0x7f0000000040)="0000ffffffffa000903626e43925", 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0100000042000000060000000800000000000000", @ANYRES32=0x1, @ANYBLOB="00f8e7ffffffffffff000000000000000000000008d138db4ee4c3563d108dc453cddbbff11527ffe054e443646bfb2ce0ac05b76afcc3598ae524bb1b37ede60e394bc620ab440a39d408293325ef2af01e6ea4d792bc145ffde988cc5ea3799a862de966cb4c29d9a8332930a7884111dcd0e81b406c72b2736101bf18b8e081ed557f2b2c05a5d5fe09211c206ade91d3e58ad1053a6ef26b9ebb6bfb86789cce38334b93f3d2101d5162813d584fd26e170b48e0fa0a5c950719fb2f88139a1035fb8f2ef6fadc40959102e94b57b563958e60d175a0574f8aa5ae98029f3e35f52936", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r8}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r9}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000340)='ext4_fc_track_inode\x00', r10}, 0x18) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xe}, 0xd806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) 6.674347937s ago: executing program 8 (id=9682): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df85000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x2e]}}, &(0x7f0000000380)=""/81, 0x1b, 0x51, 0x0, 0x1, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r5, 0x4004743c, 0xf0ff1f00000000) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 5.677605116s ago: executing program 8 (id=9677): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000b000000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="100000000400000004feffff0106000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='mm_khugepaged_scan_pmd\x00', r3}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='qdisc_create\x00', r6}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x4}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r7, &(0x7f0000000080)="8065292ca5", &(0x7f0000000180)=""/86}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$MAP_CREATE(0x0, 0x0, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x9, 0x8, 0x40, 0x42, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x86, r9}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1e00000000000000fdff070008"], 0x50) 5.489460082s ago: executing program 6 (id=9678): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_sys\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x40049409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000e00000000000000000000008500000050000000850000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1118b4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3d, &(0x7f0000000000)='cgroup\x00\x8d\f\xf3\xcd\xc6X$\x01n-Hg\x144-.\xe2\x053\xe2\xf4\xbf[\xe9\xdddU\x91\x9d,\t\x8d\xc3@\x86,\x7f\xe2Z\xe8L\x80\xdbe~c\xbc\x9b\xcf\x9b\x1cH\x95\xf3'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0200"], 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r4, 0xffffffffffffffff, 0x2, 0x0, 0x4000}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a000000095"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r5, 0x0, 0x30, 0x0, &(0x7f0000000680)="7a7fa22c2a1a89df53ef2a2d86dd5a4fd3bfd1ccb0c68d4eeb53c7ec80035cd606d138e743d6928f0cafdaec7c130e58", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, 0x0, 0x20004000) recvmsg(r7, &(0x7f00000004c0)={&(0x7f0000000200)=@phonet, 0x80, 0x0}, 0x2020) close(r8) bpf$PROG_LOAD(0x5, 0x0, 0x0) 5.317345928s ago: executing program 8 (id=9679): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x50) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x4e}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x181000, 0x0) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, &(0x7f0000000380), &(0x7f00000003c0)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) 5.031524153s ago: executing program 6 (id=9681): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 5.010517545s ago: executing program 0 (id=9683): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df85000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x2e]}}, &(0x7f0000000380)=""/81, 0x1b, 0x51, 0x0, 0x1, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r5, 0x4004743c, 0xf0ff1f00000000) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 4.874596057s ago: executing program 6 (id=9685): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000280)=ANY=[@ANYRES8=r0], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, r0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRESHEX=r2], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe88}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r5, 0x6, 0x1, 0x400, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], &(0x7f00000003c0)=[0x0, 0x0]}, 0x40) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRESDEC=r3], 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001dc0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r9}, 0x10) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r4) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000feffffff0000000003000000850000004100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f805ffffb702000008000006b703000003000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)=@o_path={&(0x7f0000000180)='./file0\x00', r7, 0x4000, r7}, 0x18) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000012c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x100000000}, 0x24, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffff126, 0x8, 0x0, 0x0, 0x0, 0x0, 0xf641}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r10, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 4.210825096s ago: executing program 6 (id=9690): perf_event_open(&(0x7f0000003f00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x98, 0x10020, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001000), 0x2}, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c4300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000080)}, 0x8000, 0xe000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc/1/\x00\x82q\xee\xe5\xa0\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080), 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x401, 0x28}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, 0x0, &(0x7f0000000480)=""/201}, 0x20) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) 4.160874071s ago: executing program 4 (id=9691): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000500000009"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000400000008"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000002}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='kyber_latency\x00', r4}, 0x18) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0)=0xe00000000000000, 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x3, 0xd41b, &(0x7f0000000500)) 3.310566876s ago: executing program 6 (id=9692): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000500000009"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000400000008"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000002}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='kyber_latency\x00', r4}, 0x18) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0)=0xe00000000000000, 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x3, 0xd41b, &(0x7f0000000500)) 3.252010651s ago: executing program 4 (id=9694): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_sys\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x40049409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000e00000000000000000000008500000050000000850000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1118b4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3d, &(0x7f0000000000)='cgroup\x00\x8d\f\xf3\xcd\xc6X$\x01n-Hg\x144-.\xe2\x053\xe2\xf4\xbf[\xe9\xdddU\x91\x9d,\t\x8d\xc3@\x86,\x7f\xe2Z\xe8L\x80\xdbe~c\xbc\x9b\xcf\x9b\x1cH\x95\xf3'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0200"], 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r4, 0xffffffffffffffff, 0x2, 0x0, 0x4000}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a000000095"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r5, 0x0, 0x30, 0x0, &(0x7f0000000680)="7a7fa22c2a1a89df53ef2a2d86dd5a4fd3bfd1ccb0c68d4eeb53c7ec80035cd606d138e743d6928f0cafdaec7c130e58", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, 0x0, 0x20004000) recvmsg(r7, &(0x7f00000004c0)={&(0x7f0000000200)=@phonet, 0x80, 0x0}, 0x2020) close(r8) bpf$PROG_LOAD(0x5, 0x0, 0x0) 3.251653461s ago: executing program 7 (id=9695): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a000000095"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x0, 0x28, 0x0, &(0x7f0000000680)="7a7fa22c2a1a89df53ef2a2d86dd5a4fd3bfd1ccb0c68d4eeb53c7ec80035cd606d138e743d6928f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (fail_nth: 2) 2.836989988s ago: executing program 4 (id=9696): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, 0x0, &(0x7f0000000180)}, 0x20) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x8, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r4, 0x18000000000002a0, 0x4f, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={0xffffffffffffffff, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0], 0x0, 0x75, &(0x7f00000008c0)=[{}], 0x8, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0xc9, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000280)=""/238, 0xee}], 0x1}, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) 2.751926726s ago: executing program 7 (id=9697): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 2.729588848s ago: executing program 7 (id=9698): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df85000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x2e]}}, &(0x7f0000000380)=""/81, 0x1b, 0x51, 0x0, 0x1, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r5, 0x4004743c, 0xf0ff1f00000000) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 2.340368863s ago: executing program 0 (id=9699): mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x18) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x27}, @printk={@d, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x17}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f00000006c0)="00000000000000c88526faac0646", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0xada3d2ee446fdf7c) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000008000000020000000400000005000000", @ANYRES32, @ANYBLOB="edff00000000000000000000001b000000000000", @ANYRES32=0x0, @ANYRES32], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000001a40)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r6, 0xf8, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300), 0x0, 0x88, &(0x7f0000000540), 0x30, 0x10, &(0x7f0000000580), &(0x7f0000000680), 0x8, 0xad, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r7, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000280)="b9ff03076804268c989e14f088a8", 0x0, 0x2, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x14, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) 2.301768576s ago: executing program 6 (id=9700): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xfeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={&(0x7f0000000180)="11c2e4b2ccefed70ee7fe05c6165a96cfb2826a5dbba0ef828a26b42d848acc3af90ac0f534cdce3fab846391ad2db27ddfab8c6f7b34a21948b36ba8fef650ff6f25df6c5f83709328be0312078e8b490d6d20e578158fede02cfae1ba3f2c27c61a232decc72d9f934b234bb9d0dd9365cd3e40e78cf6d5b5d7e2750e3b28c81b14d4a6ad2e49da3beea01beb749ab3d2a7d0a4fb21bb60009b06f10d44a6c3a4bf7145ec1c9ff3c2fea331ceaa6d1ff369de0bf9224c56a79ba", &(0x7f0000000280)=""/155, &(0x7f0000000340), &(0x7f0000000740)="451d143a1b00fa1f23d452dde4dddbc8ee9180a519b4c390f27a7790aa975dc04f65ee8d91178fae95e72892cf5e72431ee26c4fa05b9c2b961e65a5d0bbf5c3710ab408fb787fcf2af47fa229372a86c9698a2e8bf6ce906c05a8fe2d7500eee1db6c0a2bcd7cce642df6c3da25d220b4be104597924ff25205b31fbf94dfb8b3bddea19d801eff572e8e9b5b1d9ce5dea28888e031349e680b07b1469ad55002159d22ce581c77d2e0024102dd285a6b440b11cf8c1946c97ca771b32c53be3a369d520b2647fc77be558fe6d2d6191badc0eb271d3cb9f70eeb238efe", 0xf, r0, 0x4}, 0x38) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8983, &(0x7f0000000080)) 2.112007933s ago: executing program 0 (id=9701): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000280)={r0, 0x0, &(0x7f00000000c0)=""/85}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d", 0xd9}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a", 0xc8}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae", 0xcb}], 0x8, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) sendmsg$unix(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="45ee3530db09dec0701d486cb6b0dd3fdb20e7ff7457d285a3bf442e486af47237f894cfbcb60e9a70c21957569f28b829233e37ffab6d8c3c6b19cf3db61dedd9dbff45e146e008a72cce807e20350f51110b595dda45b4953633b01a5fe6afdfeba12d81bf5bb5f1d3f6173adb9223b119c04409d9d15a3cb2e965db7d766753df51540973b6881a80cc397a424cafc422bdb1c57fefdd31a966f065d84d28c1d2da6ae04b64be8b099ab01ebd03b9c90a901ce7ee73887379454124653991e7f3e796bf86b6fa045272cdaf603ae2eaa4732d034e82", 0xd7}, {&(0x7f00000004c0)="178a92dd63a98661758beec7dfa77b78d50c547979ddeff26986d0839cda49f107768c8613ae1f6a37479fb6b7469682d35c764ca76612948342c3d77962ea5d852c78c76e16c72d15e66bfd20690e94d28ed5904d90fdbabae3aa294c98f37f0fb25de9a96b6d0a689ec05bfb2fe4a1c926a674eb7e8c3694c5ba7e2d9b94b8d970ccda79f53a60b6f24ce33fe2df201912888338d457f549a13feca73ffb8690cb806038e5cb171307fd9ac82b21bf5591a40400d3a6c5d98f47d2419e438741ff82a963e616a57b93", 0xca}], 0x2, 0x0, 0x0, 0x408d0}, 0x4000000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x4, &(0x7f00000005c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}], &(0x7f0000000600)='syzkaller\x00', 0xfffffffe, 0x61, &(0x7f0000000640)=""/97, 0x41000, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0x8, 0xffff, 0x278f}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000940)=[r0], &(0x7f0000000980)=[{0x1, 0x2, 0x3}, {0x3, 0x5, 0x4, 0xa}, {0x5, 0x2, 0x5, 0x9}], 0x10, 0x10000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000006c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000000000000"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 1.852622286s ago: executing program 4 (id=9702): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df85000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x2e]}}, &(0x7f0000000380)=""/81, 0x1b, 0x51, 0x0, 0x1, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r5, 0x4004743c, 0xf0ff1f00000000) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 1.417314095s ago: executing program 7 (id=9703): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df85000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x2e]}}, &(0x7f0000000380)=""/81, 0x1b, 0x51, 0x0, 0x1, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r5, 0x4004743c, 0xf0ff1f00000000) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 1.232568681s ago: executing program 0 (id=9704): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000500000009"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000400000008"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000002}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='kyber_latency\x00', r4}, 0x18) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0)=0xe00000000000000, 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x3, 0xd41b, &(0x7f0000000500)) 622.791755ms ago: executing program 8 (id=9705): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000009500e8fd00bef300"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0xfe, 0x0, 0x0, 0x4509371f, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x1200e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x640201, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x2, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="1809000000000d0000000000002000008500004c004d0000001801000005696c25000066d9a059961437e0f8ff0000000078a1000000000000070100000d000000b702000008009325497c0fd11d960000850000007100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x8, 0xc, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r5], 0x0, 0xfffffffd, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x31da}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000280), &(0x7f00000002c0)=r7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1fc, 0xb0a00, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x7}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffc, 0x0, 0x6}, r2, 0x1, 0xffffffffffffffff, 0x0) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000040)=""/155, 0x0, 0x9b, 0x1}, 0x28) bpf$TOKEN_CREATE(0x24, &(0x7f0000000380)={0x0, r1}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=ANY=[@ANYRESOCT, @ANYRES32=r2, @ANYBLOB="000000000b00232a0000000000000000000000000004edc6b61e25b527dda6fe53deb7949e6cea975df2bd392bbbbf44502c316067d1ebb4c6e29c71527a49ffe9a5ffadbb3648e38d7abea2fdcb91d96067d19b960cfdb2c935e2c4afbe225baa0c4e89c03766987c7141a67cac43d941607c8ce76bf82f81b5cd687a", @ANYRES32=0x0, @ANYRES32=r9, @ANYBLOB="10000000000000000000000000000000000000002100000000000000f6333b3a78a4fff43503a926850cfe4b32ee29dc6bc4f663691963c3701be64c3ac7545a05a60e6d43e53abb8473644ef035eccf014bfeec1dbe9e1c00116215305df08293314beecbe5b2404ab5e241fc826beec7dfc88d4ffe0b2d85f4c2762fc68f2b4a98b99652f71f18225712ace4068fa811ad11ce2b23659c020f7e59122fb9eae3"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='map\x00', r0}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0xe42b9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a0bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 485.793048ms ago: executing program 4 (id=9706): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_sys\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x40049409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000e00000000000000000000008500000050000000850000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1118b4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3d, &(0x7f0000000000)='cgroup\x00\x8d\f\xf3\xcd\xc6X$\x01n-Hg\x144-.\xe2\x053\xe2\xf4\xbf[\xe9\xdddU\x91\x9d,\t\x8d\xc3@\x86,\x7f\xe2Z\xe8L\x80\xdbe~c\xbc\x9b\xcf\x9b\x1cH\x95\xf3'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0200"], 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r4, 0xffffffffffffffff, 0x2, 0x0, 0x4000}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a000000095"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r5, 0x0, 0x30, 0x0, &(0x7f0000000680)="7a7fa22c2a1a89df53ef2a2d86dd5a4fd3bfd1ccb0c68d4eeb53c7ec80035cd606d138e743d6928f0cafdaec7c130e58", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, 0x0, 0x20004000) recvmsg(r7, &(0x7f00000004c0)={&(0x7f0000000200)=@phonet, 0x80, 0x0}, 0x2020) close(r8) bpf$PROG_LOAD(0x5, 0x0, 0x0) 153.836047ms ago: executing program 7 (id=9707): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000180)=r4, 0x4) r5 = bpf$MAP_CREATE_RINGBUF(0x4000, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 89.576122ms ago: executing program 0 (id=9708): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 83.725123ms ago: executing program 7 (id=9709): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0500000000000000", @ANYRES32, @ANYBLOB], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x802, 0xc8, 0x7, 0x0, 0x2, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x80}, 0x103100, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) 37.101577ms ago: executing program 0 (id=9710): bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="0000000000ff7f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) close(r1) (fail_nth: 1) 0s ago: executing program 4 (id=9711): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x17, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRESOCT, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8fffffbb703000008000000b7040000000008008503000000fa210032ab5c8547668bc6abf59612ed6d6f4946b652d84e8898a8d9d4e729f43e0786a2e7f0c2144c033daa26b9decb951112e0c9e608d1da79013fd0ff4008695d4568a648bd4faa9d6aff70726ef43279ae"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000006c0)='cgroup.controllers\x00', 0x275a, 0x0) close(r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) kernel console output (not intermixed with test programs): _lvl+0x8/0x8 [ 1307.872798][T23743] ? kmem_cache_free+0x12d/0x300 [ 1307.877725][T23743] ? ____kasan_slab_free+0x13d/0x180 [ 1307.883000][T23743] dump_stack+0x15/0x24 [ 1307.887137][T23743] should_fail_ex+0x3d4/0x520 [ 1307.891808][T23743] __should_failslab+0xac/0xf0 [ 1307.896571][T23743] ? kobject_uevent_env+0x287/0x730 [ 1307.901755][T23743] should_failslab+0x9/0x20 [ 1307.906238][T23743] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1307.911595][T23743] ? kernfs_put+0x469/0x480 [ 1307.916097][T23743] ? kobject_uevent_env+0x287/0x730 [ 1307.921279][T23743] kmalloc_trace+0x29/0xb0 [ 1307.925676][T23743] kobject_uevent_env+0x287/0x730 [ 1307.930687][T23743] kobject_uevent+0x1d/0x30 [ 1307.935184][T23743] __kobject_del+0xd7/0x2f0 [ 1307.939670][T23743] kobject_put+0x1ee/0x280 [ 1307.944068][T23743] net_rx_queue_update_kobjects+0x45c/0x4d0 [ 1307.949946][T23743] ? netif_set_real_num_tx_queues+0x620/0x7f0 [ 1307.955999][T23743] netif_set_real_num_rx_queues+0x107/0x1f0 [ 1307.961878][T23743] __tun_detach+0xb67/0x1460 [ 1307.966452][T23743] __tun_chr_ioctl+0xaec/0x1e70 [ 1307.971341][T23743] ? tun_flow_create+0x320/0x320 [ 1307.976259][T23743] ? mutex_unlock+0x89/0x220 [ 1307.980837][T23743] tun_chr_ioctl+0x2a/0x40 [ 1307.985246][T23743] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 1307.990339][T23743] __se_sys_ioctl+0x12f/0x1b0 [ 1307.994999][T23743] __x64_sys_ioctl+0x7b/0x90 [ 1307.999570][T23743] x64_sys_call+0x58b/0x9a0 [ 1308.004055][T23743] do_syscall_64+0x4c/0xa0 [ 1308.008453][T23743] ? clear_bhb_loop+0x30/0x80 [ 1308.013113][T23743] ? clear_bhb_loop+0x30/0x80 [ 1308.017775][T23743] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1308.023653][T23743] RIP: 0033:0x7fb6ad78f749 [ 1308.028048][T23743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1308.047723][T23743] RSP: 002b:00007fb6ae5b0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1308.056121][T23743] RAX: ffffffffffffffda RBX: 00007fb6ad9e5fa0 RCX: 00007fb6ad78f749 [ 1308.064082][T23743] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000007 [ 1308.072060][T23743] RBP: 00007fb6ae5b0090 R08: 0000000000000000 R09: 0000000000000000 [ 1308.080116][T23743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1308.088070][T23743] R13: 00007fb6ad9e6038 R14: 00007fb6ad9e5fa0 R15: 00007fffbbbec618 [ 1308.096115][T23743] [ 1308.269657][T23749] O3c: renamed from bridge_slave_0 [ 1312.263692][T23842] device syzkaller0 entered promiscuous mode [ 1312.292882][T23859] device wg2 entered promiscuous mode [ 1317.583198][T24004] device wg2 entered promiscuous mode [ 1328.268802][T24265] device veth0_vlan left promiscuous mode [ 1328.288259][T24265] device veth0_vlan entered promiscuous mode [ 1328.387022][T19795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1328.395695][T19795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1328.403445][T19795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1333.447188][T24348] device sit0 left promiscuous mode [ 1333.728036][T24350] device sit0 entered promiscuous mode [ 1335.704673][T24403] device sit0 left promiscuous mode [ 1335.904811][T24405] device sit0 entered promiscuous mode [ 1346.139297][T24613] device sit0 left promiscuous mode [ 1346.650441][T24614] device sit0 entered promiscuous mode [ 1352.399102][T24695] device sit0 entered promiscuous mode [ 1353.674045][T24708] device sit0 left promiscuous mode [ 1355.322925][T24775] device sit0 left promiscuous mode [ 1355.917161][T24792] FAULT_INJECTION: forcing a failure. [ 1355.917161][T24792] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1356.107350][T24792] CPU: 0 PID: 24792 Comm: syz.0.6897 Not tainted syzkaller #0 [ 1356.114852][T24792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1356.124931][T24792] Call Trace: [ 1356.128213][T24792] [ 1356.131150][T24792] __dump_stack+0x21/0x24 [ 1356.135506][T24792] dump_stack_lvl+0xee/0x150 [ 1356.140095][T24792] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1356.145204][T24792] ? migrate_enable+0x19c/0x280 [ 1356.150052][T24792] dump_stack+0x15/0x24 [ 1356.154217][T24792] should_fail_ex+0x3d4/0x520 [ 1356.158987][T24792] should_fail+0xb/0x10 [ 1356.163154][T24792] should_fail_usercopy+0x1a/0x20 [ 1356.168188][T24792] _copy_from_user+0x1e/0xc0 [ 1356.172786][T24792] generic_map_update_batch+0x458/0x780 [ 1356.178340][T24792] ? __cfi_generic_map_update_batch+0x10/0x10 [ 1356.184413][T24792] ? bpf_map_do_batch+0x3e4/0x620 [ 1356.189441][T24792] ? __cfi_generic_map_update_batch+0x10/0x10 [ 1356.195518][T24792] bpf_map_do_batch+0x48c/0x620 [ 1356.200382][T24792] __sys_bpf+0x624/0x780 [ 1356.204634][T24792] ? bpf_link_show_fdinfo+0x320/0x320 [ 1356.210024][T24792] ? __cfi_sched_clock_cpu+0x10/0x10 [ 1356.215341][T24792] __x64_sys_bpf+0x7c/0x90 [ 1356.219762][T24792] x64_sys_call+0x488/0x9a0 [ 1356.224248][T24792] do_syscall_64+0x4c/0xa0 [ 1356.228646][T24792] ? clear_bhb_loop+0x30/0x80 [ 1356.233307][T24792] ? clear_bhb_loop+0x30/0x80 [ 1356.237965][T24792] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1356.243929][T24792] RIP: 0033:0x7f384238f749 [ 1356.248338][T24792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1356.267940][T24792] RSP: 002b:00007f38432d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1356.276373][T24792] RAX: ffffffffffffffda RBX: 00007f38425e5fa0 RCX: 00007f384238f749 [ 1356.284330][T24792] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 1356.292281][T24792] RBP: 00007f38432d2090 R08: 0000000000000000 R09: 0000000000000000 [ 1356.300234][T24792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1356.308200][T24792] R13: 00007f38425e6038 R14: 00007f38425e5fa0 R15: 00007ffdeddf4278 [ 1356.316157][T24792] [ 1357.219421][T24805] O3c: renamed from bridge_slave_0 [ 1357.974935][T24848] device wg2 entered promiscuous mode [ 1359.869187][T24888] syz.1.6925[24888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1359.869259][T24888] syz.1.6925[24888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1360.006135][T24890] syz.1.6925[24890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1360.174122][T24890] syz.1.6925[24890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1360.324922][T24894] device pim6reg1 entered promiscuous mode [ 1361.110308][T24919] device syzkaller0 entered promiscuous mode [ 1362.193609][T24948] syz.3.6939[24948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1362.193678][T24948] syz.3.6939[24948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1362.255842][T24940] syz.3.6939[24940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1362.425676][T24940] syz.3.6939[24940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1362.506053][T24944] device pim6reg1 entered promiscuous mode [ 1364.310888][T25003] device wg2 left promiscuous mode [ 1369.587427][T25111] device syzkaller0 entered promiscuous mode [ 1372.976048][T25195] device sit0 left promiscuous mode [ 1387.698526][T25558] bond_slave_1: mtu less than device minimum [ 1388.427055][T25586] device sit0 left promiscuous mode [ 1389.669858][T25628] device syzkaller0 entered promiscuous mode [ 1389.825775][T25628] device sit0 entered promiscuous mode [ 1390.460511][T25639] device sit0 left promiscuous mode [ 1390.495835][T25647] device sit0 entered promiscuous mode [ 1390.907969][T25680] FAULT_INJECTION: forcing a failure. [ 1390.907969][T25680] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.998538][T25680] CPU: 1 PID: 25680 Comm: syz.1.7127 Not tainted syzkaller #0 [ 1391.006032][T25680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1391.016174][T25680] Call Trace: [ 1391.019450][T25680] [ 1391.022379][T25680] __dump_stack+0x21/0x24 [ 1391.026711][T25680] dump_stack_lvl+0xee/0x150 [ 1391.031307][T25680] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1391.036336][T25680] ? slab_post_alloc_hook+0x4f/0x2d0 [ 1391.041629][T25680] ? security_inode_alloc+0x33/0x120 [ 1391.046912][T25680] ? inode_init_always+0x6fc/0x960 [ 1391.052197][T25680] ? new_inode_pseudo+0xa2/0x1f0 [ 1391.057139][T25680] ? proc_pid_make_inode+0x27/0x1d0 [ 1391.062341][T25680] dump_stack+0x15/0x24 [ 1391.067128][T25680] should_fail_ex+0x3d4/0x520 [ 1391.071808][T25680] __should_failslab+0xac/0xf0 [ 1391.076587][T25680] should_failslab+0x9/0x20 [ 1391.081112][T25680] kmem_cache_alloc_node+0x42/0x340 [ 1391.086313][T25680] ? __alloc_skb+0xea/0x4b0 [ 1391.090813][T25680] __alloc_skb+0xea/0x4b0 [ 1391.095140][T25680] alloc_skb_with_frags+0xa8/0x620 [ 1391.100339][T25680] ? memcpy+0x56/0x70 [ 1391.104322][T25680] sock_alloc_send_pskb+0x853/0x980 [ 1391.109525][T25680] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 1391.115259][T25680] ? __kasan_check_write+0x14/0x20 [ 1391.120383][T25680] ? _raw_spin_lock+0x8e/0xe0 [ 1391.125072][T25680] ? __cfi__raw_spin_lock+0x10/0x10 [ 1391.130294][T25680] ? security_socket_getpeersec_dgram+0xbb/0xd0 [ 1391.136546][T25680] unix_dgram_sendmsg+0x592/0x16d0 [ 1391.141667][T25680] ? __cfi_selinux_socket_sendmsg+0x10/0x10 [ 1391.147580][T25680] ? __cfi_unix_dgram_sendmsg+0x10/0x10 [ 1391.153132][T25680] ? stack_trace_save+0x98/0xe0 [ 1391.157990][T25680] ? __stack_depot_save+0x36/0x480 [ 1391.163107][T25680] ? security_socket_sendmsg+0x93/0xb0 [ 1391.168650][T25680] ? __cfi_unix_dgram_sendmsg+0x10/0x10 [ 1391.174201][T25680] ____sys_sendmsg+0x5a9/0x990 [ 1391.178972][T25680] ? __sys_sendmsg_sock+0x40/0x40 [ 1391.183996][T25680] ? import_iovec+0x7c/0xb0 [ 1391.188504][T25680] ___sys_sendmsg+0x21c/0x290 [ 1391.193180][T25680] ? __sys_sendmsg+0x270/0x270 [ 1391.197955][T25680] ? __kasan_check_write+0x14/0x20 [ 1391.203070][T25680] ? proc_fail_nth_write+0x17a/0x1f0 [ 1391.208357][T25680] ? vfs_write+0x9d6/0xca0 [ 1391.212783][T25680] ? __fdget+0x19c/0x220 [ 1391.217026][T25680] __x64_sys_sendmsg+0x1f0/0x2c0 [ 1391.221962][T25680] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 1391.227424][T25680] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 1391.233490][T25680] x64_sys_call+0x171/0x9a0 [ 1391.238009][T25680] do_syscall_64+0x4c/0xa0 [ 1391.242421][T25680] ? clear_bhb_loop+0x30/0x80 [ 1391.247098][T25680] ? clear_bhb_loop+0x30/0x80 [ 1391.251780][T25680] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1391.257771][T25680] RIP: 0033:0x7fb6ad78f749 [ 1391.262185][T25680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1391.281790][T25680] RSP: 002b:00007fb6ae5b0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1391.290210][T25680] RAX: ffffffffffffffda RBX: 00007fb6ad9e5fa0 RCX: 00007fb6ad78f749 [ 1391.298193][T25680] RDX: 0000000020000000 RSI: 0000200000000100 RDI: 0000000000000004 [ 1391.306178][T25680] RBP: 00007fb6ae5b0090 R08: 0000000000000000 R09: 0000000000000000 [ 1391.314413][T25680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1391.322385][T25680] R13: 00007fb6ad9e6038 R14: 00007fb6ad9e5fa0 R15: 00007fffbbbec618 [ 1391.330370][T25680] [ 1392.725608][T25713] bond_slave_1: mtu less than device minimum [ 1401.091398][T25935] FAULT_INJECTION: forcing a failure. [ 1401.091398][T25935] name failslab, interval 1, probability 0, space 0, times 0 [ 1401.114268][T25935] CPU: 0 PID: 25935 Comm: syz.0.7195 Not tainted syzkaller #0 [ 1401.121749][T25935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1401.131804][T25935] Call Trace: [ 1401.135088][T25935] [ 1401.138018][T25935] __dump_stack+0x21/0x24 [ 1401.142352][T25935] dump_stack_lvl+0xee/0x150 [ 1401.146969][T25935] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1401.152000][T25935] ? __cfi_avc_has_perm+0x10/0x10 [ 1401.157031][T25935] dump_stack+0x15/0x24 [ 1401.161361][T25935] should_fail_ex+0x3d4/0x520 [ 1401.166044][T25935] __should_failslab+0xac/0xf0 [ 1401.170812][T25935] ? __request_module+0x273/0x890 [ 1401.175835][T25935] should_failslab+0x9/0x20 [ 1401.180332][T25935] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1401.185706][T25935] ? __request_module+0x273/0x890 [ 1401.190733][T25935] kmalloc_trace+0x29/0xb0 [ 1401.195149][T25935] ? dev_load+0x5b/0xb0 [ 1401.199308][T25935] __request_module+0x273/0x890 [ 1401.204160][T25935] ? __cfi___request_module+0x10/0x10 [ 1401.209538][T25935] ? cap_capable+0x1aa/0x230 [ 1401.214140][T25935] ? security_capable+0x99/0xc0 [ 1401.218994][T25935] dev_load+0x5b/0xb0 [ 1401.223066][T25935] dev_ioctl+0x53f/0xd10 [ 1401.227311][T25935] sock_do_ioctl+0x23f/0x310 [ 1401.231899][T25935] ? sock_show_fdinfo+0xb0/0xb0 [ 1401.236750][T25935] ? selinux_file_ioctl+0x377/0x480 [ 1401.241954][T25935] sock_ioctl+0x4d8/0x6e0 [ 1401.246302][T25935] ? __cfi_sock_ioctl+0x10/0x10 [ 1401.251167][T25935] ? __fget_files+0x2d5/0x330 [ 1401.255843][T25935] ? security_file_ioctl+0x95/0xc0 [ 1401.260956][T25935] ? __cfi_sock_ioctl+0x10/0x10 [ 1401.265815][T25935] __se_sys_ioctl+0x12f/0x1b0 [ 1401.270500][T25935] __x64_sys_ioctl+0x7b/0x90 [ 1401.275103][T25935] x64_sys_call+0x58b/0x9a0 [ 1401.279621][T25935] do_syscall_64+0x4c/0xa0 [ 1401.284045][T25935] ? clear_bhb_loop+0x30/0x80 [ 1401.288742][T25935] ? clear_bhb_loop+0x30/0x80 [ 1401.293435][T25935] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1401.299347][T25935] RIP: 0033:0x7f384238f749 [ 1401.303859][T25935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1401.323474][T25935] RSP: 002b:00007f38432d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1401.331896][T25935] RAX: ffffffffffffffda RBX: 00007f38425e5fa0 RCX: 00007f384238f749 [ 1401.339881][T25935] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000008 [ 1401.347858][T25935] RBP: 00007f38432d2090 R08: 0000000000000000 R09: 0000000000000000 [ 1401.355831][T25935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1401.363808][T25935] R13: 00007f38425e6038 R14: 00007f38425e5fa0 R15: 00007ffdeddf4278 [ 1401.371807][T25935] [ 1401.376269][ T28] audit: type=1400 audit(1767883630.667:156): avc: denied { sys_module } for pid=25933 comm="syz.0.7195" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1402.149705][T25968] device syzkaller0 entered promiscuous mode [ 1402.589735][T25990] : port 1(syz_tun) entered blocking state [ 1402.675144][T25990] : port 1(syz_tun) entered disabled state [ 1402.681687][T25990] device syz_tun entered promiscuous mode [ 1404.857071][T25992] device syzkaller0 entered promiscuous mode [ 1404.894434][T25993] : port 1(syz_tun) entered blocking state [ 1404.900578][T25993] : port 1(syz_tun) entered forwarding state [ 1404.907582][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1426.977050][T26455] bond_slave_1: mtu less than device minimum [ 1427.129989][T26460] syz.1.7336[26460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1427.130060][T26460] syz.1.7336[26460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1427.595920][T26489] FAULT_INJECTION: forcing a failure. [ 1427.595920][T26489] name failslab, interval 1, probability 0, space 0, times 0 [ 1427.735451][T26489] CPU: 0 PID: 26489 Comm: syz.2.7345 Not tainted syzkaller #0 [ 1427.742945][T26489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1427.753020][T26489] Call Trace: [ 1427.756299][T26489] [ 1427.759223][T26489] __dump_stack+0x21/0x24 [ 1427.763552][T26489] dump_stack_lvl+0xee/0x150 [ 1427.768153][T26489] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1427.773178][T26489] ? __kasan_kmalloc+0x95/0xb0 [ 1427.777943][T26489] dump_stack+0x15/0x24 [ 1427.782109][T26489] should_fail_ex+0x3d4/0x520 [ 1427.786792][T26489] ? build_skb+0x2a/0x220 [ 1427.791132][T26489] __should_failslab+0xac/0xf0 [ 1427.795901][T26489] should_failslab+0x9/0x20 [ 1427.800401][T26489] kmem_cache_alloc+0x3b/0x330 [ 1427.805169][T26489] build_skb+0x2a/0x220 [ 1427.809411][T26489] bpf_prog_test_run_skb+0x39f/0x1290 [ 1427.814788][T26489] ? __fget_files+0x2d5/0x330 [ 1427.819465][T26489] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 1427.825274][T26489] bpf_prog_test_run+0x3e3/0x630 [ 1427.830314][T26489] ? slab_free_freelist_hook+0xc2/0x190 [ 1427.835882][T26489] ? bpf_prog_query+0x270/0x270 [ 1427.840738][T26489] ? selinux_bpf+0xce/0xf0 [ 1427.845151][T26489] ? security_bpf+0x93/0xb0 [ 1427.849656][T26489] __sys_bpf+0x56d/0x780 [ 1427.853896][T26489] ? bpf_link_show_fdinfo+0x320/0x320 [ 1427.859272][T26489] ? __cfi_ksys_write+0x10/0x10 [ 1427.864126][T26489] ? debug_smp_processor_id+0x17/0x20 [ 1427.869500][T26489] __x64_sys_bpf+0x7c/0x90 [ 1427.873922][T26489] x64_sys_call+0x488/0x9a0 [ 1427.878424][T26489] do_syscall_64+0x4c/0xa0 [ 1427.882842][T26489] ? clear_bhb_loop+0x30/0x80 [ 1427.887532][T26489] ? clear_bhb_loop+0x30/0x80 [ 1427.892214][T26489] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1427.898109][T26489] RIP: 0033:0x7ff45338f749 [ 1427.902521][T26489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1427.922127][T26489] RSP: 002b:00007ff45428e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1427.930548][T26489] RAX: ffffffffffffffda RBX: 00007ff4535e5fa0 RCX: 00007ff45338f749 [ 1427.938535][T26489] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 1427.946509][T26489] RBP: 00007ff45428e090 R08: 0000000000000000 R09: 0000000000000000 [ 1427.954497][T26489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1427.962466][T26489] R13: 00007ff4535e6038 R14: 00007ff4535e5fa0 R15: 00007fff47a8ba38 [ 1427.970445][T26489] [ 1429.779553][T26498] device syzkaller0 entered promiscuous mode [ 1433.829048][T26641] FAULT_INJECTION: forcing a failure. [ 1433.829048][T26641] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1433.892311][T26641] CPU: 1 PID: 26641 Comm: syz.2.7386 Not tainted syzkaller #0 [ 1433.899814][T26641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1433.909874][T26641] Call Trace: [ 1433.913153][T26641] [ 1433.916080][T26641] __dump_stack+0x21/0x24 [ 1433.920416][T26641] dump_stack_lvl+0xee/0x150 [ 1433.925006][T26641] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1433.930038][T26641] dump_stack+0x15/0x24 [ 1433.934193][T26641] should_fail_ex+0x3d4/0x520 [ 1433.938873][T26641] should_fail+0xb/0x10 [ 1433.943030][T26641] should_fail_usercopy+0x1a/0x20 [ 1433.948056][T26641] _copy_from_user+0x1e/0xc0 [ 1433.952645][T26641] __sys_bpf+0x277/0x780 [ 1433.956885][T26641] ? bpf_link_show_fdinfo+0x320/0x320 [ 1433.962258][T26641] ? __cfi_ksys_write+0x10/0x10 [ 1433.967108][T26641] ? debug_smp_processor_id+0x17/0x20 [ 1433.972485][T26641] __x64_sys_bpf+0x7c/0x90 [ 1433.976907][T26641] x64_sys_call+0x488/0x9a0 [ 1433.981411][T26641] do_syscall_64+0x4c/0xa0 [ 1433.985826][T26641] ? clear_bhb_loop+0x30/0x80 [ 1433.990507][T26641] ? clear_bhb_loop+0x30/0x80 [ 1433.995217][T26641] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1434.001111][T26641] RIP: 0033:0x7ff45338f749 [ 1434.005529][T26641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1434.025134][T26641] RSP: 002b:00007ff45428e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1434.033553][T26641] RAX: ffffffffffffffda RBX: 00007ff4535e5fa0 RCX: 00007ff45338f749 [ 1434.041529][T26641] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 1434.049505][T26641] RBP: 00007ff45428e090 R08: 0000000000000000 R09: 0000000000000000 [ 1434.057482][T26641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1434.065456][T26641] R13: 00007ff4535e6038 R14: 00007ff4535e5fa0 R15: 00007fff47a8ba38 [ 1434.073440][T26641] [ 1442.476022][T26867] tap0: tun_chr_ioctl cmd 2147767507 [ 1444.612777][T26915] device syzkaller0 entered promiscuous mode [ 1444.756079][T26931] device wg2 entered promiscuous mode [ 1447.180640][T26995] device syzkaller0 entered promiscuous mode [ 1450.388132][T27117] device syzkaller0 entered promiscuous mode [ 1450.396869][T27130] bond_slave_1: mtu less than device minimum [ 1452.726658][T27171] device wg2 left promiscuous mode [ 1452.757863][T27177] device wg2 entered promiscuous mode [ 1453.355364][T27211] device sit0 entered promiscuous mode [ 1457.536112][T27354] device veth0_vlan left promiscuous mode [ 1457.607204][T27354] device veth0_vlan entered promiscuous mode [ 1457.777162][T19795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1457.799619][T19795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1457.840717][T19795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1498.867943][T28440] device syzkaller0 entered promiscuous mode [ 1500.648064][T28496] device wg2 left promiscuous mode [ 1500.663104][T28497] device wg2 entered promiscuous mode [ 1506.957519][T28637] FAULT_INJECTION: forcing a failure. [ 1506.957519][T28637] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.126870][T28637] CPU: 0 PID: 28637 Comm: syz.0.7952 Not tainted syzkaller #0 [ 1507.134369][T28637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1507.144429][T28637] Call Trace: [ 1507.147713][T28637] [ 1507.150642][T28637] __dump_stack+0x21/0x24 [ 1507.154979][T28637] dump_stack_lvl+0xee/0x150 [ 1507.159572][T28637] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1507.164594][T28637] ? avc_has_perm+0x158/0x240 [ 1507.169277][T28637] dump_stack+0x15/0x24 [ 1507.173432][T28637] should_fail_ex+0x3d4/0x520 [ 1507.178111][T28637] __should_failslab+0xac/0xf0 [ 1507.182873][T28637] ? __get_vm_area_node+0x12c/0x360 [ 1507.188248][T28637] should_failslab+0x9/0x20 [ 1507.192765][T28637] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1507.198153][T28637] ? __get_vm_area_node+0x12c/0x360 [ 1507.203349][T28637] kmalloc_node_trace+0x26/0xb0 [ 1507.208200][T28637] __get_vm_area_node+0x12c/0x360 [ 1507.213314][T28637] __vmalloc_node_range+0x326/0x13d0 [ 1507.218594][T28637] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 1507.224138][T28637] ? arch_stack_walk+0xfc/0x150 [ 1507.228993][T28637] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 1507.234809][T28637] ? stack_trace_save+0x98/0xe0 [ 1507.239664][T28637] ? __cfi___vmalloc_node_range+0x10/0x10 [ 1507.245378][T28637] ? __cfi_selinux_capable+0x10/0x10 [ 1507.250661][T28637] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 1507.256210][T28637] __vmalloc+0x79/0x90 [ 1507.260285][T28637] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 1507.265835][T28637] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 1507.271210][T28637] bpf_prog_alloc+0x22/0x1c0 [ 1507.275813][T28637] bpf_prog_load+0x7c6/0x15a0 [ 1507.280498][T28637] ? map_freeze+0x390/0x390 [ 1507.285005][T28637] ? selinux_bpf+0xc7/0xf0 [ 1507.289597][T28637] ? security_bpf+0x93/0xb0 [ 1507.294103][T28637] __sys_bpf+0x504/0x780 [ 1507.298346][T28637] ? bpf_link_show_fdinfo+0x320/0x320 [ 1507.303731][T28637] ? __cfi_ksys_write+0x10/0x10 [ 1507.308597][T28637] ? debug_smp_processor_id+0x17/0x20 [ 1507.314042][T28637] __x64_sys_bpf+0x7c/0x90 [ 1507.318497][T28637] x64_sys_call+0x488/0x9a0 [ 1507.323010][T28637] do_syscall_64+0x4c/0xa0 [ 1507.327443][T28637] ? clear_bhb_loop+0x30/0x80 [ 1507.332238][T28637] ? clear_bhb_loop+0x30/0x80 [ 1507.336948][T28637] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1507.342868][T28637] RIP: 0033:0x7f384238f749 [ 1507.347301][T28637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1507.366925][T28637] RSP: 002b:00007f38432d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1507.375354][T28637] RAX: ffffffffffffffda RBX: 00007f38425e5fa0 RCX: 00007f384238f749 [ 1507.383336][T28637] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 1507.391314][T28637] RBP: 00007f38432d2090 R08: 0000000000000000 R09: 0000000000000000 [ 1507.399297][T28637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1507.407269][T28637] R13: 00007f38425e6038 R14: 00007f38425e5fa0 R15: 00007ffdeddf4278 [ 1507.415248][T28637] [ 1507.464132][T28637] syz.0.7952: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 1507.481261][T28637] CPU: 1 PID: 28637 Comm: syz.0.7952 Not tainted syzkaller #0 [ 1507.488821][T28637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1507.498884][T28637] Call Trace: [ 1507.502172][T28637] [ 1507.505098][T28637] __dump_stack+0x21/0x24 [ 1507.509440][T28637] dump_stack_lvl+0xee/0x150 [ 1507.514036][T28637] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1507.519074][T28637] ? pr_cont_kernfs_name+0x133/0x160 [ 1507.524362][T28637] dump_stack+0x15/0x24 [ 1507.528522][T28637] warn_alloc+0x1b0/0x1d0 [ 1507.532865][T28637] ? should_failslab+0x9/0x20 [ 1507.537544][T28637] ? __cfi_warn_alloc+0x10/0x10 [ 1507.542403][T28637] ? kmalloc_node_trace+0x3d/0xb0 [ 1507.547449][T28637] ? __get_vm_area_node+0x353/0x360 [ 1507.552656][T28637] __vmalloc_node_range+0x34b/0x13d0 [ 1507.557964][T28637] ? arch_stack_walk+0xfc/0x150 [ 1507.562832][T28637] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 1507.568570][T28637] ? stack_trace_save+0x98/0xe0 [ 1507.573441][T28637] ? __cfi___vmalloc_node_range+0x10/0x10 [ 1507.579162][T28637] ? __cfi_selinux_capable+0x10/0x10 [ 1507.584544][T28637] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 1507.590187][T28637] __vmalloc+0x79/0x90 [ 1507.594268][T28637] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 1507.599907][T28637] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 1507.605289][T28637] bpf_prog_alloc+0x22/0x1c0 [ 1507.609970][T28637] bpf_prog_load+0x7c6/0x15a0 [ 1507.614642][T28637] ? map_freeze+0x390/0x390 [ 1507.619143][T28637] ? selinux_bpf+0xc7/0xf0 [ 1507.623561][T28637] ? security_bpf+0x93/0xb0 [ 1507.628077][T28637] __sys_bpf+0x504/0x780 [ 1507.632327][T28637] ? bpf_link_show_fdinfo+0x320/0x320 [ 1507.637708][T28637] ? __cfi_ksys_write+0x10/0x10 [ 1507.642564][T28637] ? debug_smp_processor_id+0x17/0x20 [ 1507.647937][T28637] __x64_sys_bpf+0x7c/0x90 [ 1507.652376][T28637] x64_sys_call+0x488/0x9a0 [ 1507.656882][T28637] do_syscall_64+0x4c/0xa0 [ 1507.661299][T28637] ? clear_bhb_loop+0x30/0x80 [ 1507.665982][T28637] ? clear_bhb_loop+0x30/0x80 [ 1507.670671][T28637] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1507.676665][T28637] RIP: 0033:0x7f384238f749 [ 1507.681082][T28637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1507.700700][T28637] RSP: 002b:00007f38432d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1507.709122][T28637] RAX: ffffffffffffffda RBX: 00007f38425e5fa0 RCX: 00007f384238f749 [ 1507.717109][T28637] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 1507.725083][T28637] RBP: 00007f38432d2090 R08: 0000000000000000 R09: 0000000000000000 [ 1507.733070][T28637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1507.741040][T28637] R13: 00007f38425e6038 R14: 00007f38425e5fa0 R15: 00007ffdeddf4278 [ 1507.749026][T28637] [ 1507.778249][T28637] Mem-Info: [ 1507.781417][T28637] active_anon:20731 inactive_anon:0 isolated_anon:0 [ 1507.781417][T28637] active_file:30603 inactive_file:2833 isolated_file:0 [ 1507.781417][T28637] unevictable:0 dirty:218 writeback:0 [ 1507.781417][T28637] slab_reclaimable:7938 slab_unreclaimable:73258 [ 1507.781417][T28637] mapped:35027 shmem:163 pagetables:694 [ 1507.781417][T28637] sec_pagetables:0 bounce:0 [ 1507.781417][T28637] kernel_misc_reclaimable:0 [ 1507.781417][T28637] free:1490989 free_pcp:11232 free_cma:0 [ 1507.856429][T28637] Node 0 active_anon:82924kB inactive_anon:0kB active_file:122412kB inactive_file:11332kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:140108kB dirty:872kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5456kB pagetables:2776kB sec_pagetables:0kB all_unreclaimable? no [ 1507.898386][T28637] DMA32 free:2968532kB boost:0kB min:31288kB low:39108kB high:46928kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2974180kB mlocked:0kB bounce:0kB free_pcp:5648kB local_pcp:0kB free_cma:0kB [ 1507.926762][T28637] lowmem_reserve[]: 0 3932 3932 3932 [ 1507.932446][T28637] Normal free:2996124kB boost:0kB min:42436kB low:53044kB high:63652kB reserved_highatomic:0KB active_anon:82992kB inactive_anon:0kB active_file:122412kB inactive_file:11332kB unevictable:0kB writepending:912kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:47000kB local_pcp:20876kB free_cma:0kB [ 1507.965078][T28637] lowmem_reserve[]: 0 0 0 0 [ 1507.969629][T28637] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 1507.985655][T28637] Normal: 1343*4kB (UME) 1209*8kB (UME) 796*16kB (UME) 1803*32kB (UME) 810*64kB (UME) 475*128kB (UME) 195*256kB (UME) 98*512kB (UM) 74*1024kB (UME) 29*2048kB (UME) 632*4096kB (UM) = 3022052kB [ 1508.006128][T28637] 33599 total pagecache pages [ 1508.010847][T28637] 0 pages in swap cache [ 1508.015332][T28637] Free swap = 124996kB [ 1508.019952][T28637] Total swap = 124996kB [ 1508.024106][T28637] 2097051 pages RAM [ 1508.028339][T28637] 0 pages HighMem/MovableOnly [ 1508.033245][T28637] 346842 pages reserved [ 1508.037496][T28637] 0 pages cma reserved [ 1528.524302][T29076] : renamed from bond_slave_0 [ 1531.528270][T29143] FAULT_INJECTION: forcing a failure. [ 1531.528270][T29143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1531.585648][T29143] CPU: 0 PID: 29143 Comm: syz.2.8089 Not tainted syzkaller #0 [ 1531.593314][T29143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1531.603372][T29143] Call Trace: [ 1531.606653][T29143] [ 1531.609582][T29143] __dump_stack+0x21/0x24 [ 1531.613917][T29143] dump_stack_lvl+0xee/0x150 [ 1531.618504][T29143] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1531.623528][T29143] dump_stack+0x15/0x24 [ 1531.627680][T29143] should_fail_ex+0x3d4/0x520 [ 1531.632387][T29143] should_fail+0xb/0x10 [ 1531.636546][T29143] should_fail_usercopy+0x1a/0x20 [ 1531.641578][T29143] _copy_from_user+0x1e/0xc0 [ 1531.646171][T29143] generic_map_update_batch+0x458/0x780 [ 1531.651735][T29143] ? __cfi_generic_map_update_batch+0x10/0x10 [ 1531.657817][T29143] ? __fdget+0x19c/0x220 [ 1531.662060][T29143] ? __cfi_generic_map_update_batch+0x10/0x10 [ 1531.668132][T29143] bpf_map_do_batch+0x48c/0x620 [ 1531.672990][T29143] __sys_bpf+0x624/0x780 [ 1531.677231][T29143] ? bpf_link_show_fdinfo+0x320/0x320 [ 1531.682609][T29143] ? __cfi_sched_clock_cpu+0x10/0x10 [ 1531.687897][T29143] __x64_sys_bpf+0x7c/0x90 [ 1531.692320][T29143] x64_sys_call+0x488/0x9a0 [ 1531.696830][T29143] do_syscall_64+0x4c/0xa0 [ 1531.701246][T29143] ? clear_bhb_loop+0x30/0x80 [ 1531.705933][T29143] ? clear_bhb_loop+0x30/0x80 [ 1531.710619][T29143] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1531.716526][T29143] RIP: 0033:0x7ff45338f749 [ 1531.720940][T29143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1531.740543][T29143] RSP: 002b:00007ff45428e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1531.748961][T29143] RAX: ffffffffffffffda RBX: 00007ff4535e5fa0 RCX: 00007ff45338f749 [ 1531.756939][T29143] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 1531.764935][T29143] RBP: 00007ff45428e090 R08: 0000000000000000 R09: 0000000000000000 [ 1531.772906][T29143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1531.780880][T29143] R13: 00007ff4535e6038 R14: 00007ff4535e5fa0 R15: 00007fff47a8ba38 [ 1531.788858][T29143] [ 1538.305871][T29306] device veth0_vlan left promiscuous mode [ 1538.312141][T29306] device veth0_vlan entered promiscuous mode [ 1538.320899][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1538.345581][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1538.368626][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1539.525632][T29330] syz.0.8147[29330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1539.525725][T29330] syz.0.8147[29330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1539.825028][T29335] device pim6reg1 entered promiscuous mode [ 1547.088380][T29475] device pim6reg1 entered promiscuous mode [ 1566.665193][T29805] device wg2 left promiscuous mode [ 1567.031244][T29812] device syzkaller0 entered promiscuous mode [ 1569.170715][T29837] device pim6reg1 entered promiscuous mode [ 1578.943854][ T28] audit: type=1400 audit(1767883808.227:157): avc: denied { create } for pid=29958 comm="syz.1.8311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 1579.363843][T29989] FAULT_INJECTION: forcing a failure. [ 1579.363843][T29989] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1579.380235][T29989] CPU: 0 PID: 29989 Comm: syz.0.8318 Not tainted syzkaller #0 [ 1579.387717][T29989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1579.397781][T29989] Call Trace: [ 1579.401063][T29989] [ 1579.404000][T29989] __dump_stack+0x21/0x24 [ 1579.408344][T29989] dump_stack_lvl+0xee/0x150 [ 1579.413035][T29989] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1579.418071][T29989] dump_stack+0x15/0x24 [ 1579.422224][T29989] should_fail_ex+0x3d4/0x520 [ 1579.426917][T29989] should_fail+0xb/0x10 [ 1579.431075][T29989] should_fail_usercopy+0x1a/0x20 [ 1579.436098][T29989] _copy_from_user+0x1e/0xc0 [ 1579.440689][T29989] __sys_bpf+0x277/0x780 [ 1579.444939][T29989] ? bpf_link_show_fdinfo+0x320/0x320 [ 1579.450394][T29989] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1579.456296][T29989] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1579.462469][T29989] __x64_sys_bpf+0x7c/0x90 [ 1579.466938][T29989] x64_sys_call+0x488/0x9a0 [ 1579.471441][T29989] do_syscall_64+0x4c/0xa0 [ 1579.475873][T29989] ? clear_bhb_loop+0x30/0x80 [ 1579.480565][T29989] ? clear_bhb_loop+0x30/0x80 [ 1579.485244][T29989] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1579.491141][T29989] RIP: 0033:0x7f384238f749 [ 1579.495558][T29989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1579.515150][T29989] RSP: 002b:00007f38432d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1579.523566][T29989] RAX: ffffffffffffffda RBX: 00007f38425e5fa0 RCX: 00007f384238f749 [ 1579.531540][T29989] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 1579.539507][T29989] RBP: 00007f38432d2090 R08: 0000000000000000 R09: 0000000000000000 [ 1579.547466][T29989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1579.555418][T29989] R13: 00007f38425e6038 R14: 00007f38425e5fa0 R15: 00007ffdeddf4278 [ 1579.563385][T29989] [ 1580.720858][T30023] syz.4.8326[30023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1580.753696][T30023] syz.4.8326[30023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1580.959177][T30025] bond_slave_1: mtu less than device minimum [ 1590.215754][T30209] Q6`Ҙ: renamed from lo [ 1591.528366][T30236] bond_slave_1: mtu less than device minimum [ 1595.438619][T30310] FAULT_INJECTION: forcing a failure. [ 1595.438619][T30310] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.551013][T30310] CPU: 1 PID: 30310 Comm: syz.0.8404 Not tainted syzkaller #0 [ 1595.558507][T30310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1595.568577][T30310] Call Trace: [ 1595.571945][T30310] [ 1595.574875][T30310] __dump_stack+0x21/0x24 [ 1595.579300][T30310] dump_stack_lvl+0xee/0x150 [ 1595.583891][T30310] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1595.588916][T30310] dump_stack+0x15/0x24 [ 1595.593081][T30310] should_fail_ex+0x3d4/0x520 [ 1595.597776][T30310] __should_failslab+0xac/0xf0 [ 1595.602555][T30310] ? __request_module+0x28f/0x890 [ 1595.607584][T30310] should_failslab+0x9/0x20 [ 1595.612092][T30310] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1595.617475][T30310] ? __request_module+0x28f/0x890 [ 1595.622512][T30310] __kmalloc_node_track_caller+0xa0/0x1e0 [ 1595.628258][T30310] ? __kasan_kmalloc+0x95/0xb0 [ 1595.633031][T30310] kstrdup+0x3b/0x80 [ 1595.636938][T30310] __request_module+0x28f/0x890 [ 1595.641799][T30310] ? __cfi___request_module+0x10/0x10 [ 1595.647363][T30310] ? cap_capable+0x1aa/0x230 [ 1595.651960][T30310] ? security_capable+0x99/0xc0 [ 1595.656816][T30310] dev_load+0x5b/0xb0 [ 1595.660804][T30310] dev_ioctl+0x53f/0xd10 [ 1595.665061][T30310] sock_do_ioctl+0x23f/0x310 [ 1595.669653][T30310] ? sock_show_fdinfo+0xb0/0xb0 [ 1595.674501][T30310] ? selinux_file_ioctl+0x377/0x480 [ 1595.679706][T30310] sock_ioctl+0x4d8/0x6e0 [ 1595.684040][T30310] ? __cfi_sock_ioctl+0x10/0x10 [ 1595.688893][T30310] ? __fget_files+0x2d5/0x330 [ 1595.693574][T30310] ? security_file_ioctl+0x95/0xc0 [ 1595.698692][T30310] ? __cfi_sock_ioctl+0x10/0x10 [ 1595.703551][T30310] __se_sys_ioctl+0x12f/0x1b0 [ 1595.708229][T30310] __x64_sys_ioctl+0x7b/0x90 [ 1595.712821][T30310] x64_sys_call+0x58b/0x9a0 [ 1595.717331][T30310] do_syscall_64+0x4c/0xa0 [ 1595.721750][T30310] ? clear_bhb_loop+0x30/0x80 [ 1595.726536][T30310] ? clear_bhb_loop+0x30/0x80 [ 1595.731220][T30310] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1595.737120][T30310] RIP: 0033:0x7f384238f749 [ 1595.741543][T30310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1595.761154][T30310] RSP: 002b:00007f38432d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1595.769577][T30310] RAX: ffffffffffffffda RBX: 00007f38425e5fa0 RCX: 00007f384238f749 [ 1595.777552][T30310] RDX: 0000200000000080 RSI: 0000000000008991 RDI: 0000000000000004 [ 1595.785522][T30310] RBP: 00007f38432d2090 R08: 0000000000000000 R09: 0000000000000000 [ 1595.793497][T30310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1595.801476][T30310] R13: 00007f38425e6038 R14: 00007f38425e5fa0 R15: 00007ffdeddf4278 [ 1595.809458][T30310] [ 1596.565546][T30333] device sit0 left promiscuous mode [ 1596.619971][T30333] device sit0 entered promiscuous mode [ 1597.403550][T30352] device wg2 left promiscuous mode [ 1599.218018][T30387] device syzkaller0 entered promiscuous mode [ 1601.801405][T30473] device wg2 left promiscuous mode [ 1602.933893][T30495] device syzkaller0 entered promiscuous mode [ 1603.653679][T30475] device wg2 entered promiscuous mode [ 1607.093286][T30562] device syzkaller0 entered promiscuous mode [ 1607.191055][T30565] device syzkaller0 entered promiscuous mode [ 1607.953670][T30577] veth0_macvtap: mtu greater than device maximum [ 1610.212927][T30623] device syzkaller0 entered promiscuous mode [ 1610.287089][T30620] device veth0_vlan left promiscuous mode [ 1610.320918][T30620] device veth0_vlan entered promiscuous mode [ 1610.448781][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1610.485776][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1610.544750][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1619.270378][T30794] FAULT_INJECTION: forcing a failure. [ 1619.270378][T30794] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1619.411998][T30794] CPU: 1 PID: 30794 Comm: syz.0.8545 Not tainted syzkaller #0 [ 1619.419494][T30794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1619.429556][T30794] Call Trace: [ 1619.432832][T30794] [ 1619.435759][T30794] __dump_stack+0x21/0x24 [ 1619.440235][T30794] dump_stack_lvl+0xee/0x150 [ 1619.444843][T30794] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1619.449875][T30794] dump_stack+0x15/0x24 [ 1619.454043][T30794] should_fail_ex+0x3d4/0x520 [ 1619.458729][T30794] should_fail+0xb/0x10 [ 1619.462887][T30794] should_fail_usercopy+0x1a/0x20 [ 1619.467922][T30794] _copy_from_user+0x1e/0xc0 [ 1619.472506][T30794] dev_ethtool+0xc1/0x1190 [ 1619.476916][T30794] ? __cfi_dev_ethtool+0x10/0x10 [ 1619.481944][T30794] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1619.488104][T30794] ? dev_get_by_name_rcu+0xe5/0x130 [ 1619.493299][T30794] dev_ioctl+0x473/0xd10 [ 1619.497534][T30794] sock_do_ioctl+0x23f/0x310 [ 1619.502191][T30794] ? sock_show_fdinfo+0xb0/0xb0 [ 1619.507027][T30794] ? __kasan_check_read+0x11/0x20 [ 1619.512130][T30794] ? preempt_schedule_irq+0xbb/0x110 [ 1619.517409][T30794] ? preempt_schedule_notrace+0x71/0x110 [ 1619.523045][T30794] ? selinux_file_ioctl+0x377/0x480 [ 1619.528230][T30794] sock_ioctl+0x4d8/0x6e0 [ 1619.532551][T30794] ? __cfi_sock_ioctl+0x10/0x10 [ 1619.537385][T30794] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1619.543523][T30794] ? __se_sys_ioctl+0x62/0x1b0 [ 1619.548270][T30794] ? __cfi_sock_ioctl+0x10/0x10 [ 1619.553138][T30794] __se_sys_ioctl+0x12f/0x1b0 [ 1619.557797][T30794] __x64_sys_ioctl+0x7b/0x90 [ 1619.562366][T30794] x64_sys_call+0x58b/0x9a0 [ 1619.566851][T30794] do_syscall_64+0x4c/0xa0 [ 1619.571248][T30794] ? clear_bhb_loop+0x30/0x80 [ 1619.575910][T30794] ? clear_bhb_loop+0x30/0x80 [ 1619.580573][T30794] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1619.586449][T30794] RIP: 0033:0x7f384238f749 [ 1619.590845][T30794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1619.610432][T30794] RSP: 002b:00007f38432d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1619.618831][T30794] RAX: ffffffffffffffda RBX: 00007f38425e5fa0 RCX: 00007f384238f749 [ 1619.626786][T30794] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000020 [ 1619.634931][T30794] RBP: 00007f38432d2090 R08: 0000000000000000 R09: 0000000000000000 [ 1619.642887][T30794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1619.650935][T30794] R13: 00007f38425e6038 R14: 00007f38425e5fa0 R15: 00007ffdeddf4278 [ 1619.658893][T30794] [ 1623.514082][T30868] device veth0_vlan left promiscuous mode [ 1623.520877][T30868] device veth0_vlan entered promiscuous mode [ 1623.606111][T30872] device sit0 left promiscuous mode [ 1623.626308][T30872] device sit0 entered promiscuous mode [ 1626.138531][T30912] device veth0_vlan left promiscuous mode [ 1626.155713][T30912] device veth0_vlan entered promiscuous mode [ 1626.256725][T19795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1626.264738][T19795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1626.364871][T19795] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1629.892015][T30994] FAULT_INJECTION: forcing a failure. [ 1629.892015][T30994] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1630.084843][T30994] CPU: 0 PID: 30994 Comm: syz.3.8596 Not tainted syzkaller #0 [ 1630.092339][T30994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1630.102405][T30994] Call Trace: [ 1630.105688][T30994] [ 1630.108632][T30994] __dump_stack+0x21/0x24 [ 1630.112973][T30994] dump_stack_lvl+0xee/0x150 [ 1630.117571][T30994] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1630.122611][T30994] dump_stack+0x15/0x24 [ 1630.126778][T30994] should_fail_ex+0x3d4/0x520 [ 1630.131480][T30994] should_fail+0xb/0x10 [ 1630.135649][T30994] should_fail_usercopy+0x1a/0x20 [ 1630.140688][T30994] _copy_to_user+0x1e/0x90 [ 1630.145130][T30994] simple_read_from_buffer+0xe9/0x160 [ 1630.150514][T30994] proc_fail_nth_read+0x19a/0x210 [ 1630.155558][T30994] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1630.161117][T30994] ? security_file_permission+0x94/0xb0 [ 1630.166778][T30994] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 1630.172337][T30994] vfs_read+0x26e/0x8c0 [ 1630.176517][T30994] ? __cfi_vfs_read+0x10/0x10 [ 1630.181211][T30994] ? __kasan_check_write+0x14/0x20 [ 1630.186336][T30994] ? mutex_lock+0x8d/0x1a0 [ 1630.190764][T30994] ? __cfi_mutex_lock+0x10/0x10 [ 1630.195632][T30994] ? __fdget_pos+0x2cd/0x380 [ 1630.200319][T30994] ? ksys_read+0x71/0x240 [ 1630.204655][T30994] ksys_read+0x140/0x240 [ 1630.208932][T30994] ? __cfi_ksys_read+0x10/0x10 [ 1630.213703][T30994] ? fpregs_restore_userregs+0x128/0x260 [ 1630.219340][T30994] __x64_sys_read+0x7b/0x90 [ 1630.223930][T30994] x64_sys_call+0x2f/0x9a0 [ 1630.228340][T30994] do_syscall_64+0x4c/0xa0 [ 1630.232746][T30994] ? clear_bhb_loop+0x30/0x80 [ 1630.237418][T30994] ? clear_bhb_loop+0x30/0x80 [ 1630.242111][T30994] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1630.248088][T30994] RIP: 0033:0x7f7f2a58e15c [ 1630.252497][T30994] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1630.272091][T30994] RSP: 002b:00007f7f2b457030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1630.280495][T30994] RAX: ffffffffffffffda RBX: 00007f7f2a7e5fa0 RCX: 00007f7f2a58e15c [ 1630.288455][T30994] RDX: 000000000000000f RSI: 00007f7f2b4570a0 RDI: 0000000000000006 [ 1630.296412][T30994] RBP: 00007f7f2b457090 R08: 0000000000000000 R09: 0000000000000000 [ 1630.304372][T30994] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1630.312340][T30994] R13: 00007f7f2a7e6038 R14: 00007f7f2a7e5fa0 R15: 00007fffd5164458 [ 1630.320370][T30994] [ 1640.304247][T31161] device sit0 entered promiscuous mode [ 1641.239999][T31170] FAULT_INJECTION: forcing a failure. [ 1641.239999][T31170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1641.316498][T31170] CPU: 1 PID: 31170 Comm: syz.1.8644 Not tainted syzkaller #0 [ 1641.324000][T31170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1641.334073][T31170] Call Trace: [ 1641.337358][T31170] [ 1641.340294][T31170] __dump_stack+0x21/0x24 [ 1641.344630][T31170] dump_stack_lvl+0xee/0x150 [ 1641.349235][T31170] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1641.354266][T31170] dump_stack+0x15/0x24 [ 1641.358428][T31170] should_fail_ex+0x3d4/0x520 [ 1641.363113][T31170] should_fail+0xb/0x10 [ 1641.367274][T31170] should_fail_usercopy+0x1a/0x20 [ 1641.372392][T31170] _copy_from_user+0x1e/0xc0 [ 1641.376990][T31170] __sys_bpf+0x277/0x780 [ 1641.381322][T31170] ? bpf_link_show_fdinfo+0x320/0x320 [ 1641.386705][T31170] ? __cfi_ksys_write+0x10/0x10 [ 1641.391649][T31170] ? debug_smp_processor_id+0x17/0x20 [ 1641.397021][T31170] __x64_sys_bpf+0x7c/0x90 [ 1641.401446][T31170] x64_sys_call+0x488/0x9a0 [ 1641.406036][T31170] do_syscall_64+0x4c/0xa0 [ 1641.410450][T31170] ? clear_bhb_loop+0x30/0x80 [ 1641.415130][T31170] ? clear_bhb_loop+0x30/0x80 [ 1641.419812][T31170] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1641.425715][T31170] RIP: 0033:0x7fb6ad78f749 [ 1641.430136][T31170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1641.449745][T31170] RSP: 002b:00007fb6ae5b0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1641.458189][T31170] RAX: ffffffffffffffda RBX: 00007fb6ad9e5fa0 RCX: 00007fb6ad78f749 [ 1641.466184][T31170] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 1641.474166][T31170] RBP: 00007fb6ae5b0090 R08: 0000000000000000 R09: 0000000000000000 [ 1641.482243][T31170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1641.490218][T31170] R13: 00007fb6ad9e6038 R14: 00007fb6ad9e5fa0 R15: 00007fffbbbec618 [ 1641.498195][T31170] [ 1647.658899][T31307] FAULT_INJECTION: forcing a failure. [ 1647.658899][T31307] name failslab, interval 1, probability 0, space 0, times 0 [ 1647.705035][T31307] CPU: 0 PID: 31307 Comm: syz.1.8679 Not tainted syzkaller #0 [ 1647.712528][T31307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1647.722587][T31307] Call Trace: [ 1647.725873][T31307] [ 1647.728809][T31307] __dump_stack+0x21/0x24 [ 1647.733145][T31307] dump_stack_lvl+0xee/0x150 [ 1647.737745][T31307] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1647.742776][T31307] dump_stack+0x15/0x24 [ 1647.746933][T31307] should_fail_ex+0x3d4/0x520 [ 1647.751616][T31307] __should_failslab+0xac/0xf0 [ 1647.756384][T31307] ? bpf_prog_test_run_skb+0x24f/0x1290 [ 1647.761943][T31307] should_failslab+0x9/0x20 [ 1647.766446][T31307] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1647.771819][T31307] ? bpf_prog_test_run_skb+0x24f/0x1290 [ 1647.777377][T31307] __kmalloc+0xa1/0x1e0 [ 1647.781535][T31307] bpf_prog_test_run_skb+0x24f/0x1290 [ 1647.786909][T31307] ? __fget_files+0x2d5/0x330 [ 1647.791585][T31307] ? __kasan_check_write+0x14/0x20 [ 1647.796693][T31307] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 1647.802508][T31307] bpf_prog_test_run+0x3e3/0x630 [ 1647.807444][T31307] ? slab_free_freelist_hook+0xc2/0x190 [ 1647.812994][T31307] ? bpf_prog_query+0x270/0x270 [ 1647.817845][T31307] ? selinux_bpf+0xce/0xf0 [ 1647.822260][T31307] ? security_bpf+0x93/0xb0 [ 1647.826763][T31307] __sys_bpf+0x56d/0x780 [ 1647.831004][T31307] ? bpf_link_show_fdinfo+0x320/0x320 [ 1647.836377][T31307] ? __cfi_ksys_write+0x10/0x10 [ 1647.841238][T31307] ? debug_smp_processor_id+0x17/0x20 [ 1647.846616][T31307] __x64_sys_bpf+0x7c/0x90 [ 1647.851045][T31307] x64_sys_call+0x488/0x9a0 [ 1647.855549][T31307] do_syscall_64+0x4c/0xa0 [ 1647.859971][T31307] ? clear_bhb_loop+0x30/0x80 [ 1647.864659][T31307] ? clear_bhb_loop+0x30/0x80 [ 1647.869346][T31307] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1647.875247][T31307] RIP: 0033:0x7fb6ad78f749 [ 1647.879659][T31307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1647.899265][T31307] RSP: 002b:00007fb6ae5b0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1647.907689][T31307] RAX: ffffffffffffffda RBX: 00007fb6ad9e5fa0 RCX: 00007fb6ad78f749 [ 1647.915696][T31307] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 1647.923670][T31307] RBP: 00007fb6ae5b0090 R08: 0000000000000000 R09: 0000000000000000 [ 1647.931643][T31307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1647.939617][T31307] R13: 00007fb6ad9e6038 R14: 00007fb6ad9e5fa0 R15: 00007fffbbbec618 [ 1647.947598][T31307] [ 1649.573911][T31358] veth0_macvtap: mtu greater than device maximum [ 1650.022929][T31370] FAULT_INJECTION: forcing a failure. [ 1650.022929][T31370] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1650.202021][T31370] CPU: 0 PID: 31370 Comm: syz.1.8696 Not tainted syzkaller #0 [ 1650.209524][T31370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1650.219676][T31370] Call Trace: [ 1650.222960][T31370] [ 1650.225895][T31370] __dump_stack+0x21/0x24 [ 1650.230235][T31370] dump_stack_lvl+0xee/0x150 [ 1650.234836][T31370] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1650.239878][T31370] dump_stack+0x15/0x24 [ 1650.244041][T31370] should_fail_ex+0x3d4/0x520 [ 1650.248731][T31370] should_fail+0xb/0x10 [ 1650.252904][T31370] should_fail_usercopy+0x1a/0x20 [ 1650.257951][T31370] _copy_from_user+0x1e/0xc0 [ 1650.262562][T31370] __sys_bpf+0x277/0x780 [ 1650.266849][T31370] ? bpf_link_show_fdinfo+0x320/0x320 [ 1650.272234][T31370] ? __cfi_sched_clock_cpu+0x10/0x10 [ 1650.277536][T31370] __x64_sys_bpf+0x7c/0x90 [ 1650.281968][T31370] x64_sys_call+0x488/0x9a0 [ 1650.286498][T31370] do_syscall_64+0x4c/0xa0 [ 1650.290935][T31370] ? clear_bhb_loop+0x30/0x80 [ 1650.295623][T31370] ? clear_bhb_loop+0x30/0x80 [ 1650.300318][T31370] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1650.306247][T31370] RIP: 0033:0x7fb6ad78f749 [ 1650.310672][T31370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1650.330371][T31370] RSP: 002b:00007fb6ae5b0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1650.338823][T31370] RAX: ffffffffffffffda RBX: 00007fb6ad9e5fa0 RCX: 00007fb6ad78f749 [ 1650.346803][T31370] RDX: 0000000000000050 RSI: 00002000000008c0 RDI: 0000000000000000 [ 1650.354781][T31370] RBP: 00007fb6ae5b0090 R08: 0000000000000000 R09: 0000000000000000 [ 1650.362763][T31370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1650.370749][T31370] R13: 00007fb6ad9e6038 R14: 00007fb6ad9e5fa0 R15: 00007fffbbbec618 [ 1650.378726][T31370] [ 1656.641912][T31464] syz.4.8722[31464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1656.641981][T31464] syz.4.8722[31464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1658.664168][ T28] audit: type=1400 audit(1767883887.947:158): avc: denied { attach_queue } for pid=31509 comm="syz.3.8735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1659.362081][T31508] device sit0 left promiscuous mode [ 1659.617457][T31523] device sit0 entered promiscuous mode [ 1660.131306][T31535] FAULT_INJECTION: forcing a failure. [ 1660.131306][T31535] name failslab, interval 1, probability 0, space 0, times 0 [ 1660.219410][T31535] CPU: 1 PID: 31535 Comm: syz.2.8741 Not tainted syzkaller #0 [ 1660.226899][T31535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1660.236961][T31535] Call Trace: [ 1660.240236][T31535] [ 1660.243161][T31535] __dump_stack+0x21/0x24 [ 1660.247487][T31535] dump_stack_lvl+0xee/0x150 [ 1660.252082][T31535] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1660.257102][T31535] dump_stack+0x15/0x24 [ 1660.261255][T31535] should_fail_ex+0x3d4/0x520 [ 1660.266211][T31535] __should_failslab+0xac/0xf0 [ 1660.271004][T31535] ? call_usermodehelper_setup+0x8e/0x210 [ 1660.276739][T31535] should_failslab+0x9/0x20 [ 1660.281243][T31535] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1660.286623][T31535] ? call_usermodehelper_setup+0x8e/0x210 [ 1660.292358][T31535] kmalloc_trace+0x29/0xb0 [ 1660.296780][T31535] call_usermodehelper_setup+0x8e/0x210 [ 1660.302331][T31535] ? __cfi_free_modprobe_argv+0x10/0x10 [ 1660.307875][T31535] __request_module+0x35d/0x890 [ 1660.312730][T31535] ? __cfi___request_module+0x10/0x10 [ 1660.318101][T31535] ? cap_capable+0x1aa/0x230 [ 1660.322695][T31535] ? security_capable+0x99/0xc0 [ 1660.327543][T31535] dev_load+0x5b/0xb0 [ 1660.331520][T31535] dev_ioctl+0x53f/0xd10 [ 1660.335761][T31535] sock_do_ioctl+0x23f/0x310 [ 1660.340341][T31535] ? sock_show_fdinfo+0xb0/0xb0 [ 1660.345184][T31535] ? selinux_file_ioctl+0x377/0x480 [ 1660.350382][T31535] sock_ioctl+0x4d8/0x6e0 [ 1660.354713][T31535] ? __cfi_sock_ioctl+0x10/0x10 [ 1660.359559][T31535] ? __fget_files+0x2d5/0x330 [ 1660.364230][T31535] ? security_file_ioctl+0x95/0xc0 [ 1660.369336][T31535] ? __cfi_sock_ioctl+0x10/0x10 [ 1660.374185][T31535] __se_sys_ioctl+0x12f/0x1b0 [ 1660.378856][T31535] __x64_sys_ioctl+0x7b/0x90 [ 1660.383440][T31535] x64_sys_call+0x58b/0x9a0 [ 1660.387940][T31535] do_syscall_64+0x4c/0xa0 [ 1660.392349][T31535] ? clear_bhb_loop+0x30/0x80 [ 1660.397023][T31535] ? clear_bhb_loop+0x30/0x80 [ 1660.401700][T31535] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1660.407678][T31535] RIP: 0033:0x7ff45338f749 [ 1660.412103][T31535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1660.431707][T31535] RSP: 002b:00007ff45428e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1660.440127][T31535] RAX: ffffffffffffffda RBX: 00007ff4535e5fa0 RCX: 00007ff45338f749 [ 1660.448093][T31535] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000008 [ 1660.456062][T31535] RBP: 00007ff45428e090 R08: 0000000000000000 R09: 0000000000000000 [ 1660.464037][T31535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1660.472021][T31535] R13: 00007ff4535e6038 R14: 00007ff4535e5fa0 R15: 00007fff47a8ba38 [ 1660.480008][T31535] [ 1664.387897][T31585] device veth0_vlan left promiscuous mode [ 1664.405876][T31585] device veth0_vlan entered promiscuous mode [ 1664.465595][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1664.494284][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1664.567800][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1666.455952][T31638] device pim6reg1 entered promiscuous mode [ 1668.797434][T31680] bond_slave_1: mtu less than device minimum [ 1671.679172][T31717] bridge0: port 1(bridge_slave_0) entered blocking state [ 1671.727040][T31717] bridge0: port 1(bridge_slave_0) entered disabled state [ 1671.806674][T31717] device bridge_slave_0 entered promiscuous mode [ 1672.104628][T31717] bridge0: port 2(bridge_slave_1) entered blocking state [ 1672.118561][T31717] bridge0: port 2(bridge_slave_1) entered disabled state [ 1672.149398][T31717] device bridge_slave_1 entered promiscuous mode [ 1672.324716][T31744] device syzkaller0 entered promiscuous mode [ 1673.067799][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1673.084470][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1673.122125][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1673.132375][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1673.142778][ T4903] bridge0: port 1(bridge_slave_0) entered blocking state [ 1673.149852][ T4903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1673.159246][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1673.167983][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1673.177363][ T4903] bridge0: port 2(bridge_slave_1) entered blocking state [ 1673.184430][ T4903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1673.192539][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1673.201574][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1673.237285][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1673.251784][T31717] device veth0_vlan entered promiscuous mode [ 1673.261019][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1673.269884][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1673.279003][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1673.314627][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1673.344210][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1673.356878][T31717] device veth1_macvtap entered promiscuous mode [ 1673.405076][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1673.414620][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1673.439076][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1673.448356][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1673.672304][ T43] device bridge_slave_1 left promiscuous mode [ 1673.699080][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 1673.723077][ T43] device O3c left promiscuous mode [ 1673.729457][ T43] bridge0: port 1(O3c) entered disabled state [ 1673.845802][ T43] device veth1_macvtap left promiscuous mode [ 1674.439444][T31764] bridge0: port 2(bridge_slave_1) entered disabled state [ 1674.446704][T31764] bridge0: port 1(bridge_slave_0) entered disabled state [ 1675.462031][T31779] bridge0: port 1(bridge_slave_0) entered blocking state [ 1675.469159][T31779] bridge0: port 1(bridge_slave_0) entered disabled state [ 1675.476855][T31779] device bridge_slave_0 entered promiscuous mode [ 1675.493938][T31779] bridge0: port 2(bridge_slave_1) entered blocking state [ 1675.503443][T31779] bridge0: port 2(bridge_slave_1) entered disabled state [ 1675.513355][T31779] device bridge_slave_1 entered promiscuous mode [ 1675.609531][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1675.617182][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1675.666287][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1675.737274][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1675.820587][T28140] bridge0: port 1(bridge_slave_0) entered blocking state [ 1675.827668][T28140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1675.903866][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1675.912434][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1675.920870][T28140] bridge0: port 2(bridge_slave_1) entered blocking state [ 1675.927929][T28140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1676.009319][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1676.068242][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1678.759442][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1678.784846][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1678.802064][T31779] device veth0_vlan entered promiscuous mode [ 1678.848185][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1678.859282][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1678.873676][T31779] device veth1_macvtap entered promiscuous mode [ 1678.922801][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1678.934716][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1678.942694][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1678.956415][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1678.964547][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1679.024286][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1679.032560][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1679.043582][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1679.051972][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1680.028606][ T43] device bridge_slave_1 left promiscuous mode [ 1680.034771][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 1680.133975][ T43] device O3c left promiscuous mode [ 1680.218848][ T43] bridge0: port 1(O3c) entered disabled state [ 1680.248585][ T43] device veth1_macvtap left promiscuous mode [ 1680.254681][ T43] device veth0_vlan left promiscuous mode [ 1681.533682][T31871] bridge0: port 2(bridge_slave_1) entered disabled state [ 1681.545467][T31871] bridge0: port 1(bridge_slave_0) entered disabled state [ 1686.817967][T31980] FAULT_INJECTION: forcing a failure. [ 1686.817967][T31980] name failslab, interval 1, probability 0, space 0, times 0 [ 1687.005195][T31980] CPU: 0 PID: 31980 Comm: syz.4.8856 Not tainted syzkaller #0 [ 1687.012688][T31980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1687.022835][T31980] Call Trace: [ 1687.026122][T31980] [ 1687.029048][T31980] __dump_stack+0x21/0x24 [ 1687.033385][T31980] dump_stack_lvl+0xee/0x150 [ 1687.038061][T31980] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1687.043089][T31980] dump_stack+0x15/0x24 [ 1687.047243][T31980] should_fail_ex+0x3d4/0x520 [ 1687.051942][T31980] __should_failslab+0xac/0xf0 [ 1687.056710][T31980] ? call_usermodehelper_setup+0x8e/0x210 [ 1687.062433][T31980] should_failslab+0x9/0x20 [ 1687.066946][T31980] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1687.072323][T31980] ? call_usermodehelper_setup+0x8e/0x210 [ 1687.078044][T31980] kmalloc_trace+0x29/0xb0 [ 1687.082462][T31980] call_usermodehelper_setup+0x8e/0x210 [ 1687.088011][T31980] ? __cfi_free_modprobe_argv+0x10/0x10 [ 1687.093561][T31980] __request_module+0x35d/0x890 [ 1687.098412][T31980] ? __cfi___request_module+0x10/0x10 [ 1687.103872][T31980] ? cap_capable+0x1aa/0x230 [ 1687.108466][T31980] ? security_capable+0x99/0xc0 [ 1687.113317][T31980] dev_load+0x5b/0xb0 [ 1687.117300][T31980] dev_ioctl+0x53f/0xd10 [ 1687.121553][T31980] sock_do_ioctl+0x23f/0x310 [ 1687.126140][T31980] ? sock_show_fdinfo+0xb0/0xb0 [ 1687.130986][T31980] ? selinux_file_ioctl+0x377/0x480 [ 1687.136179][T31980] sock_ioctl+0x4d8/0x6e0 [ 1687.140508][T31980] ? __cfi_sock_ioctl+0x10/0x10 [ 1687.145367][T31980] ? __fget_files+0x2d5/0x330 [ 1687.150047][T31980] ? security_file_ioctl+0x95/0xc0 [ 1687.155170][T31980] ? __cfi_sock_ioctl+0x10/0x10 [ 1687.160021][T31980] __se_sys_ioctl+0x12f/0x1b0 [ 1687.164702][T31980] __x64_sys_ioctl+0x7b/0x90 [ 1687.169290][T31980] x64_sys_call+0x58b/0x9a0 [ 1687.173793][T31980] do_syscall_64+0x4c/0xa0 [ 1687.178237][T31980] ? clear_bhb_loop+0x30/0x80 [ 1687.182919][T31980] ? clear_bhb_loop+0x30/0x80 [ 1687.187604][T31980] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1687.193498][T31980] RIP: 0033:0x7f3e4018f749 [ 1687.197915][T31980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1687.217519][T31980] RSP: 002b:00007f3e4104e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1687.225947][T31980] RAX: ffffffffffffffda RBX: 00007f3e403e5fa0 RCX: 00007f3e4018f749 [ 1687.233925][T31980] RDX: 0000200000000080 RSI: 0000000000008991 RDI: 0000000000000004 [ 1687.241909][T31980] RBP: 00007f3e4104e090 R08: 0000000000000000 R09: 0000000000000000 [ 1687.249884][T31980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1687.257861][T31980] R13: 00007f3e403e6038 R14: 00007f3e403e5fa0 R15: 00007ffc582b89b8 [ 1687.265845][T31980] [ 1690.109259][T32076] FAULT_INJECTION: forcing a failure. [ 1690.109259][T32076] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1690.176538][T32076] CPU: 0 PID: 32076 Comm: syz.0.8884 Not tainted syzkaller #0 [ 1690.184114][T32076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1690.194173][T32076] Call Trace: [ 1690.197447][T32076] [ 1690.200371][T32076] __dump_stack+0x21/0x24 [ 1690.204699][T32076] dump_stack_lvl+0xee/0x150 [ 1690.209281][T32076] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1690.214305][T32076] dump_stack+0x15/0x24 [ 1690.218452][T32076] should_fail_ex+0x3d4/0x520 [ 1690.223137][T32076] should_fail+0xb/0x10 [ 1690.227295][T32076] should_fail_usercopy+0x1a/0x20 [ 1690.232321][T32076] _copy_from_user+0x1e/0xc0 [ 1690.236945][T32076] __sys_bpf+0x277/0x780 [ 1690.241217][T32076] ? bpf_link_show_fdinfo+0x320/0x320 [ 1690.246591][T32076] ? __cfi_sched_clock_cpu+0x10/0x10 [ 1690.251928][T32076] __x64_sys_bpf+0x7c/0x90 [ 1690.256435][T32076] x64_sys_call+0x488/0x9a0 [ 1690.260939][T32076] do_syscall_64+0x4c/0xa0 [ 1690.265361][T32076] ? clear_bhb_loop+0x30/0x80 [ 1690.270043][T32076] ? clear_bhb_loop+0x30/0x80 [ 1690.274728][T32076] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1690.280645][T32076] RIP: 0033:0x7f384238f749 [ 1690.285075][T32076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1690.304693][T32076] RSP: 002b:00007f38432d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1690.313125][T32076] RAX: ffffffffffffffda RBX: 00007f38425e5fa0 RCX: 00007f384238f749 [ 1690.321109][T32076] RDX: 0000000000000038 RSI: 0000200000000000 RDI: 000000000000001a [ 1690.329086][T32076] RBP: 00007f38432d2090 R08: 0000000000000000 R09: 0000000000000000 [ 1690.337057][T32076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1690.345028][T32076] R13: 00007f38425e6038 R14: 00007f38425e5fa0 R15: 00007ffdeddf4278 [ 1690.353092][T32076] [ 1691.152233][T32082] device syzkaller0 entered promiscuous mode [ 1691.710150][T32094] device syzkaller0 entered promiscuous mode [ 1693.288810][T32118] device wg2 entered promiscuous mode [ 1693.521777][ T28] audit: type=1400 audit(1767883922.807:159): avc: denied { create } for pid=32137 comm="syz.1.8904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1693.612982][T32130] device veth0_vlan left promiscuous mode [ 1693.718120][T32130] device veth0_vlan entered promiscuous mode [ 1694.240162][T32141] device syzkaller0 entered promiscuous mode [ 1694.281775][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1694.290319][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1694.297933][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1694.524054][T32162] device wg2 entered promiscuous mode [ 1697.744362][T32235] device bond_slave_1 entered promiscuous mode [ 1697.764715][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 1697.787241][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1698.797817][T32262] device syzkaller0 entered promiscuous mode [ 1699.455465][T32272] device syzkaller0 entered promiscuous mode [ 1699.716490][T32281] device syzkaller0 entered promiscuous mode [ 1701.082654][T32318] device sit0 entered promiscuous mode [ 1703.991243][T32410] device wg2 entered promiscuous mode [ 1705.272253][T32447] device pim6reg1 entered promiscuous mode [ 1705.413811][T32455] device sit0 left promiscuous mode [ 1705.510205][T32456] device sit0 entered promiscuous mode [ 1705.683049][T32459] device veth0_vlan left promiscuous mode [ 1705.799766][T32459] device veth0_vlan entered promiscuous mode [ 1706.445694][T32479] device veth0_vlan left promiscuous mode [ 1706.528211][T32479] device veth0_vlan entered promiscuous mode [ 1706.560893][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1706.585903][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1706.652249][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1708.871755][T21532] : port 1(syz_tun) entered disabled state [ 1708.889481][T21532] device syz_tun left promiscuous mode [ 1708.941632][T21532] : port 1(syz_tun) entered disabled state [ 1709.580072][T32536] bridge0: port 1(bridge_slave_0) entered blocking state [ 1709.587236][T32536] bridge0: port 1(bridge_slave_0) entered disabled state [ 1709.594651][T32536] device bridge_slave_0 entered promiscuous mode [ 1709.664763][T32536] bridge0: port 2(bridge_slave_1) entered blocking state [ 1709.671919][T32536] bridge0: port 2(bridge_slave_1) entered disabled state [ 1709.679613][T32536] device bridge_slave_1 entered promiscuous mode [ 1710.496225][T28140] device bridge_slave_1 left promiscuous mode [ 1710.512566][T28140] bridge0: port 2(bridge_slave_1) entered disabled state [ 1710.622647][T28140] device O3c left promiscuous mode [ 1710.628362][T28140] bridge0: port 1(O3c) entered disabled state [ 1711.183765][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1711.192020][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1711.345706][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1711.394661][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1711.475310][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 1711.482390][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1711.633625][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1711.719674][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1711.767688][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 1711.774780][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1711.782482][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1711.931433][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1711.943509][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1711.953624][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1711.961873][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1711.975739][T32536] device veth0_vlan entered promiscuous mode [ 1712.166680][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1712.199486][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1712.292089][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1712.376530][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1712.439530][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1712.447548][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1712.458598][T32536] device veth1_macvtap entered promiscuous mode [ 1712.502228][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1712.510482][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1712.518671][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1712.621093][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1712.735566][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1712.793044][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1712.801501][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1714.414268][T32598] bridge0: port 1(bridge_slave_0) entered blocking state [ 1714.421403][T32598] bridge0: port 1(bridge_slave_0) entered disabled state [ 1714.429067][T32598] device bridge_slave_0 entered promiscuous mode [ 1714.506308][T32598] bridge0: port 2(bridge_slave_1) entered blocking state [ 1714.513363][T32598] bridge0: port 2(bridge_slave_1) entered disabled state [ 1714.720214][T32598] device bridge_slave_1 entered promiscuous mode [ 1715.599925][ T43] device bridge_slave_1 left promiscuous mode [ 1715.673180][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 1715.695518][ T43] device O3c left promiscuous mode [ 1715.701162][ T43] bridge0: port 1(O3c) entered disabled state [ 1715.853868][ T43] device veth1_macvtap left promiscuous mode [ 1715.927340][ T43] device veth0_vlan left promiscuous mode [ 1717.205757][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1717.213379][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1717.381947][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1717.390784][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1717.399431][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 1717.406491][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1717.418435][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1717.427003][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1717.435449][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 1717.442499][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1717.968490][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1717.988399][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1718.061452][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1718.089348][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1718.098177][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1718.112509][T32598] device veth0_vlan entered promiscuous mode [ 1718.127820][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1718.136539][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1718.145186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1718.153267][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1718.194658][T32598] device veth1_macvtap entered promiscuous mode [ 1718.202838][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1718.211052][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1718.219894][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1718.228317][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1718.236899][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1718.312675][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1718.331308][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1718.341694][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1718.350210][ T4903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1725.711383][ T314] device wg2 left promiscuous mode [ 1725.847774][ T323] device wg2 entered promiscuous mode [ 1725.862100][ T326] device veth0_vlan left promiscuous mode [ 1725.901696][ T326] device veth0_vlan entered promiscuous mode [ 1725.985791][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1725.993826][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1726.038437][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1734.626925][ T522] bridge0: port 2(bridge_slave_1) entered disabled state [ 1734.641778][ T522] bridge0: port 1(bridge_slave_0) entered disabled state [ 1735.678463][ T546] device sit0 entered promiscuous mode [ 1740.352962][ T629] device pim6reg1 entered promiscuous mode [ 1744.946820][ T730] bridge0: port 1(bridge_slave_0) entered blocking state [ 1745.000783][ T730] bridge0: port 1(bridge_slave_0) entered disabled state [ 1745.021425][ T730] device bridge_slave_0 entered promiscuous mode [ 1745.041658][ T730] bridge0: port 2(bridge_slave_1) entered blocking state [ 1745.061924][ T730] bridge0: port 2(bridge_slave_1) entered disabled state [ 1745.081485][ T730] device bridge_slave_1 entered promiscuous mode [ 1745.606595][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1745.682002][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1745.937385][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1745.957013][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1745.965510][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 1745.972538][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1745.980412][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1746.043723][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1746.110528][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 1746.117613][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1746.585447][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1746.614369][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1746.686116][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1746.773373][ T730] device veth0_vlan entered promiscuous mode [ 1746.839845][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1746.887925][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1746.950944][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1746.959203][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1746.983033][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1746.990767][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1747.063893][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1747.158854][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1747.230565][ T730] device veth1_macvtap entered promiscuous mode [ 1747.382521][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1747.421533][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1747.469559][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1747.507756][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1747.573059][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1748.588845][ T8] device bridge_slave_1 left promiscuous mode [ 1748.603641][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1748.705431][ T8] device O3c left promiscuous mode [ 1748.741239][ T8] bridge0: port 1(O3c) entered disabled state [ 1748.807897][ T8] device veth1_macvtap left promiscuous mode [ 1748.837638][ T8] device veth0_vlan left promiscuous mode [ 1751.171616][ T889] FAULT_INJECTION: forcing a failure. [ 1751.171616][ T889] name failslab, interval 1, probability 0, space 0, times 0 [ 1751.417782][ T889] CPU: 1 PID: 889 Comm: syz.1.9240 Not tainted syzkaller #0 [ 1751.425107][ T889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1751.435166][ T889] Call Trace: [ 1751.438443][ T889] [ 1751.441371][ T889] __dump_stack+0x21/0x24 [ 1751.445700][ T889] dump_stack_lvl+0xee/0x150 [ 1751.450286][ T889] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1751.455302][ T889] dump_stack+0x15/0x24 [ 1751.459446][ T889] should_fail_ex+0x3d4/0x520 [ 1751.464197][ T889] __should_failslab+0xac/0xf0 [ 1751.468948][ T889] ? bpf_test_init+0xce/0x160 [ 1751.473688][ T889] should_failslab+0x9/0x20 [ 1751.478275][ T889] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1751.483640][ T889] ? irqentry_exit+0x37/0x40 [ 1751.488306][ T889] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1751.494111][ T889] ? bpf_test_init+0xce/0x160 [ 1751.498784][ T889] __kmalloc+0xa1/0x1e0 [ 1751.502937][ T889] bpf_test_init+0xce/0x160 [ 1751.507429][ T889] bpf_prog_test_run_xdp+0x359/0xe50 [ 1751.512707][ T889] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 1751.518495][ T889] ? __kasan_check_write+0x14/0x20 [ 1751.523590][ T889] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 1751.529391][ T889] bpf_prog_test_run+0x3e3/0x630 [ 1751.534328][ T889] ? bpf_prog_query+0x270/0x270 [ 1751.539158][ T889] ? selinux_bpf+0xce/0xf0 [ 1751.543561][ T889] ? security_bpf+0x93/0xb0 [ 1751.548050][ T889] __sys_bpf+0x56d/0x780 [ 1751.552276][ T889] ? bpf_link_show_fdinfo+0x320/0x320 [ 1751.557633][ T889] ? __cfi_sched_clock_cpu+0x10/0x10 [ 1751.562904][ T889] __x64_sys_bpf+0x7c/0x90 [ 1751.567304][ T889] x64_sys_call+0x488/0x9a0 [ 1751.571795][ T889] do_syscall_64+0x4c/0xa0 [ 1751.576199][ T889] ? clear_bhb_loop+0x30/0x80 [ 1751.580859][ T889] ? clear_bhb_loop+0x30/0x80 [ 1751.585523][ T889] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1751.591495][ T889] RIP: 0033:0x7fee1a18f749 [ 1751.595889][ T889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1751.615484][ T889] RSP: 002b:00007fee1b111038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1751.623878][ T889] RAX: ffffffffffffffda RBX: 00007fee1a3e5fa0 RCX: 00007fee1a18f749 [ 1751.631835][ T889] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 1751.639956][ T889] RBP: 00007fee1b111090 R08: 0000000000000000 R09: 0000000000000000 [ 1751.647905][ T889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1751.655863][ T889] R13: 00007fee1a3e6038 R14: 00007fee1a3e5fa0 R15: 00007fffb793b388 [ 1751.663822][ T889] [ 1751.738669][ T897] device wg2 entered promiscuous mode [ 1754.300175][ T957] bridge0: port 2(bridge_slave_1) entered disabled state [ 1754.315406][ T957] bridge0: port 1(bridge_slave_0) entered disabled state [ 1755.944419][ T1007] device wg2 left promiscuous mode [ 1755.997173][ T1011] device wg2 entered promiscuous mode [ 1756.971148][ T1046] FAULT_INJECTION: forcing a failure. [ 1756.971148][ T1046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1757.009002][ T1046] CPU: 0 PID: 1046 Comm: syz.3.9288 Not tainted syzkaller #0 [ 1757.016426][ T1046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1757.026494][ T1046] Call Trace: [ 1757.029775][ T1046] [ 1757.032703][ T1046] __dump_stack+0x21/0x24 [ 1757.037038][ T1046] dump_stack_lvl+0xee/0x150 [ 1757.041633][ T1046] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1757.046670][ T1046] ? __rcu_read_unlock+0xa0/0xa0 [ 1757.051623][ T1046] dump_stack+0x15/0x24 [ 1757.055786][ T1046] should_fail_ex+0x3d4/0x520 [ 1757.060468][ T1046] should_fail+0xb/0x10 [ 1757.064627][ T1046] should_fail_usercopy+0x1a/0x20 [ 1757.069671][ T1046] strncpy_from_user+0x24/0x2d0 [ 1757.074532][ T1046] bpf_prog_load+0x1bb/0x15a0 [ 1757.079210][ T1046] ? selinux_capable+0x19a/0x380 [ 1757.084152][ T1046] ? map_freeze+0x390/0x390 [ 1757.088665][ T1046] ? selinux_bpf+0xc7/0xf0 [ 1757.093082][ T1046] ? security_bpf+0x93/0xb0 [ 1757.097594][ T1046] __sys_bpf+0x504/0x780 [ 1757.101841][ T1046] ? bpf_link_show_fdinfo+0x320/0x320 [ 1757.107226][ T1046] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1757.113044][ T1046] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1757.119222][ T1046] __x64_sys_bpf+0x7c/0x90 [ 1757.124182][ T1046] x64_sys_call+0x488/0x9a0 [ 1757.128696][ T1046] do_syscall_64+0x4c/0xa0 [ 1757.133124][ T1046] ? clear_bhb_loop+0x30/0x80 [ 1757.137812][ T1046] ? clear_bhb_loop+0x30/0x80 [ 1757.142503][ T1046] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1757.148404][ T1046] RIP: 0033:0x7f929798f749 [ 1757.152827][ T1046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1757.172435][ T1046] RSP: 002b:00007f92988a9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1757.180859][ T1046] RAX: ffffffffffffffda RBX: 00007f9297be5fa0 RCX: 00007f929798f749 [ 1757.188838][ T1046] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 1757.196812][ T1046] RBP: 00007f92988a9090 R08: 0000000000000000 R09: 0000000000000000 [ 1757.204783][ T1046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1757.212757][ T1046] R13: 00007f9297be6038 R14: 00007f9297be5fa0 R15: 00007ffe016cabc8 [ 1757.220741][ T1046] [ 1757.612494][ T1064] bridge0: port 2(bridge_slave_1) entered disabled state [ 1757.622489][ T1064] bridge0: port 1(bridge_slave_0) entered disabled state [ 1760.389919][ T1124] FAULT_INJECTION: forcing a failure. [ 1760.389919][ T1124] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1760.403929][ T1124] CPU: 1 PID: 1124 Comm: syz.2.9312 Not tainted syzkaller #0 [ 1760.411329][ T1124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1760.421396][ T1124] Call Trace: [ 1760.424680][ T1124] [ 1760.427619][ T1124] __dump_stack+0x21/0x24 [ 1760.431956][ T1124] dump_stack_lvl+0xee/0x150 [ 1760.436553][ T1124] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1760.441588][ T1124] dump_stack+0x15/0x24 [ 1760.445749][ T1124] should_fail_ex+0x3d4/0x520 [ 1760.450437][ T1124] should_fail+0xb/0x10 [ 1760.454597][ T1124] should_fail_usercopy+0x1a/0x20 [ 1760.459630][ T1124] _copy_from_user+0x1e/0xc0 [ 1760.464229][ T1124] __sys_bpf+0x277/0x780 [ 1760.468480][ T1124] ? bpf_link_show_fdinfo+0x320/0x320 [ 1760.473869][ T1124] ? __cfi_ksys_write+0x10/0x10 [ 1760.478726][ T1124] ? debug_smp_processor_id+0x17/0x20 [ 1760.484106][ T1124] __x64_sys_bpf+0x7c/0x90 [ 1760.488534][ T1124] x64_sys_call+0x488/0x9a0 [ 1760.493045][ T1124] do_syscall_64+0x4c/0xa0 [ 1760.497467][ T1124] ? clear_bhb_loop+0x30/0x80 [ 1760.502149][ T1124] ? clear_bhb_loop+0x30/0x80 [ 1760.506837][ T1124] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1760.512739][ T1124] RIP: 0033:0x7f01b7f8f749 [ 1760.517169][ T1124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1760.536786][ T1124] RSP: 002b:00007f01b69f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1760.545214][ T1124] RAX: ffffffffffffffda RBX: 00007f01b81e5fa0 RCX: 00007f01b7f8f749 [ 1760.553197][ T1124] RDX: 0000000000000050 RSI: 0000200000000540 RDI: 000000000000000a [ 1760.561182][ T1124] RBP: 00007f01b69f7090 R08: 0000000000000000 R09: 0000000000000000 [ 1760.569187][ T1124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1760.577188][ T1124] R13: 00007f01b81e6038 R14: 00007f01b81e5fa0 R15: 00007fff523773e8 [ 1760.585154][ T1124] [ 1763.949768][ T1190] device macsec0 entered promiscuous mode [ 1766.325475][ T1234] FAULT_INJECTION: forcing a failure. [ 1766.325475][ T1234] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1766.425899][ T1234] CPU: 0 PID: 1234 Comm: syz.4.9340 Not tainted syzkaller #0 [ 1766.433316][ T1234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1766.443380][ T1234] Call Trace: [ 1766.446665][ T1234] [ 1766.449589][ T1234] __dump_stack+0x21/0x24 [ 1766.453921][ T1234] dump_stack_lvl+0xee/0x150 [ 1766.458517][ T1234] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1766.463557][ T1234] dump_stack+0x15/0x24 [ 1766.467725][ T1234] should_fail_ex+0x3d4/0x520 [ 1766.472406][ T1234] should_fail+0xb/0x10 [ 1766.476565][ T1234] should_fail_usercopy+0x1a/0x20 [ 1766.481596][ T1234] _copy_from_user+0x1e/0xc0 [ 1766.486207][ T1234] bpf_prog_test_run_skb+0x286/0x1290 [ 1766.491579][ T1234] ? __fget_files+0x2d5/0x330 [ 1766.496258][ T1234] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 1766.502158][ T1234] bpf_prog_test_run+0x3e3/0x630 [ 1766.507100][ T1234] ? slab_free_freelist_hook+0xc2/0x190 [ 1766.512647][ T1234] ? bpf_prog_query+0x270/0x270 [ 1766.517493][ T1234] ? selinux_bpf+0xce/0xf0 [ 1766.521901][ T1234] ? security_bpf+0x93/0xb0 [ 1766.526397][ T1234] __sys_bpf+0x56d/0x780 [ 1766.530630][ T1234] ? bpf_link_show_fdinfo+0x320/0x320 [ 1766.536082][ T1234] ? __cfi_ksys_write+0x10/0x10 [ 1766.540929][ T1234] ? debug_smp_processor_id+0x17/0x20 [ 1766.546294][ T1234] __x64_sys_bpf+0x7c/0x90 [ 1766.550712][ T1234] x64_sys_call+0x488/0x9a0 [ 1766.555210][ T1234] do_syscall_64+0x4c/0xa0 [ 1766.559625][ T1234] ? clear_bhb_loop+0x30/0x80 [ 1766.564301][ T1234] ? clear_bhb_loop+0x30/0x80 [ 1766.568977][ T1234] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1766.574876][ T1234] RIP: 0033:0x7f4e7c58f749 [ 1766.579282][ T1234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1766.598886][ T1234] RSP: 002b:00007f4e7d4f8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1766.607298][ T1234] RAX: ffffffffffffffda RBX: 00007f4e7c7e5fa0 RCX: 00007f4e7c58f749 [ 1766.615277][ T1234] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 1766.623244][ T1234] RBP: 00007f4e7d4f8090 R08: 0000000000000000 R09: 0000000000000000 [ 1766.631311][ T1234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1766.639291][ T1234] R13: 00007f4e7c7e6038 R14: 00007f4e7c7e5fa0 R15: 00007ffeba4148c8 [ 1766.647273][ T1234] [ 1768.432763][ T1274] device veth0_vlan left promiscuous mode [ 1768.488470][ T1274] device veth0_vlan entered promiscuous mode [ 1768.642575][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1768.656197][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1768.664291][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1773.076600][ T1420] device syzkaller0 entered promiscuous mode [ 1775.149124][ T1489] ref_ctr_offset mismatch. inode: 0x155 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1775.249606][ T1488] ref_ctr_offset mismatch. inode: 0x155 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 1778.214728][ T1573] FAULT_INJECTION: forcing a failure. [ 1778.214728][ T1573] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1778.312568][ T1573] CPU: 0 PID: 1573 Comm: syz.0.9443 Not tainted syzkaller #0 [ 1778.319985][ T1573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1778.330047][ T1573] Call Trace: [ 1778.333323][ T1573] [ 1778.336248][ T1573] __dump_stack+0x21/0x24 [ 1778.340582][ T1573] dump_stack_lvl+0xee/0x150 [ 1778.345177][ T1573] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1778.350196][ T1573] ? irqentry_exit+0x37/0x40 [ 1778.354780][ T1573] dump_stack+0x15/0x24 [ 1778.358931][ T1573] should_fail_ex+0x3d4/0x520 [ 1778.363606][ T1573] should_fail+0xb/0x10 [ 1778.367760][ T1573] should_fail_usercopy+0x1a/0x20 [ 1778.372784][ T1573] _copy_from_user+0x1e/0xc0 [ 1778.377372][ T1573] generic_map_update_batch+0x458/0x780 [ 1778.382927][ T1573] ? __cfi_generic_map_update_batch+0x10/0x10 [ 1778.388999][ T1573] ? __fdget+0x19c/0x220 [ 1778.393270][ T1573] ? __cfi_generic_map_update_batch+0x10/0x10 [ 1778.399344][ T1573] bpf_map_do_batch+0x48c/0x620 [ 1778.404212][ T1573] __sys_bpf+0x624/0x780 [ 1778.408458][ T1573] ? bpf_link_show_fdinfo+0x320/0x320 [ 1778.413847][ T1573] __x64_sys_bpf+0x7c/0x90 [ 1778.418266][ T1573] x64_sys_call+0x488/0x9a0 [ 1778.422767][ T1573] do_syscall_64+0x4c/0xa0 [ 1778.427179][ T1573] ? clear_bhb_loop+0x30/0x80 [ 1778.431859][ T1573] ? clear_bhb_loop+0x30/0x80 [ 1778.436536][ T1573] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1778.442434][ T1573] RIP: 0033:0x7f3abc78f749 [ 1778.446846][ T1573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1778.466450][ T1573] RSP: 002b:00007f3abd6eb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1778.474873][ T1573] RAX: ffffffffffffffda RBX: 00007f3abc9e5fa0 RCX: 00007f3abc78f749 [ 1778.482873][ T1573] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 1778.490839][ T1573] RBP: 00007f3abd6eb090 R08: 0000000000000000 R09: 0000000000000000 [ 1778.498813][ T1573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1778.506787][ T1573] R13: 00007f3abc9e6038 R14: 00007f3abc9e5fa0 R15: 00007ffdff911258 [ 1778.514758][ T1573] [ 1778.689914][ T1589] FAULT_INJECTION: forcing a failure. [ 1778.689914][ T1589] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1778.832379][ T1589] CPU: 0 PID: 1589 Comm: syz.2.9447 Not tainted syzkaller #0 [ 1778.839793][ T1589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1778.849851][ T1589] Call Trace: [ 1778.853131][ T1589] [ 1778.856055][ T1589] __dump_stack+0x21/0x24 [ 1778.860483][ T1589] dump_stack_lvl+0xee/0x150 [ 1778.865094][ T1589] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1778.870127][ T1589] dump_stack+0x15/0x24 [ 1778.874293][ T1589] should_fail_ex+0x3d4/0x520 [ 1778.878981][ T1589] should_fail+0xb/0x10 [ 1778.883147][ T1589] should_fail_usercopy+0x1a/0x20 [ 1778.888177][ T1589] _copy_from_user+0x1e/0xc0 [ 1778.892773][ T1589] __sys_bpf+0x277/0x780 [ 1778.897018][ T1589] ? bpf_link_show_fdinfo+0x320/0x320 [ 1778.902389][ T1589] ? __cfi_ksys_write+0x10/0x10 [ 1778.907235][ T1589] ? do_user_addr_fault+0x9ac/0x1050 [ 1778.912527][ T1589] ? debug_smp_processor_id+0x17/0x20 [ 1778.917911][ T1589] __x64_sys_bpf+0x7c/0x90 [ 1778.922341][ T1589] x64_sys_call+0x488/0x9a0 [ 1778.926857][ T1589] do_syscall_64+0x4c/0xa0 [ 1778.931279][ T1589] ? clear_bhb_loop+0x30/0x80 [ 1778.935951][ T1589] ? clear_bhb_loop+0x30/0x80 [ 1778.940614][ T1589] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1778.946490][ T1589] RIP: 0033:0x7f01b7f8f749 [ 1778.950906][ T1589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1778.970494][ T1589] RSP: 002b:00007f01b69f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1778.978895][ T1589] RAX: ffffffffffffffda RBX: 00007f01b81e5fa0 RCX: 00007f01b7f8f749 [ 1778.986862][ T1589] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 1778.994841][ T1589] RBP: 00007f01b69f7090 R08: 0000000000000000 R09: 0000000000000000 [ 1779.002817][ T1589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1779.010795][ T1589] R13: 00007f01b81e6038 R14: 00007f01b81e5fa0 R15: 00007fff523773e8 [ 1779.018782][ T1589] [ 1779.105249][ T1578] device veth0_vlan left promiscuous mode [ 1779.140438][ T1578] device veth0_vlan entered promiscuous mode [ 1779.161574][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1779.170273][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1779.178488][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1780.299217][ T1619] device sit0 entered promiscuous mode [ 1782.002422][ T28] audit: type=1400 audit(1767884011.287:160): avc: denied { write } for pid=1649 comm="syz.1.9463" name="cgroup.subtree_control" dev="cgroup2" ino=335 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 1782.050534][ T28] audit: type=1400 audit(1767884011.317:161): avc: denied { open } for pid=1649 comm="syz.1.9463" path="" dev="cgroup2" ino=335 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 1785.499948][ T1698] device syzkaller0 entered promiscuous mode [ 1792.123780][ T1853] FAULT_INJECTION: forcing a failure. [ 1792.123780][ T1853] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1792.181125][ T1853] CPU: 1 PID: 1853 Comm: syz.2.9513 Not tainted syzkaller #0 [ 1792.188536][ T1853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1792.198597][ T1853] Call Trace: [ 1792.201876][ T1853] [ 1792.204802][ T1853] __dump_stack+0x21/0x24 [ 1792.209152][ T1853] dump_stack_lvl+0xee/0x150 [ 1792.213741][ T1853] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1792.218764][ T1853] dump_stack+0x15/0x24 [ 1792.222917][ T1853] should_fail_ex+0x3d4/0x520 [ 1792.227595][ T1853] should_fail+0xb/0x10 [ 1792.231748][ T1853] should_fail_usercopy+0x1a/0x20 [ 1792.236769][ T1853] _copy_from_user+0x1e/0xc0 [ 1792.241360][ T1853] ___sys_recvmsg+0x12b/0x510 [ 1792.246044][ T1853] ? __sys_recvmsg+0x270/0x270 [ 1792.250811][ T1853] ? security_file_permission+0x94/0xb0 [ 1792.256357][ T1853] ? __fget_files+0x2d5/0x330 [ 1792.261035][ T1853] ? __fdget+0x19c/0x220 [ 1792.265273][ T1853] __x64_sys_recvmsg+0x1ed/0x2c0 [ 1792.270228][ T1853] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 1792.275707][ T1853] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 1792.281783][ T1853] x64_sys_call+0x75/0x9a0 [ 1792.286200][ T1853] do_syscall_64+0x4c/0xa0 [ 1792.290613][ T1853] ? clear_bhb_loop+0x30/0x80 [ 1792.295369][ T1853] ? clear_bhb_loop+0x30/0x80 [ 1792.300048][ T1853] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1792.305947][ T1853] RIP: 0033:0x7f01b7f8f749 [ 1792.310358][ T1853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1792.329961][ T1853] RSP: 002b:00007f01b69f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1792.338387][ T1853] RAX: ffffffffffffffda RBX: 00007f01b81e5fa0 RCX: 00007f01b7f8f749 [ 1792.346361][ T1853] RDX: 0000000000002142 RSI: 0000200000000400 RDI: 0000000000000003 [ 1792.354339][ T1853] RBP: 00007f01b69f7090 R08: 0000000000000000 R09: 0000000000000000 [ 1792.362320][ T1853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1792.370312][ T1853] R13: 00007f01b81e6038 R14: 00007f01b81e5fa0 R15: 00007fff523773e8 [ 1792.378300][ T1853] [ 1796.932233][ T1936] device syzkaller0 entered promiscuous mode [ 1802.394459][ T1995] FAULT_INJECTION: forcing a failure. [ 1802.394459][ T1995] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1802.555045][ T1995] CPU: 1 PID: 1995 Comm: syz.1.9549 Not tainted syzkaller #0 [ 1802.562453][ T1995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1802.572514][ T1995] Call Trace: [ 1802.575884][ T1995] [ 1802.578820][ T1995] __dump_stack+0x21/0x24 [ 1802.583163][ T1995] dump_stack_lvl+0xee/0x150 [ 1802.587752][ T1995] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1802.592783][ T1995] dump_stack+0x15/0x24 [ 1802.596937][ T1995] should_fail_ex+0x3d4/0x520 [ 1802.601617][ T1995] should_fail+0xb/0x10 [ 1802.605772][ T1995] should_fail_usercopy+0x1a/0x20 [ 1802.610982][ T1995] _copy_from_user+0x1e/0xc0 [ 1802.615576][ T1995] bpf_test_init+0x106/0x160 [ 1802.620165][ T1995] bpf_prog_test_run_xdp+0x359/0xe50 [ 1802.625447][ T1995] ? __kasan_check_read+0x11/0x20 [ 1802.630481][ T1995] ? preempt_schedule_irq+0xbb/0x110 [ 1802.635773][ T1995] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 1802.641578][ T1995] ? __kasan_check_write+0x14/0x20 [ 1802.646692][ T1995] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 1802.652507][ T1995] bpf_prog_test_run+0x3e3/0x630 [ 1802.657447][ T1995] ? bpf_prog_query+0x270/0x270 [ 1802.662299][ T1995] ? selinux_bpf+0xce/0xf0 [ 1802.666718][ T1995] ? security_bpf+0x93/0xb0 [ 1802.671224][ T1995] __sys_bpf+0x56d/0x780 [ 1802.675468][ T1995] ? bpf_link_show_fdinfo+0x320/0x320 [ 1802.680836][ T1995] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1802.686648][ T1995] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1802.692809][ T1995] __x64_sys_bpf+0x7c/0x90 [ 1802.697238][ T1995] x64_sys_call+0x488/0x9a0 [ 1802.701747][ T1995] do_syscall_64+0x4c/0xa0 [ 1802.706172][ T1995] ? clear_bhb_loop+0x30/0x80 [ 1802.710861][ T1995] ? clear_bhb_loop+0x30/0x80 [ 1802.715546][ T1995] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1802.721453][ T1995] RIP: 0033:0x7fee1a18f749 [ 1802.725871][ T1995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1802.745478][ T1995] RSP: 002b:00007fee1b111038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1802.753897][ T1995] RAX: ffffffffffffffda RBX: 00007fee1a3e5fa0 RCX: 00007fee1a18f749 [ 1802.761865][ T1995] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 1802.769842][ T1995] RBP: 00007fee1b111090 R08: 0000000000000000 R09: 0000000000000000 [ 1802.777812][ T1995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1802.785781][ T1995] R13: 00007fee1a3e6038 R14: 00007fee1a3e5fa0 R15: 00007fffb793b388 [ 1802.793763][ T1995] [ 1803.764775][ T2000] device syzkaller0 entered promiscuous mode [ 1803.858285][T31717] cgroup: fork rejected by pids controller in /syz1 [ 1804.189286][ T2017] device veth0_vlan left promiscuous mode [ 1804.210521][ T2017] device veth0_vlan entered promiscuous mode [ 1804.229377][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1804.243230][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1804.351560][ T4904] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1804.546374][ T2025] device veth0_vlan left promiscuous mode [ 1804.584309][ T2025] device veth0_vlan entered promiscuous mode [ 1805.446611][ T8] device bridge_slave_1 left promiscuous mode [ 1805.452772][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1805.485521][ T8] device bridge_slave_0 left promiscuous mode [ 1805.491683][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1805.529683][ T8] device veth1_macvtap left promiscuous mode [ 1805.915729][ T2046] bridge0: port 1(bridge_slave_0) entered blocking state [ 1805.929466][ T2046] bridge0: port 1(bridge_slave_0) entered disabled state [ 1805.972173][ T2046] device bridge_slave_0 entered promiscuous mode [ 1806.023604][ T2046] bridge0: port 2(bridge_slave_1) entered blocking state [ 1806.071819][ T2046] bridge0: port 2(bridge_slave_1) entered disabled state [ 1806.115514][ T2046] device bridge_slave_1 entered promiscuous mode [ 1806.187915][ T2048] bridge0: port 1(bridge_slave_0) entered blocking state [ 1806.205211][ T2048] bridge0: port 1(bridge_slave_0) entered disabled state [ 1806.238341][ T2048] device bridge_slave_0 entered promiscuous mode [ 1806.318961][ T2048] bridge0: port 2(bridge_slave_1) entered blocking state [ 1806.336233][ T2048] bridge0: port 2(bridge_slave_1) entered disabled state [ 1806.395441][ T2048] device bridge_slave_1 entered promiscuous mode [ 1806.442053][ T2050] bridge0: port 1(bridge_slave_0) entered blocking state [ 1806.455134][ T2050] bridge0: port 1(bridge_slave_0) entered disabled state [ 1806.472829][ T2050] device bridge_slave_0 entered promiscuous mode [ 1806.698658][ T2050] bridge0: port 2(bridge_slave_1) entered blocking state [ 1806.706025][ T2050] bridge0: port 2(bridge_slave_1) entered disabled state [ 1806.713589][ T2050] device bridge_slave_1 entered promiscuous mode [ 1807.028558][ T2048] device veth0_vlan entered promiscuous mode [ 1807.052654][ T2050] bridge0: port 2(bridge_slave_1) entered blocking state [ 1807.059742][ T2050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1807.067035][ T2050] bridge0: port 1(bridge_slave_0) entered blocking state [ 1807.074060][ T2050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1807.084654][T28140] bridge0: port 1(bridge_slave_0) entered disabled state [ 1807.092655][T28140] bridge0: port 2(bridge_slave_1) entered disabled state [ 1807.101485][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1807.112032][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1807.120612][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1807.130495][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1807.145872][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1807.153388][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1807.166002][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1807.175514][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1807.187020][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1807.195721][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1807.204020][T28140] bridge0: port 1(bridge_slave_0) entered blocking state [ 1807.211182][T28140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1807.219255][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1807.228194][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1807.236761][T28140] bridge0: port 2(bridge_slave_1) entered blocking state [ 1807.243821][T28140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1807.251575][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1807.259596][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1807.267400][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1807.276047][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1807.284389][T28140] bridge0: port 1(bridge_slave_0) entered blocking state [ 1807.291444][T28140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1807.299397][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1807.308066][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1807.316671][T28140] bridge0: port 2(bridge_slave_1) entered blocking state [ 1807.323718][T28140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1807.340053][ T2048] device veth1_macvtap entered promiscuous mode [ 1807.357229][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1807.369481][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1807.377965][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1807.389186][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1807.397695][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1807.431004][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1807.439773][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1807.448929][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1807.457661][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1807.489878][ T2046] device veth0_vlan entered promiscuous mode [ 1807.505184][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1807.523117][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1807.531146][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1807.541665][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1807.551162][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1807.559378][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1807.567488][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1807.575874][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1807.584092][T28140] bridge0: port 1(bridge_slave_0) entered blocking state [ 1807.591135][T28140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1807.598553][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1807.607033][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1807.615240][T28140] bridge0: port 2(bridge_slave_1) entered blocking state [ 1807.622271][T28140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1807.629760][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1807.637254][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1807.661212][ T2046] device veth1_macvtap entered promiscuous mode [ 1807.675101][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1807.683230][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1807.694205][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1807.702983][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1807.711249][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1807.719627][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1807.738605][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1807.764645][ T2050] device veth0_vlan entered promiscuous mode [ 1807.777271][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1807.786246][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1807.794495][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1807.802486][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1807.810964][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1807.818666][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1807.850966][ T2050] device veth1_macvtap entered promiscuous mode [ 1807.902595][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1807.913302][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1807.922001][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1807.930475][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1807.939181][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1807.947156][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1807.955504][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1807.992029][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1808.003835][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1808.026508][ T8] device bridge_slave_1 left promiscuous mode [ 1808.032683][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1808.043177][ T8] device bridge_slave_0 left promiscuous mode [ 1808.049637][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1808.058311][ T8] device bridge_slave_1 left promiscuous mode [ 1808.064473][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1808.072234][ T8] device bridge_slave_0 left promiscuous mode [ 1808.078446][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1808.087887][ T8] device veth1_macvtap left promiscuous mode [ 1808.094206][ T8] device veth0_vlan left promiscuous mode [ 1808.100925][ T8] device veth1_macvtap left promiscuous mode [ 1808.107022][ T8] device veth0_vlan left promiscuous mode [ 1808.536661][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1808.580391][T28140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1812.142970][ T2171] syz.6.9590[2171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1812.143068][ T2171] syz.6.9590[2171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1815.166276][ T2201] device veth0_vlan left promiscuous mode [ 1815.286041][ T2201] device veth0_vlan entered promiscuous mode [ 1815.646380][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1815.686336][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1815.791387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1816.304906][ T2223] device sit0 entered promiscuous mode [ 1820.005503][ T2282] device sit0 entered promiscuous mode [ 1820.373877][ T2288] FAULT_INJECTION: forcing a failure. [ 1820.373877][ T2288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1820.387894][ T2288] CPU: 0 PID: 2288 Comm: syz.6.9618 Not tainted syzkaller #0 [ 1820.395286][ T2288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1820.405376][ T2288] Call Trace: [ 1820.408650][ T2288] [ 1820.411575][ T2288] __dump_stack+0x21/0x24 [ 1820.415894][ T2288] dump_stack_lvl+0xee/0x150 [ 1820.420478][ T2288] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1820.425520][ T2288] dump_stack+0x15/0x24 [ 1820.429687][ T2288] should_fail_ex+0x3d4/0x520 [ 1820.434386][ T2288] should_fail+0xb/0x10 [ 1820.438537][ T2288] should_fail_usercopy+0x1a/0x20 [ 1820.443559][ T2288] _copy_from_user+0x1e/0xc0 [ 1820.448146][ T2288] __sys_bpf+0x277/0x780 [ 1820.452386][ T2288] ? bpf_link_show_fdinfo+0x320/0x320 [ 1820.457798][ T2288] ? fpregs_restore_userregs+0x128/0x260 [ 1820.463416][ T2288] __x64_sys_bpf+0x7c/0x90 [ 1820.467821][ T2288] x64_sys_call+0x488/0x9a0 [ 1820.472312][ T2288] do_syscall_64+0x4c/0xa0 [ 1820.476716][ T2288] ? clear_bhb_loop+0x30/0x80 [ 1820.481379][ T2288] ? clear_bhb_loop+0x30/0x80 [ 1820.486046][ T2288] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1820.491930][ T2288] RIP: 0033:0x7fadc058f749 [ 1820.496329][ T2288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1820.515922][ T2288] RSP: 002b:00007fadc14d5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1820.524323][ T2288] RAX: ffffffffffffffda RBX: 00007fadc07e5fa0 RCX: 00007fadc058f749 [ 1820.532284][ T2288] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 1820.540244][ T2288] RBP: 00007fadc14d5090 R08: 0000000000000000 R09: 0000000000000000 [ 1820.548204][ T2288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1820.556252][ T2288] R13: 00007fadc07e6038 R14: 00007fadc07e5fa0 R15: 00007ffc9e313678 [ 1820.564221][ T2288] [ 1820.675851][ T2294] device pim6reg1 entered promiscuous mode [ 1822.151897][ T2329] syz.8.9631[2329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1822.152023][ T2329] syz.8.9631[2329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1822.296306][ T2331] device sit0 entered promiscuous mode [ 1824.018193][ T2364] FAULT_INJECTION: forcing a failure. [ 1824.018193][ T2364] name failslab, interval 1, probability 0, space 0, times 0 [ 1824.036170][ T2364] CPU: 1 PID: 2364 Comm: syz.8.9643 Not tainted syzkaller #0 [ 1824.043743][ T2364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1824.053800][ T2364] Call Trace: [ 1824.057078][ T2364] [ 1824.060007][ T2364] __dump_stack+0x21/0x24 [ 1824.064335][ T2364] dump_stack_lvl+0xee/0x150 [ 1824.068928][ T2364] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1824.073950][ T2364] dump_stack+0x15/0x24 [ 1824.078100][ T2364] should_fail_ex+0x3d4/0x520 [ 1824.082782][ T2364] __should_failslab+0xac/0xf0 [ 1824.087635][ T2364] ? sk_prot_alloc+0xed/0x320 [ 1824.092324][ T2364] should_failslab+0x9/0x20 [ 1824.096823][ T2364] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1824.102211][ T2364] ? sk_prot_alloc+0xed/0x320 [ 1824.106892][ T2364] __kmalloc+0xa1/0x1e0 [ 1824.111051][ T2364] sk_prot_alloc+0xed/0x320 [ 1824.115554][ T2364] sk_alloc+0x3b/0x460 [ 1824.119616][ T2364] ? copy_user_enhanced_fast_string+0xa/0x40 [ 1824.125596][ T2364] bpf_prog_test_run_skb+0x37e/0x1290 [ 1824.130973][ T2364] ? __fget_files+0x2d5/0x330 [ 1824.135648][ T2364] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 1824.141459][ T2364] bpf_prog_test_run+0x3e3/0x630 [ 1824.146392][ T2364] ? slab_free_freelist_hook+0xc2/0x190 [ 1824.151942][ T2364] ? bpf_prog_query+0x270/0x270 [ 1824.156798][ T2364] ? selinux_bpf+0xce/0xf0 [ 1824.161222][ T2364] ? security_bpf+0x93/0xb0 [ 1824.165737][ T2364] __sys_bpf+0x56d/0x780 [ 1824.169983][ T2364] ? bpf_link_show_fdinfo+0x320/0x320 [ 1824.175359][ T2364] ? __cfi_ksys_write+0x10/0x10 [ 1824.180211][ T2364] ? debug_smp_processor_id+0x17/0x20 [ 1824.185583][ T2364] __x64_sys_bpf+0x7c/0x90 [ 1824.190008][ T2364] x64_sys_call+0x488/0x9a0 [ 1824.194509][ T2364] do_syscall_64+0x4c/0xa0 [ 1824.198921][ T2364] ? clear_bhb_loop+0x30/0x80 [ 1824.203602][ T2364] ? clear_bhb_loop+0x30/0x80 [ 1824.208375][ T2364] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1824.214270][ T2364] RIP: 0033:0x7f768138f749 [ 1824.218681][ T2364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1824.238280][ T2364] RSP: 002b:00007f76821bb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1824.246700][ T2364] RAX: ffffffffffffffda RBX: 00007f76815e5fa0 RCX: 00007f768138f749 [ 1824.254681][ T2364] RDX: 0000000000000048 RSI: 0000200000000340 RDI: 000000000000000a [ 1824.262668][ T2364] RBP: 00007f76821bb090 R08: 0000000000000000 R09: 0000000000000000 [ 1824.270645][ T2364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1824.278614][ T2364] R13: 00007f76815e6038 R14: 00007f76815e5fa0 R15: 00007ffcc7cbd0d8 [ 1824.286596][ T2364] [ 1826.988406][ T2425] FAULT_INJECTION: forcing a failure. [ 1826.988406][ T2425] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1827.001833][ T2425] CPU: 0 PID: 2425 Comm: syz.8.9662 Not tainted syzkaller #0 [ 1827.009224][ T2425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1827.019280][ T2425] Call Trace: [ 1827.022562][ T2425] [ 1827.025500][ T2425] __dump_stack+0x21/0x24 [ 1827.029839][ T2425] dump_stack_lvl+0xee/0x150 [ 1827.034427][ T2425] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1827.039448][ T2425] ? migrate_enable+0x19c/0x280 [ 1827.044285][ T2425] dump_stack+0x15/0x24 [ 1827.048440][ T2425] should_fail_ex+0x3d4/0x520 [ 1827.053106][ T2425] should_fail+0xb/0x10 [ 1827.057247][ T2425] should_fail_usercopy+0x1a/0x20 [ 1827.062257][ T2425] _copy_from_user+0x1e/0xc0 [ 1827.066829][ T2425] generic_map_update_batch+0x458/0x780 [ 1827.072374][ T2425] ? __cfi_generic_map_update_batch+0x10/0x10 [ 1827.078426][ T2425] ? __fdget+0x19c/0x220 [ 1827.082655][ T2425] ? __cfi_generic_map_update_batch+0x10/0x10 [ 1827.088708][ T2425] bpf_map_do_batch+0x48c/0x620 [ 1827.093542][ T2425] __sys_bpf+0x624/0x780 [ 1827.097777][ T2425] ? bpf_link_show_fdinfo+0x320/0x320 [ 1827.103129][ T2425] ? __cfi_sched_clock_cpu+0x10/0x10 [ 1827.108397][ T2425] __x64_sys_bpf+0x7c/0x90 [ 1827.112802][ T2425] x64_sys_call+0x488/0x9a0 [ 1827.117355][ T2425] do_syscall_64+0x4c/0xa0 [ 1827.121760][ T2425] ? clear_bhb_loop+0x30/0x80 [ 1827.126422][ T2425] ? clear_bhb_loop+0x30/0x80 [ 1827.131085][ T2425] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1827.136963][ T2425] RIP: 0033:0x7f768138f749 [ 1827.141357][ T2425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1827.161032][ T2425] RSP: 002b:00007f76821bb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1827.169449][ T2425] RAX: ffffffffffffffda RBX: 00007f76815e5fa0 RCX: 00007f768138f749 [ 1827.177404][ T2425] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 1827.185355][ T2425] RBP: 00007f76821bb090 R08: 0000000000000000 R09: 0000000000000000 [ 1827.193307][ T2425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1827.201260][ T2425] R13: 00007f76815e6038 R14: 00007f76815e5fa0 R15: 00007ffcc7cbd0d8 [ 1827.209317][ T2425] [ 1829.752230][ T2485] device pim6reg1 entered promiscuous mode [ 1832.022925][ T2548] FAULT_INJECTION: forcing a failure. [ 1832.022925][ T2548] name failslab, interval 1, probability 0, space 0, times 0 [ 1832.035724][ T2548] CPU: 0 PID: 2548 Comm: syz.7.9695 Not tainted syzkaller #0 [ 1832.043111][ T2548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1832.053167][ T2548] Call Trace: [ 1832.056449][ T2548] [ 1832.059378][ T2548] __dump_stack+0x21/0x24 [ 1832.063734][ T2548] dump_stack_lvl+0xee/0x150 [ 1832.068330][ T2548] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1832.073363][ T2548] dump_stack+0x15/0x24 [ 1832.077531][ T2548] should_fail_ex+0x3d4/0x520 [ 1832.082327][ T2548] __should_failslab+0xac/0xf0 [ 1832.087116][ T2548] ? bpf_prog_test_run_skb+0x24f/0x1290 [ 1832.092681][ T2548] should_failslab+0x9/0x20 [ 1832.097185][ T2548] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1832.102568][ T2548] ? bpf_prog_test_run_skb+0x24f/0x1290 [ 1832.108121][ T2548] __kmalloc+0xa1/0x1e0 [ 1832.112281][ T2548] bpf_prog_test_run_skb+0x24f/0x1290 [ 1832.117672][ T2548] ? __fget_files+0x2d5/0x330 [ 1832.122358][ T2548] ? __kasan_check_write+0x14/0x20 [ 1832.127468][ T2548] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 1832.133369][ T2548] bpf_prog_test_run+0x3e3/0x630 [ 1832.138313][ T2548] ? slab_free_freelist_hook+0xc2/0x190 [ 1832.143860][ T2548] ? bpf_prog_query+0x270/0x270 [ 1832.148708][ T2548] ? selinux_bpf+0xce/0xf0 [ 1832.153143][ T2548] ? security_bpf+0x93/0xb0 [ 1832.157642][ T2548] __sys_bpf+0x56d/0x780 [ 1832.161882][ T2548] ? bpf_link_show_fdinfo+0x320/0x320 [ 1832.167259][ T2548] ? __cfi_ksys_write+0x10/0x10 [ 1832.172128][ T2548] ? debug_smp_processor_id+0x17/0x20 [ 1832.177494][ T2548] __x64_sys_bpf+0x7c/0x90 [ 1832.181917][ T2548] x64_sys_call+0x488/0x9a0 [ 1832.186505][ T2548] do_syscall_64+0x4c/0xa0 [ 1832.190923][ T2548] ? clear_bhb_loop+0x30/0x80 [ 1832.195616][ T2548] ? clear_bhb_loop+0x30/0x80 [ 1832.200308][ T2548] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1832.206215][ T2548] RIP: 0033:0x7fde54d8f749 [ 1832.210628][ T2548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1832.230232][ T2548] RSP: 002b:00007fde55b7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1832.238736][ T2548] RAX: ffffffffffffffda RBX: 00007fde54fe5fa0 RCX: 00007fde54d8f749 [ 1832.246727][ T2548] RDX: 0000000000000050 RSI: 0000200000000540 RDI: 000000000000000a [ 1832.254698][ T2548] RBP: 00007fde55b7a090 R08: 0000000000000000 R09: 0000000000000000 [ 1832.262719][ T2548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1832.270774][ T2548] R13: 00007fde54fe6038 R14: 00007fde54fe5fa0 R15: 00007fffdc691b68 [ 1832.278855][ T2548] [ 1835.226764][ T2604] FAULT_INJECTION: forcing a failure. [ 1835.226764][ T2604] name failslab, interval 1, probability 0, space 0, times 0 [ 1835.246599][ T2604] CPU: 0 PID: 2604 Comm: syz.0.9710 Not tainted syzkaller #0 [ 1835.254014][ T2604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1835.264075][ T2604] Call Trace: [ 1835.267370][ T2604] [ 1835.270300][ T2604] __dump_stack+0x21/0x24 [ 1835.274631][ T2604] dump_stack_lvl+0xee/0x150 [ 1835.279223][ T2604] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1835.284248][ T2604] ? unwind_get_return_address+0x4d/0x90 [ 1835.289969][ T2604] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 1835.296123][ T2604] dump_stack+0x15/0x24 [ 1835.300281][ T2604] should_fail_ex+0x3d4/0x520 [ 1835.304975][ T2604] __should_failslab+0xac/0xf0 [ 1835.309761][ T2604] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 1835.315761][ T2604] should_failslab+0x9/0x20 [ 1835.320274][ T2604] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1835.326083][ T2604] ? __cfi_mutex_lock+0x10/0x10 [ 1835.330943][ T2604] ? delete_node+0x2f4/0xa60 [ 1835.335547][ T2604] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 1835.341531][ T2604] __kmalloc+0xa1/0x1e0 [ 1835.345687][ T2604] ? __cfi___bpf_trace_sys_enter+0x10/0x10 [ 1835.351542][ T2604] tracepoint_probe_unregister+0x1e6/0x8b0 [ 1835.357375][ T2604] bpf_probe_unregister+0x61/0x70 [ 1835.362414][ T2604] bpf_raw_tp_link_release+0x63/0x90 [ 1835.367706][ T2604] bpf_link_free+0x13a/0x390 [ 1835.372300][ T2604] ? bpf_link_put_deferred+0x20/0x20 [ 1835.377684][ T2604] bpf_link_release+0x15f/0x170 [ 1835.382528][ T2604] ? __cfi_bpf_link_release+0x10/0x10 [ 1835.387893][ T2604] __fput+0x1fc/0x8f0 [ 1835.391890][ T2604] ____fput+0x15/0x20 [ 1835.395864][ T2604] task_work_run+0x1db/0x240 [ 1835.400467][ T2604] ? __cfi_task_work_run+0x10/0x10 [ 1835.405574][ T2604] ? fput+0x15b/0x1a0 [ 1835.409556][ T2604] exit_to_user_mode_loop+0x9b/0xb0 [ 1835.414752][ T2604] exit_to_user_mode_prepare+0x87/0xd0 [ 1835.420213][ T2604] syscall_exit_to_user_mode+0x1a/0x30 [ 1835.425687][ T2604] do_syscall_64+0x58/0xa0 [ 1835.430111][ T2604] ? clear_bhb_loop+0x30/0x80 [ 1835.434791][ T2604] ? clear_bhb_loop+0x30/0x80 [ 1835.439573][ T2604] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1835.445485][ T2604] RIP: 0033:0x7f3abc78f749 [ 1835.449906][ T2604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1835.469513][ T2604] RSP: 002b:00007f3abd6eb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1835.477931][ T2604] RAX: 0000000000000000 RBX: 00007f3abc9e5fa0 RCX: 00007f3abc78f749 [ 1835.485941][ T2604] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 1835.493912][ T2604] RBP: 00007f3abd6eb090 R08: 0000000000000000 R09: 0000000000000000 [ 1835.501877][ T2604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1835.509844][ T2604] R13: 00007f3abc9e6038 R14: 00007f3abc9e5fa0 R15: 00007ffdff911258 [ 1835.517819][ T2604] [ 1835.523162][ T2604] CFI failure at __traceiter_sys_enter+0x34/0x50 (target: tp_stub_func+0x0/0x10; expected type: 0x4877830c) [ 1835.534831][ T2604] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1835.540103][ T2050] CFI failure at __traceiter_sys_enter+0x34/0x50 (target: tp_stub_func+0x0/0x10; expected type: 0x4877830c) [ 1835.540896][ T2604] CPU: 1 PID: 2604 Comm: syz.0.9710 Not tainted syzkaller #0 [ 1835.559656][ T2604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1835.569688][ T2604] RIP: 0010:__traceiter_sys_enter+0x34/0x50 [ 1835.575562][ T2604] Code: 8b 3d c0 b1 10 06 4d 85 ff 74 2e 48 89 d3 49 89 f6 49 8b 07 49 8b 7f 08 4c 89 f6 48 89 da 41 ba f4 7c 88 b7 44 03 50 fc 74 02 <0f> 0b ff d0 49 83 7f 18 00 4d 8d 7f 18 75 d8 31 c0 5b 41 5e 41 5f [ 1835.595164][ T2604] RSP: 0018:ffffc90001327ea8 EFLAGS: 00010a17 [ 1835.601213][ T2604] RAX: ffffffff81714650 RBX: 0000000000000000 RCX: ffff8881533a1440 [ 1835.609174][ T2604] RDX: 0000000000000000 RSI: ffffc90001327f58 RDI: ffffc900016af000 [ 1835.617135][ T2604] RBP: ffffc90001327ec0 R08: 0000000000000000 R09: 0000000000000000 [ 1835.625200][ T2604] R10: 000000005cc8e400 R11: 0000000000000000 R12: ffff8881533a1440 [ 1835.633151][ T2604] R13: 0000000000000000 R14: ffffc90001327f58 R15: ffff88812792fb10 [ 1835.641097][ T2604] FS: 00007f3abd6eb6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1835.650276][ T2604] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1835.656832][ T2604] CR2: 0000001b3471cff8 CR3: 0000000125716000 CR4: 00000000003506a0 [ 1835.664778][ T2604] DR0: 0000000000000002 DR1: 0000200000000300 DR2: 0000000000000000 [ 1835.672720][ T2604] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1835.680663][ T2604] Call Trace: [ 1835.683917][ T2604] [ 1835.686840][ T2604] trace_sys_enter+0x3d/0x50 [ 1835.691408][ T2604] syscall_trace_enter+0xf3/0x150 [ 1835.696404][ T2604] syscall_enter_from_user_mode+0x1f/0x30 [ 1835.702099][ T2604] do_syscall_64+0x24/0xa0 [ 1835.706500][ T2604] ? clear_bhb_loop+0x30/0x80 [ 1835.711154][ T2604] ? clear_bhb_loop+0x30/0x80 [ 1835.715804][ T2604] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1835.721670][ T2604] RIP: 0033:0x7f3abc78e15c [ 1835.726056][ T2604] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1835.745633][ T2604] RSP: 002b:00007f3abd6eb030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1835.754018][ T2604] RAX: ffffffffffffffda RBX: 00007f3abc9e5fa0 RCX: 00007f3abc78e15c [ 1835.761976][ T2604] RDX: 000000000000000f RSI: 00007f3abd6eb0a0 RDI: 000000000000000b [ 1835.769929][ T2604] RBP: 00007f3abd6eb090 R08: 0000000000000000 R09: 0000000000000000 [ 1835.777871][ T2604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1835.785816][ T2604] R13: 00007f3abc9e6038 R14: 00007f3abc9e5fa0 R15: 00007ffdff911258 [ 1835.793768][ T2604] [ 1835.796769][ T2604] Modules linked in: [ 1835.800675][ T2050] invalid opcode: 0000 [#2] PREEMPT SMP KASAN [ 1835.800874][ T2604] ---[ end trace 0000000000000000 ]--- [ 1835.806765][ T2050] CPU: 0 PID: 2050 Comm: syz-executor Tainted: G D syzkaller #0 [ 1835.806783][ T2050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1835.806791][ T2050] RIP: 0010:__traceiter_sys_enter+0x34/0x50 [ 1835.806812][ T2050] Code: 8b 3d c0 b1 10 06 4d 85 ff 74 2e 48 89 d3 49 89 f6 49 8b 07 49 8b 7f 08 4c 89 f6 48 89 da 41 ba f4 7c 88 b7 44 03 50 fc 74 02 <0f> 0b ff d0 49 83 7f 18 00 4d 8d 7f 18 75 d8 31 c0 5b 41 5e 41 5f [ 1835.806826][ T2050] RSP: 0018:ffffc90000777ea8 EFLAGS: 00010a17 [ 1835.806842][ T2050] RAX: ffffffff81714650 RBX: 000000000000003d RCX: ffff888126202880 [ 1835.806854][ T2050] RDX: 000000000000003d RSI: ffffc90000777f58 RDI: ffffc900016af000 [ 1835.806864][ T2050] RBP: ffffc90000777ec0 R08: 0000000000000000 R09: 0000000000000000 [ 1835.806874][ T2050] R10: 000000005cc8e400 R11: 0000000000000000 R12: ffff888126202880 [ 1835.806884][ T2050] R13: 0000000000000000 R14: ffffc90000777f58 R15: ffff88812792fb10 [ 1835.806894][ T2050] FS: 000055556c292500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1835.806907][ T2050] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1835.806917][ T2050] CR2: 0000000100000000 CR3: 000000014bc9e000 CR4: 00000000003506b0 [ 1835.806932][ T2050] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1835.806942][ T2050] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1835.806952][ T2050] Call Trace: [ 1835.806958][ T2050] [ 1835.806965][ T2050] trace_sys_enter+0x3d/0x50 [ 1835.806980][ T2050] syscall_trace_enter+0xf3/0x150 [ 1835.807003][ T2050] syscall_enter_from_user_mode+0x1f/0x30 [ 1835.807026][ T2050] do_syscall_64+0x24/0xa0 [ 1835.807042][ T2050] ? clear_bhb_loop+0x30/0x80 [ 1835.812489][ T2604] RIP: 0010:__traceiter_sys_enter+0x34/0x50 [ 1835.821480][ T2050] ? clear_bhb_loop+0x30/0x80 [ 1835.821503][ T2050] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1835.831554][ T2604] Code: 8b 3d c0 b1 10 06 4d 85 ff 74 2e 48 89 d3 49 89 f6 49 8b 07 49 8b 7f 08 4c 89 f6 48 89 da 41 ba f4 7c 88 b7 44 03 50 fc 74 02 <0f> 0b ff d0 49 83 7f 18 00 4d 8d 7f 18 75 d8 31 c0 5b 41 5e 41 5f [ 1835.837411][ T2050] RIP: 0033:0x7fde54d85853 [ 1835.837427][ T2050] Code: 00 00 0f 1f 44 00 00 31 c9 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 80 3d 11 5d 23 00 00 49 89 ca 74 14 b8 3d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 5d c3 0f 1f 40 00 48 83 ec 28 89 54 24 14 48 [ 1835.857113][ T2604] RSP: 0018:ffffc90001327ea8 EFLAGS: 00010a17 [ 1835.863049][ T2050] RSP: 002b:00007fffdc691ee8 EFLAGS: 00000202 ORIG_RAX: 000000000000003d [ 1835.863068][ T2050] RAX: ffffffffffffffda RBX: 000000000000006e RCX: 00007fde54d85853 [ 1835.871123][ T2604] [ 1835.879052][ T2050] RDX: 0000000040000001 RSI: 00007fffdc691f2c RDI: 00000000ffffffff [ 1835.879064][ T2050] RBP: 00007fffdc691f2c R08: 000000000000072b R09: 0000000000000000 [ 1835.879076][ T2050] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000001388 [ 1835.887030][ T2604] RAX: ffffffff81714650 RBX: 0000000000000000 RCX: ffff8881533a1440 [ 1835.894963][ T2050] R13: 00000000000927c0 R14: 00000000001c01e8 R15: 00007fffdc691f80 [ 1835.894981][ T2050] [ 1835.902926][ T2604] RDX: 0000000000000000 RSI: ffffc90001327f58 RDI: ffffc900016af000 [ 1835.911838][ T2050] Modules linked in: [ 1835.911936][ T2050] ---[ end trace 0000000000000000 ]--- [ 1835.918455][ T2604] RBP: ffffc90001327ec0 R08: 0000000000000000 R09: 0000000000000000 [ 1835.926412][ T2050] RIP: 0010:__traceiter_sys_enter+0x34/0x50 [ 1835.934347][ T2604] R10: 000000005cc8e400 R11: 0000000000000000 R12: ffff8881533a1440 [ 1835.942314][ T2050] Code: 8b 3d c0 b1 10 06 4d 85 ff 74 2e 48 89 d3 49 89 f6 49 8b 07 49 8b 7f 08 4c 89 f6 48 89 da 41 ba f4 7c 88 b7 44 03 50 fc 74 02 <0f> 0b ff d0 49 83 7f 18 00 4d 8d 7f 18 75 d8 31 c0 5b 41 5e 41 5f [ 1835.945591][ T2604] R13: 0000000000000000 R14: ffffc90001327f58 R15: ffff88812792fb10 [ 1835.948491][ T2050] RSP: 0018:ffffc90001327ea8 EFLAGS: 00010a17 [ 1835.953049][ T2604] FS: 00007f3abd6eb6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1835.958057][ T2050] [ 1835.958063][ T2050] RAX: ffffffff81714650 RBX: 0000000000000000 RCX: ffff8881533a1440 [ 1835.963809][ T2604] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1835.968209][ T2050] RDX: 0000000000000000 RSI: ffffc90001327f58 RDI: ffffc900016af000 [ 1835.968222][ T2050] RBP: ffffc90001327ec0 R08: 0000000000000000 R09: 0000000000000000 [ 1835.972871][ T2604] CR2: 0000001b3471cff8 CR3: 0000000125716000 CR4: 00000000003506a0 [ 1835.978762][ T2050] R10: 000000005cc8e400 R11: 0000000000000000 R12: ffff8881533a1440 [ 1835.978775][ T2050] R13: 0000000000000000 R14: ffffc90001327f58 R15: ffff88812792fb10 [ 1835.983428][ T2604] DR0: 0000000000000002 DR1: 0000200000000300 DR2: 0000000000000000 [ 1835.989347][ T2050] FS: 000055556c292500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1836.008957][ T2604] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1836.008974][ T2604] Kernel panic - not syncing: Fatal exception [ 1836.013806][ T2604] Kernel Offset: disabled [ 1836.273783][ T2604] Rebooting in 86400 seconds..