last executing test programs: 5m42.899996322s ago: executing program 4 (id=3174): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xb3}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x28c2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd"], 0xcfa4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64=r2], &(0x7f0000000240)='GPL\x00', 0xfffffffb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) close(r0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r6, &(0x7f0000000080)="44059a1004972086ebc5ad6cedac97c07b17446cecd83475e7fe87262c74a74c641161026f37a4c8ffe10fc5be1dd6694f97879bfe", &(0x7f0000000100)=""/61}, 0x20) 5m41.697251289s ago: executing program 4 (id=3181): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x3, 0x5, 0x1000, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002300)={0x0, 0x0, 0x31, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffe}, [@call={0x85, 0x0, 0x0, 0x41}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800"/13, @ANYBLOB="0000000000000000b70200001400ffd9b703000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) gettid() mkdir(&(0x7f0000000280)='./file0\x00', 0x100) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000a000000080000000200000fffffffff0e000000000000000300000007000000030000ca75ffffff00000000000000002e"], 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 5m41.059880949s ago: executing program 3 (id=3188): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000800000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000420000008500000082000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x58a8100, 0x0, 0x0, 0x0, 0x0, 0x0) 5m40.97109458s ago: executing program 3 (id=3189): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r3}, 0x10) 5m40.820358812s ago: executing program 3 (id=3192): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r5}, 0x10) 5m40.765642244s ago: executing program 4 (id=3193): r0 = syz_clone(0x42820080, &(0x7f0000000300)="610e3b72d8dc687a1007a605161a834cdc77e5be997a27fb44546eb5a0604fa1bb2a9e122beccb5f69dbd8d29c9c86775b4fc55c6c94e0f8660c9391a4c77c0b01f6900c9bd243a9273004d39348deed46ca60cd649d6da2b731bd98d66f3e", 0x5f, &(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000740)="bf9c603c6ee4db34a9e81755a5ce30a97f81f90bd0755354882c223e3b7b29ab9a3d54aeb09f77e216e9fed795b43a964df3644f3db8425be6b8111db85d58f479ee3731d3ac21d50a0af46f9a7679abb810fe01d512a9493c0ff3f3e562f7abeea5620cffc0720253afdc4bdd0136a9197a666c4f8e3f7e50f337277a20c5583b334847e47cd2b5d301ac219bffa93688") perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x400}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="06000000000000000006000000050000000089ee1500008201bf149ea302dfc45bde1fd155dccc23b097c658639d8ce4b99d7c239825f17e8b58f892b2ee548c311d44112ac851de5b4d9a40a12bf546cc", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x0, 0x6, 0xff, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x5}, 0x80, 0x7, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffbffe, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000080)) 5m40.256766191s ago: executing program 1 (id=3195): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r0}, 0x38) (async, rerun: 32) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000a00000006000000010000060400000003000000000000000000002e1e006f"], 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 5m40.195365102s ago: executing program 1 (id=3196): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 5m40.135846063s ago: executing program 3 (id=3197): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f00000004c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000032000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) 5m39.971992345s ago: executing program 1 (id=3198): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x9, 0x4, 0x14, 0xaa, 0x0, 0x1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) openat$cgroup_ro(r2, &(0x7f0000000540)='memory.events\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x17, 0x0, 0x7, 0x8, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r4}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) r5 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x10, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x62}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x7, 0x1, 0x5, 0x0, 0x6, 0x8, 0x4}, @generic={0x3, 0x3, 0x8, 0x400, 0x6}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8e92}]}, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x73, &(0x7f0000000540)=""/115, 0x41000, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x2, 0x7, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000740)=[r5, r0, r3, r5, r5, r4, r3, r4, r4, r0], 0x0, 0x10, 0xd4e0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000003c0)='wbt_timer\x00', r6, 0x0, 0x9}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a0300fef0ffffff79a4f0ff00000000b7060000ffffffff2e640500000000007502faff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000026000000b70000000000002995000000000000001da5ad3548ebb63d18db6a1c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6d5b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8c18119a6926083f4a2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa387a8077927a1ad367c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f20002b35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8c367d1bfd1aea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82dc568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000000000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac6f09c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccf5e882602897a85bf8523d891080593d831d758deb4f2c7e49c6d6b35d8fd92601c8500febb0c5fe0be294bf6bbbecad444695277a9e3992a354492513b43091d161c7c7cdbbe44e8e83b4cf333238a52f214b278c6485236ea880db2f113f6381187679a4620d6149808b0af024b3b3e6ba99b4b15ca"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r9, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="f6ea090003000060009ba53886dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 5m39.834244297s ago: executing program 4 (id=3200): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000800000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000420000008500000082000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x58a8100, 0x0, 0x0, 0x0, 0x0, 0x0) 5m39.804619268s ago: executing program 1 (id=3201): bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) write$cgroup_pressure(r1, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff000000820c0200", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00a300"/21], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 5m39.548352821s ago: executing program 4 (id=3204): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000030ebbd954c8122baeb3aab5fe4a1d0e1ab40b9b0db1b0599e57457eb6c3b7fa33a3e38c744"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xb4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1a, 0x1, 0x100000, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc0a00e9bfde908990817b364e51afe9c81a97f0570759f1cae63487ff68fffffffffffe8e3932e2b7185a25a4cf8a9456aa8a701c318c67edb6e9330b53c0eeba8644311ba75411890700000000000000d8e5b1dc91c5499bea0977"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r4}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x101, 0x7ffc, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x101, 0x7ffc, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff9b, 0x8}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff9b, 0x8}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0c000000040000000400000009"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0xffffffff, r6}, 0x38) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 5m39.217186616s ago: executing program 32 (id=3206): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r2, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740), &(0x7f00000007c0), 0xffffd6c0, r3}, 0x38) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb010017fffff0000000000cebffff0b00000005000000030000000000000c000000000000005f00d4394bd65ab19cd189750be98a071c3dd86b70cbbb646eaaab0dec43f4654016bbd63007d73351ad0f04d1ace6e30aae7805c26e5f4b0a000000000000000000000000000086ad187500b171ad02aad058b39e18132d6ee8ab218e5e332f9742d9f255060d1e65583e5810097f357826cd273a37ad59a3890850e6c8f265683aa7c39381469cadb0faca85a0e1e31924c6bd5ccca69583aca681ff32f690878ba5c9c273fd107171d99dbefc01298955017f80acc870da395927e8b99d92073db0f2f8f7c3347639a4"], 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 32) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb0100180000006a3c9a8400000000340000003400846b05000000030000000000001103000000000000000000000000000004000000000000000001000084000000000000000002000000000000000000002e00"], 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) (async, rerun: 64) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) unlink(0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) (async) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) (async, rerun: 64) r6 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x80, 0x0, 0x2, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xb}, 0x12428, 0x0, 0xffffffff, 0x0, 0x0, 0x3}, r6, 0x4, 0xffffffffffffffff, 0x2) (async, rerun: 32) r7 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r8 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r8, 0x0, r7, 0x0) (async, rerun: 64) syz_open_procfs$namespace(r8, &(0x7f0000000080)='ns/net\x00') (rerun: 64) 5m39.113169568s ago: executing program 4 (id=3207): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r5}, 0x10) 5m39.022364709s ago: executing program 33 (id=3207): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r5}, 0x10) 5m39.017169279s ago: executing program 5 (id=3216): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xb3}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x28c2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd"], 0xcfa4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64=r2], &(0x7f0000000240)='GPL\x00', 0xfffffffb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) close(r0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r6, &(0x7f0000000080)="44059a1004972086ebc5ad6cedac97c07b17446cecd83475e7fe87262c74a74c641161026f37a4c8ffe10fc5be1dd6694f97879bfe5db9a8d95ddc171a5c1e8673bd", &(0x7f0000000100)=""/61}, 0x20) 5m39.016374749s ago: executing program 3 (id=3209): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000500)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x22}]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x30}, [@ldst={0x3, 0x3, 0x3, 0xa, 0x0, 0xff00}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8946, &(0x7f0000000900)={'wg2\x00', @random='\x00\x00\x00 \x00'}) 5m38.889604761s ago: executing program 34 (id=3216): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xb3}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x28c2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd"], 0xcfa4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64=r2], &(0x7f0000000240)='GPL\x00', 0xfffffffb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) close(r0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r6, &(0x7f0000000080)="44059a1004972086ebc5ad6cedac97c07b17446cecd83475e7fe87262c74a74c641161026f37a4c8ffe10fc5be1dd6694f97879bfe5db9a8d95ddc171a5c1e8673bd", &(0x7f0000000100)=""/61}, 0x20) 5m38.864459961s ago: executing program 3 (id=3211): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000000c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x8, 0x3d, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x9ae0067}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000004, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) close(r0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c3000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r1, r5, 0x5, 0x0, 0x0, @void, @value}, 0x10) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r1}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) (async, rerun: 64) sendmsg(r2, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001400)='H', 0x20001401}], 0x1}, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1ef7cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x401, 0x200, 0x5, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) (rerun: 64) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) (rerun: 32) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r6}, 0x10) (async, rerun: 64) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x10) (rerun: 64) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 5m38.779707473s ago: executing program 35 (id=3211): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000000c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x8, 0x3d, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) (rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x9ae0067}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000004, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}, [@call={0x27}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) close(r0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c3000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)={@map=r1, r5, 0x5, 0x0, 0x0, @void, @value}, 0x10) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r1}, &(0x7f0000000100), &(0x7f0000000140)=r0}, 0x20) (async, rerun: 64) sendmsg(r2, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001400)='H', 0x20001401}], 0x1}, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1ef7cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x401, 0x200, 0x5, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) (rerun: 64) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) (rerun: 32) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r6}, 0x10) (async, rerun: 64) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x10) (rerun: 64) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 5m38.733259463s ago: executing program 6 (id=3208): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 5m38.732875393s ago: executing program 36 (id=3208): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 5m38.727504313s ago: executing program 1 (id=3214): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000800000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000420000008500000082000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x58a8100, 0x0, 0x0, 0x0, 0x0, 0x0) 5m38.491520097s ago: executing program 1 (id=3218): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) syz_clone(0x160480, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 5m38.382512229s ago: executing program 37 (id=3218): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) syz_clone(0x160480, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) 5.594699557s ago: executing program 7 (id=6388): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYRES8=r0], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x6a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) 4.458529363s ago: executing program 7 (id=6399): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sys_enter\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000eded85b06bdc5800000000000000000000000000000000000000002a96a2e5bbc72f7cb4a608f6158c6fac9fe3290992fd6ece7de448fe0d208f4e4f69da7fd9b064365feb8a00a51c94c46dfaa8887ce4cddb0ae653de6ba410a61f8a148dce6f7ee63fcff938501c5ab2"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x18500, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000002140)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='initcall_start\x00', r12}, 0x10) r13 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r13, r2, 0x0, 0xa, &(0x7f0000000000)='sys_enter\x00'}, 0x30) 4.396923814s ago: executing program 0 (id=6400): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1601, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000400)=r0, 0x12) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x15, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000004000000000000000000073010d000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x94200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xc}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='cpu&\t\t') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000001c0)='svc_xprt_dequeue\x00', r1, 0x0, 0x3ff}, 0xffffffffffffff93) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 4.321507765s ago: executing program 7 (id=6404): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYRES8=r0], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x6a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) 3.488127868s ago: executing program 2 (id=6408): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x0, 0x6, 0xff, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x5}, 0x80, 0x7, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffbffe, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000080)) 3.424265569s ago: executing program 2 (id=6409): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000010c0)) 3.200427082s ago: executing program 2 (id=6410): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x3, [{0x0, 0x3}]}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x20}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2}}]}}, 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0004f678ec630000000066"], 0xd) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000980000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3d, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xac) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x8202) 3.137136073s ago: executing program 7 (id=6411): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r1, 0xffffffffffffffff, 0x14, 0x0, 0x4000, @void, @value}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xf}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r4 = syz_clone(0x4a000, &(0x7f0000000240)="828e92a55460c48aa3a742b0f4134c8333502c1d342094202c756cdec2a25837d089236413e4b7481df17eedca07ece4b6a29f8a3217066f1628f77a2703", 0x3e, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="1e") perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x5, 0x3, 0xf, 0x8, 0x0, 0x2, 0x82000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x2, 0xa, 0x9, 0x7, 0x7, 0xfffe, 0x0, 0x4, 0x0, 0x8}, r4, 0xf, r3, 0x1) 3.034552094s ago: executing program 7 (id=6415): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2.908390867s ago: executing program 7 (id=6417): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="050000000400000008000000050000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000080013c980dccff4733ab10bf7548c501a230197fdcc3e06aabab801272bb621b5e1814539b8fb23cb76bdc41bb5ca2c90a1a45d6825b5ce06269de7dd2ba44607fad6404a9cf5e33e071512f74c9772eb4f0d1e15f37f52e3d4208e0c2c6013fae72d", @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x9, 0x0, 0x8000000, 0x1589, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x25}, 0x11, 0x1, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x42, &(0x7f0000000040), 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000ffff000000007200ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, r4, 0x4, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='\"pu&00\t&&') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r6 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0x0, r6, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0x0, r6, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x9, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x9, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) close(r6) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 2.63605924s ago: executing program 2 (id=6418): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000180)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x4, 0x0, 0x0, 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf5, @void, @value}, 0x94) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.176339188s ago: executing program 0 (id=6419): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x0, 0x6, 0xff, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x5}, 0x80, 0x7, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffbffe, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000080)) 2.120136798s ago: executing program 0 (id=6420): socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="100000000000000000"], 0x10}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000e500180000000400"/31], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}, 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 2.063796599s ago: executing program 9 (id=6421): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r4}, 0x8) close(r5) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r3, r2, 0x4, r2}, 0x10) 1.860736342s ago: executing program 9 (id=6423): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0xfffffffffffffffd, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0xcb, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000340)}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0xa, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r0}, &(0x7f0000000140), &(0x7f0000000380)='%pI4 \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x61) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = getpid() syz_open_procfs$namespace(r2, &(0x7f0000000240)='ns/pid\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x67, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r3}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000300000000000000000000008500000087000000850000000500000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa71f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.625154655s ago: executing program 8 (id=6425): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r1) 1.583728026s ago: executing program 8 (id=6426): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0, @exit, @alu={0x5, 0x1, 0x2, 0xa, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xec, &(0x7f00000004c0)=""/236, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3ff, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x5421, 0x110e22ffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_clone(0x44044000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) 1.464732178s ago: executing program 9 (id=6427): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.373632629s ago: executing program 2 (id=6428): bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b700000000000000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x4, 0x4, 0x1000ff, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r2, 0x0, 0x0}, 0x20) 1.285236801s ago: executing program 9 (id=6429): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x82e5, 0x800, 0x1, 0x5, '\x00', r1, 0xffffffffffffffff, 0x4, 0x3, 0x4, 0x6, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 1.165120542s ago: executing program 0 (id=6430): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYBLOB="956b1d83914840e8ca62bc83", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) openat$cgroup_ro(r1, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="1100000004000000040000007f00100004000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x48) 969.150715ms ago: executing program 9 (id=6431): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYRES8=r0], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x6a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) 601.994691ms ago: executing program 0 (id=6432): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYBLOB="956b1d83914840e8ca62bc83", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) openat$cgroup_ro(r1, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="1100000004000000040000007f00100004000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x48) 593.279691ms ago: executing program 2 (id=6433): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3ff, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002ec0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r3, 0x60, &(0x7f0000001100)}, 0x10) 436.641323ms ago: executing program 8 (id=6434): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@bloom_filter={0x1e, 0x4, 0x4, 0x82e5, 0x800, 0x1, 0x5, '\x00', r1, 0xffffffffffffffff, 0x4, 0x3, 0x4, 0x6, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 237.416026ms ago: executing program 8 (id=6435): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='contention_end\x00', r0}, 0x10) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='memory.swap.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000140)=0x40, 0x12) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0xf}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.latency\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000040)=0x800, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a3, &(0x7f0000000080)) 110.137928ms ago: executing program 8 (id=6436): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x15, 0x2, 0x0, 0x6, 0x40014, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xe7}, 0x8096, 0x2b51d658, 0x8, 0x7, 0x3, 0xac7c, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x5, r1, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r1) 9.35167ms ago: executing program 8 (id=6437): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r1) (fail_nth: 1) 8.5682ms ago: executing program 0 (id=6438): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x73, &(0x7f00000001c0)=[{}], 0x8, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x62, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0xfff, 0x0, r1, 0x7, '\x00', r2, r3, 0x0, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 9 (id=6439): bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x5, 0x202aa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3ff, 0x0, @perf_config_ext={0x6}, 0x1001, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x5, 0x202aa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3ff, 0x0, @perf_config_ext={0x6}, 0x1001, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000009f910000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r2, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) (async) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) close(r0) kernel console output (not intermixed with test programs): 1(bridge_slave_0) entered disabled state [ 374.060443][T11257] device bridge_slave_1 left promiscuous mode [ 374.086910][T11257] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.111238][T11257] device bridge_slave_0 left promiscuous mode [ 374.138819][T11257] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.114432][T11273] device sit0 left promiscuous mode [ 376.141562][T11277] device sit0 entered promiscuous mode [ 376.339499][T11306] syz.2.3326 uses obsolete (PF_INET,SOCK_PACKET) [ 376.380887][T11308] bond_slave_1: mtu less than device minimum [ 378.320236][T11347] device syzkaller0 entered promiscuous mode [ 378.782531][T11353] tun0: tun_chr_ioctl cmd 1074025677 [ 378.803653][T11353] tun0: linktype set to 513 [ 379.704899][T11370] device syzkaller0 entered promiscuous mode [ 379.944624][T11376] device sit0 left promiscuous mode [ 380.048940][T11379] device sit0 entered promiscuous mode [ 380.693442][T11396] bond_slave_1: mtu less than device minimum [ 380.860556][T11397] device sit0 entered promiscuous mode [ 381.106027][T11404] device sit0 left promiscuous mode [ 381.140919][T11406] device sit0 entered promiscuous mode [ 382.167658][T11432] device syzkaller0 entered promiscuous mode [ 382.470008][T11440] device syzkaller0 entered promiscuous mode [ 382.672115][T11453] device sit0 left promiscuous mode [ 382.770272][T11456] device sit0 entered promiscuous mode [ 383.884555][T11516] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.891844][T11516] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.086685][T11523] device bridge_slave_1 left promiscuous mode [ 384.094554][T11523] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.114969][T11523] device bridge_slave_0 left promiscuous mode [ 384.135921][T11523] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.697804][T11566] device veth0_vlan left promiscuous mode [ 385.703591][T11566] device veth0_vlan entered promiscuous mode [ 385.727539][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 385.746078][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 385.766036][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 387.179787][T11596] device veth0_vlan left promiscuous mode [ 387.212496][T11596] device veth0_vlan entered promiscuous mode [ 387.277160][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 387.300494][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 387.321263][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 387.804991][T11624] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 388.673472][T11643] device sit0 left promiscuous mode [ 388.729405][T11644] device sit0 entered promiscuous mode [ 390.610232][T11657] device pim6reg1 entered promiscuous mode [ 390.868316][T11674] bond_slave_1: mtu less than device minimum [ 391.150494][T11680] device syzkaller0 entered promiscuous mode [ 391.677156][T11684] device sit0 left promiscuous mode [ 392.552062][T11721] device syzkaller0 entered promiscuous mode [ 392.646940][T11729] device pim6reg1 entered promiscuous mode [ 392.800652][T11739] bond_slave_1: mtu less than device minimum [ 393.988054][T11786] device syzkaller0 entered promiscuous mode [ 394.617493][T11805] bond_slave_1: mtu less than device minimum [ 396.247714][T11858] device veth1_macvtap left promiscuous mode [ 397.377259][T11908] device sit0 left promiscuous mode [ 397.712230][T11922] device sit0 entered promiscuous mode [ 398.149808][T11936] device syzkaller0 entered promiscuous mode [ 398.352289][T11941] device syzkaller0 entered promiscuous mode [ 398.641522][T11955] device sit0 entered promiscuous mode [ 399.362488][T11975] device syzkaller0 entered promiscuous mode [ 399.841790][T11980] device syzkaller0 entered promiscuous mode [ 399.941591][T11986] bond_slave_1: mtu less than device minimum [ 399.996449][T11990] device wg2 entered promiscuous mode [ 401.167223][T12033] device syzkaller0 entered promiscuous mode [ 401.224389][T12034] bond_slave_1: mtu less than device minimum [ 401.240255][T12029] device sit0 left promiscuous mode [ 401.823313][T12037] device syzkaller0 entered promiscuous mode [ 401.856797][T12033] device sit0 entered promiscuous mode [ 403.225366][T12070] device syzkaller0 entered promiscuous mode [ 403.814320][T12082] device sit0 entered promiscuous mode [ 404.385452][T12084] device syzkaller0 entered promiscuous mode [ 404.649916][T12087] device veth1_macvtap left promiscuous mode [ 404.655950][T12087] device macsec0 entered promiscuous mode [ 405.037644][T12101] FAULT_INJECTION: forcing a failure. [ 405.037644][T12101] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 405.091392][T12101] CPU: 1 PID: 12101 Comm: syz.9.3575 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 405.102814][T12101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 405.113101][T12101] Call Trace: [ 405.116390][T12101] [ 405.119325][T12101] __dump_stack+0x21/0x24 [ 405.123683][T12101] dump_stack_lvl+0xee/0x150 [ 405.128292][T12101] ? __cfi_dump_stack_lvl+0x8/0x8 [ 405.133337][T12101] dump_stack+0x15/0x24 [ 405.137512][T12101] should_fail_ex+0x3d4/0x520 [ 405.142209][T12101] should_fail+0xb/0x10 [ 405.146384][T12101] should_fail_usercopy+0x1a/0x20 [ 405.151426][T12101] _copy_from_user+0x1e/0xc0 [ 405.156036][T12101] ___sys_recvmsg+0x12b/0x510 [ 405.160823][T12101] ? __sys_recvmsg+0x270/0x270 [ 405.165615][T12101] ? security_file_permission+0x94/0xb0 [ 405.171161][T12101] ? __fget_files+0x2d5/0x330 [ 405.175843][T12101] ? __fdget+0x19c/0x220 [ 405.180089][T12101] __x64_sys_recvmsg+0x1ed/0x2c0 [ 405.185031][T12101] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 405.190505][T12101] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 405.196585][T12101] x64_sys_call+0x75/0x9a0 [ 405.200999][T12101] do_syscall_64+0x4c/0xa0 [ 405.205412][T12101] ? clear_bhb_loop+0x15/0x70 [ 405.210105][T12101] ? clear_bhb_loop+0x15/0x70 [ 405.214779][T12101] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 405.220679][T12101] RIP: 0033:0x7f328378e969 [ 405.225113][T12101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.244722][T12101] RSP: 002b:00007f328460e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 405.253141][T12101] RAX: ffffffffffffffda RBX: 00007f32839b5fa0 RCX: 00007f328378e969 [ 405.261111][T12101] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000006 [ 405.269085][T12101] RBP: 00007f328460e090 R08: 0000000000000000 R09: 0000000000000000 [ 405.277051][T12101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 405.285018][T12101] R13: 0000000000000000 R14: 00007f32839b5fa0 R15: 00007ffcb405a258 [ 405.293034][T12101] [ 405.425976][T12105] bond_slave_1: mtu less than device minimum [ 405.464544][T12112] device veth0_vlan left promiscuous mode [ 405.579857][T12112] device veth0_vlan entered promiscuous mode [ 405.762803][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.795999][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 405.823543][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 405.861310][T12109] device pim6reg1 entered promiscuous mode [ 406.076604][T12133] : renamed from bond_slave_0 [ 406.195101][T12141] FAULT_INJECTION: forcing a failure. [ 406.195101][T12141] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 406.318861][T12141] CPU: 0 PID: 12141 Comm: syz.9.3589 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 406.330303][T12141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 406.340404][T12141] Call Trace: [ 406.343706][T12141] [ 406.346698][T12141] __dump_stack+0x21/0x24 [ 406.351057][T12141] dump_stack_lvl+0xee/0x150 [ 406.355666][T12141] ? __cfi_dump_stack_lvl+0x8/0x8 [ 406.360718][T12141] dump_stack+0x15/0x24 [ 406.364900][T12141] should_fail_ex+0x3d4/0x520 [ 406.369604][T12141] should_fail_alloc_page+0x61/0x90 [ 406.374832][T12141] prepare_alloc_pages+0x148/0x5f0 [ 406.379967][T12141] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 406.385168][T12141] ? __kernel_text_address+0xd/0x30 [ 406.390367][T12141] ? unwind_get_return_address+0x4d/0x90 [ 406.395999][T12141] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 406.402155][T12141] __alloc_pages+0x115/0x3a0 [ 406.406746][T12141] ? __cfi___alloc_pages+0x10/0x10 [ 406.411856][T12141] ? __stack_depot_save+0x36/0x480 [ 406.416971][T12141] __kmalloc_large_node+0xa1/0x1c0 [ 406.422089][T12141] ? iovec_from_user+0x86/0x2e0 [ 406.426933][T12141] __kmalloc+0xe0/0x1e0 [ 406.431091][T12141] iovec_from_user+0x86/0x2e0 [ 406.435776][T12141] __import_iovec+0x71/0x470 [ 406.440390][T12141] ? kstrtouint_from_user+0xf7/0x150 [ 406.445675][T12141] import_iovec+0x7c/0xb0 [ 406.450001][T12141] ___sys_recvmsg+0x433/0x510 [ 406.454684][T12141] ? __sys_recvmsg+0x270/0x270 [ 406.459459][T12141] ? security_file_permission+0x94/0xb0 [ 406.465003][T12141] ? __fget_files+0x2d5/0x330 [ 406.469683][T12141] ? __fdget+0x19c/0x220 [ 406.474011][T12141] __x64_sys_recvmsg+0x1ed/0x2c0 [ 406.478951][T12141] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 406.484424][T12141] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 406.490488][T12141] x64_sys_call+0x75/0x9a0 [ 406.494902][T12141] do_syscall_64+0x4c/0xa0 [ 406.499319][T12141] ? clear_bhb_loop+0x15/0x70 [ 406.503990][T12141] ? clear_bhb_loop+0x15/0x70 [ 406.508660][T12141] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 406.514554][T12141] RIP: 0033:0x7f328378e969 [ 406.518961][T12141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 406.538562][T12141] RSP: 002b:00007f328460e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 406.546976][T12141] RAX: ffffffffffffffda RBX: 00007f32839b5fa0 RCX: 00007f328378e969 [ 406.554940][T12141] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000006 [ 406.562902][T12141] RBP: 00007f328460e090 R08: 0000000000000000 R09: 0000000000000000 [ 406.570873][T12141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 406.578850][T12141] R13: 0000000000000000 R14: 00007f32839b5fa0 R15: 00007ffcb405a258 [ 406.586829][T12141] [ 406.989645][T12137] device syzkaller0 entered promiscuous mode [ 407.051980][T12155] bond_slave_1: mtu less than device minimum [ 407.167039][T12152] device veth1_macvtap left promiscuous mode [ 407.632635][T12171] device pim6reg1 entered promiscuous mode [ 408.835455][T12181] device syzkaller0 entered promiscuous mode [ 409.609292][T12211] device syzkaller0 entered promiscuous mode [ 412.937369][T12294] device sit0 left promiscuous mode [ 412.949621][T12295] device sit0 entered promiscuous mode [ 413.104245][T12301] bond_slave_1: mtu less than device minimum [ 413.682640][T12312] device veth0_vlan left promiscuous mode [ 413.705843][T12312] device veth0_vlan entered promiscuous mode [ 416.079563][T12342] device sit0 left promiscuous mode [ 416.559097][T12354] bond_slave_1: mtu less than device minimum [ 417.352413][T12368] device syzkaller0 entered promiscuous mode [ 417.380821][T12371] device veth0_vlan left promiscuous mode [ 417.392014][T12371] device veth0_vlan entered promiscuous mode [ 417.433917][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.442504][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.450406][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 418.700271][T12456] device pim6reg1 entered promiscuous mode [ 419.085139][T12469] device syzkaller0 entered promiscuous mode [ 419.401228][T12475] device syzkaller0 entered promiscuous mode [ 419.735249][T12491] device wg2 entered promiscuous mode [ 419.751872][T12495] device sit0 left promiscuous mode [ 420.859183][T12521] bond_slave_1: mtu less than device minimum [ 421.130239][T12525] device syzkaller0 entered promiscuous mode [ 421.208826][T12539] device pim6reg1 entered promiscuous mode [ 421.762099][T12564] bridge0: port 1(veth0) entered blocking state [ 421.929863][T12564] bridge0: port 1(veth0) entered disabled state [ 422.014323][T12564] device veth0 entered promiscuous mode [ 422.690795][T12578] device pim6reg1 entered promiscuous mode [ 422.728496][T12580] device sit0 entered promiscuous mode [ 425.824137][T12641] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 425.909243][T12645] device veth1_macvtap entered promiscuous mode [ 425.936658][T12645] device macsec0 entered promiscuous mode [ 425.963978][T12647] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 426.010711][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 427.238457][T12701] tap0: tun_chr_ioctl cmd 1074025677 [ 427.249048][T12701] tap0: linktype set to 804 [ 429.823652][T12779] device syzkaller0 entered promiscuous mode [ 429.977990][T12793] device bridge0 entered promiscuous mode [ 430.542945][T12805] device sit0 left promiscuous mode [ 432.581381][T12885] syz.2.3820[12885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.503779][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 435.579538][T12937] device syzkaller0 entered promiscuous mode [ 436.663445][T12963] bond_slave_1: mtu less than device minimum [ 438.195278][T13006] device syzkaller0 entered promiscuous mode [ 438.686367][T13041] device sit0 left promiscuous mode [ 438.741234][T13041] device sit0 entered promiscuous mode [ 439.392964][T13057] device wg2 left promiscuous mode [ 440.162201][T13083] device syzkaller0 entered promiscuous mode [ 442.616850][T13138] device syzkaller0 entered promiscuous mode [ 442.955853][T13165] device veth0_vlan left promiscuous mode [ 443.018600][T13165] device veth0_vlan entered promiscuous mode [ 443.025808][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.050427][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 443.078425][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 443.115746][T13167] bond_slave_1: mtu less than device minimum [ 443.961990][T13176] device syzkaller0 entered promiscuous mode [ 444.790087][T13225] bond_slave_1: mtu less than device minimum [ 445.030637][T13238] device veth0_vlan left promiscuous mode [ 445.121533][T13238] device veth0_vlan entered promiscuous mode [ 445.542352][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 445.596972][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 445.605691][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 447.111048][T13290] bond_slave_1: mtu less than device minimum [ 449.741098][T13358] bond_slave_1: mtu less than device minimum [ 450.948786][T13390] device macsec0 left promiscuous mode [ 451.063498][T13390] device veth1_macvtap entered promiscuous mode [ 451.118518][T13390] device macsec0 entered promiscuous mode [ 451.218976][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 452.917400][T13422] bond_slave_1: mtu less than device minimum [ 452.952474][T13425] device veth0_vlan left promiscuous mode [ 452.961626][T13425] device veth0_vlan entered promiscuous mode [ 453.033583][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 453.048646][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 453.066100][ T28] audit: type=1400 audit(1747300853.787:167): avc: denied { create } for pid=13427 comm="syz.0.3980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 453.125177][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 454.317005][T13467] device syzkaller0 entered promiscuous mode [ 454.418631][T13492] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.425885][T13492] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.666475][T13528] bond_slave_1: mtu less than device minimum [ 455.675062][T13530] device sit0 left promiscuous mode [ 455.749657][T13534] device sit0 entered promiscuous mode [ 456.027612][T13549] -: renamed from syzkaller0 [ 457.139710][T13587] FAULT_INJECTION: forcing a failure. [ 457.139710][T13587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 457.196267][T13587] CPU: 0 PID: 13587 Comm: syz.2.4029 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 457.207695][T13587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 457.217768][T13587] Call Trace: [ 457.221063][T13587] [ 457.224001][T13587] __dump_stack+0x21/0x24 [ 457.228362][T13587] dump_stack_lvl+0xee/0x150 [ 457.232977][T13587] ? __cfi_dump_stack_lvl+0x8/0x8 [ 457.238023][T13587] ? migrate_enable+0x19c/0x280 [ 457.242876][T13587] dump_stack+0x15/0x24 [ 457.247034][T13587] should_fail_ex+0x3d4/0x520 [ 457.251715][T13587] should_fail+0xb/0x10 [ 457.255871][T13587] should_fail_usercopy+0x1a/0x20 [ 457.260903][T13587] _copy_from_user+0x1e/0xc0 [ 457.265513][T13587] generic_map_update_batch+0x458/0x780 [ 457.271076][T13587] ? __cfi_generic_map_update_batch+0x10/0x10 [ 457.277149][T13587] ? __fdget+0x19c/0x220 [ 457.281399][T13587] ? __cfi_generic_map_update_batch+0x10/0x10 [ 457.287477][T13587] bpf_map_do_batch+0x48c/0x620 [ 457.292334][T13587] __sys_bpf+0x624/0x780 [ 457.296582][T13587] ? bpf_link_show_fdinfo+0x320/0x320 [ 457.301963][T13587] ? __cfi_ksys_write+0x10/0x10 [ 457.306818][T13587] ? debug_smp_processor_id+0x17/0x20 [ 457.312191][T13587] __x64_sys_bpf+0x7c/0x90 [ 457.316625][T13587] x64_sys_call+0x488/0x9a0 [ 457.321212][T13587] do_syscall_64+0x4c/0xa0 [ 457.325629][T13587] ? clear_bhb_loop+0x15/0x70 [ 457.330310][T13587] ? clear_bhb_loop+0x15/0x70 [ 457.334979][T13587] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 457.340878][T13587] RIP: 0033:0x7f8da1d8e969 [ 457.345287][T13587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 457.364890][T13587] RSP: 002b:00007f8da2b23038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 457.373302][T13587] RAX: ffffffffffffffda RBX: 00007f8da1fb5fa0 RCX: 00007f8da1d8e969 [ 457.381273][T13587] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 457.389238][T13587] RBP: 00007f8da2b23090 R08: 0000000000000000 R09: 0000000000000000 [ 457.397207][T13587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 457.405183][T13587] R13: 0000000000000000 R14: 00007f8da1fb5fa0 R15: 00007ffc29988ed8 [ 457.413158][T13587] [ 457.666516][T13589] device veth0_vlan left promiscuous mode [ 457.672606][T13589] device veth0_vlan entered promiscuous mode [ 457.692926][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 457.708234][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 457.722344][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 458.856637][ T28] audit: type=1400 audit(1747300859.587:168): avc: denied { create } for pid=13625 comm="syz.2.4042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 458.972823][T13630] FAULT_INJECTION: forcing a failure. [ 458.972823][T13630] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 459.089794][T13630] CPU: 0 PID: 13630 Comm: syz.8.4043 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 459.101223][T13630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 459.111295][T13630] Call Trace: [ 459.114588][T13630] [ 459.117539][T13630] __dump_stack+0x21/0x24 [ 459.121901][T13630] dump_stack_lvl+0xee/0x150 [ 459.126537][T13630] ? __cfi_dump_stack_lvl+0x8/0x8 [ 459.131594][T13630] ? migrate_enable+0x19c/0x280 [ 459.136505][T13630] dump_stack+0x15/0x24 [ 459.140685][T13630] should_fail_ex+0x3d4/0x520 [ 459.145382][T13630] should_fail+0xb/0x10 [ 459.149558][T13630] should_fail_usercopy+0x1a/0x20 [ 459.154599][T13630] _copy_from_user+0x1e/0xc0 [ 459.159214][T13630] generic_map_update_batch+0x4b1/0x780 [ 459.164807][T13630] ? __cfi_generic_map_update_batch+0x10/0x10 [ 459.170891][T13630] ? __fdget+0x19c/0x220 [ 459.175167][T13630] ? __cfi_generic_map_update_batch+0x10/0x10 [ 459.181258][T13630] bpf_map_do_batch+0x48c/0x620 [ 459.186130][T13630] __sys_bpf+0x624/0x780 [ 459.190523][T13630] ? bpf_link_show_fdinfo+0x320/0x320 [ 459.195951][T13630] ? __cfi_ksys_write+0x10/0x10 [ 459.200852][T13630] ? debug_smp_processor_id+0x17/0x20 [ 459.206247][T13630] __x64_sys_bpf+0x7c/0x90 [ 459.210683][T13630] x64_sys_call+0x488/0x9a0 [ 459.215202][T13630] do_syscall_64+0x4c/0xa0 [ 459.219635][T13630] ? clear_bhb_loop+0x15/0x70 [ 459.224321][T13630] ? clear_bhb_loop+0x15/0x70 [ 459.229009][T13630] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 459.234929][T13630] RIP: 0033:0x7f032118e969 [ 459.239356][T13630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 459.258972][T13630] RSP: 002b:00007f03220dc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 459.267415][T13630] RAX: ffffffffffffffda RBX: 00007f03213b5fa0 RCX: 00007f032118e969 [ 459.275405][T13630] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 459.283397][T13630] RBP: 00007f03220dc090 R08: 0000000000000000 R09: 0000000000000000 [ 459.291388][T13630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 459.299375][T13630] R13: 0000000000000000 R14: 00007f03213b5fa0 R15: 00007ffca798f6e8 [ 459.307369][T13630] [ 460.033038][T13662] device syzkaller0 entered promiscuous mode [ 460.139350][T13681] FAULT_INJECTION: forcing a failure. [ 460.139350][T13681] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 460.164001][T13681] CPU: 0 PID: 13681 Comm: syz.8.4058 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 460.175422][T13681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 460.185492][T13681] Call Trace: [ 460.188783][T13681] [ 460.191723][T13681] __dump_stack+0x21/0x24 [ 460.196076][T13681] dump_stack_lvl+0xee/0x150 [ 460.200695][T13681] ? __cfi_dump_stack_lvl+0x8/0x8 [ 460.205741][T13681] ? migrate_enable+0x19c/0x280 [ 460.210592][T13681] dump_stack+0x15/0x24 [ 460.214773][T13681] should_fail_ex+0x3d4/0x520 [ 460.219444][T13681] should_fail+0xb/0x10 [ 460.223605][T13681] should_fail_usercopy+0x1a/0x20 [ 460.228623][T13681] _copy_from_user+0x1e/0xc0 [ 460.233204][T13681] generic_map_update_batch+0x458/0x780 [ 460.238743][T13681] ? __cfi_generic_map_update_batch+0x10/0x10 [ 460.244815][T13681] ? __fdget+0x19c/0x220 [ 460.249076][T13681] ? __cfi_generic_map_update_batch+0x10/0x10 [ 460.255245][T13681] bpf_map_do_batch+0x48c/0x620 [ 460.260122][T13681] __sys_bpf+0x624/0x780 [ 460.264370][T13681] ? bpf_link_show_fdinfo+0x320/0x320 [ 460.269747][T13681] ? __cfi_ksys_write+0x10/0x10 [ 460.274607][T13681] ? debug_smp_processor_id+0x17/0x20 [ 460.279973][T13681] __x64_sys_bpf+0x7c/0x90 [ 460.284392][T13681] x64_sys_call+0x488/0x9a0 [ 460.288887][T13681] do_syscall_64+0x4c/0xa0 [ 460.293295][T13681] ? clear_bhb_loop+0x15/0x70 [ 460.297964][T13681] ? clear_bhb_loop+0x15/0x70 [ 460.302632][T13681] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 460.308535][T13681] RIP: 0033:0x7f032118e969 [ 460.312940][T13681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 460.332564][T13681] RSP: 002b:00007f03220dc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 460.341035][T13681] RAX: ffffffffffffffda RBX: 00007f03213b5fa0 RCX: 00007f032118e969 [ 460.349008][T13681] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 460.356984][T13681] RBP: 00007f03220dc090 R08: 0000000000000000 R09: 0000000000000000 [ 460.364952][T13681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.372920][T13681] R13: 0000000000000000 R14: 00007f03213b5fa0 R15: 00007ffca798f6e8 [ 460.380891][T13681] [ 460.491261][T13693] device sit0 entered promiscuous mode [ 460.645523][T13718] device syzkaller0 entered promiscuous mode [ 460.824226][T13727] FAULT_INJECTION: forcing a failure. [ 460.824226][T13727] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 460.875515][T13727] CPU: 1 PID: 13727 Comm: syz.2.4072 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 460.887036][T13727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 460.897113][T13727] Call Trace: [ 460.900412][T13727] [ 460.903358][T13727] __dump_stack+0x21/0x24 [ 460.907718][T13727] dump_stack_lvl+0xee/0x150 [ 460.912339][T13727] ? __cfi_dump_stack_lvl+0x8/0x8 [ 460.917393][T13727] ? migrate_enable+0x19c/0x280 [ 460.922267][T13727] dump_stack+0x15/0x24 [ 460.926446][T13727] should_fail_ex+0x3d4/0x520 [ 460.931142][T13727] should_fail+0xb/0x10 [ 460.935298][T13727] should_fail_usercopy+0x1a/0x20 [ 460.940324][T13727] _copy_from_user+0x1e/0xc0 [ 460.944913][T13727] generic_map_update_batch+0x4b1/0x780 [ 460.950470][T13727] ? __cfi_generic_map_update_batch+0x10/0x10 [ 460.956542][T13727] ? __fdget+0x19c/0x220 [ 460.960794][T13727] ? __cfi_generic_map_update_batch+0x10/0x10 [ 460.966860][T13727] bpf_map_do_batch+0x48c/0x620 [ 460.971746][T13727] __sys_bpf+0x624/0x780 [ 460.975990][T13727] ? bpf_link_show_fdinfo+0x320/0x320 [ 460.981366][T13727] ? __cfi_ksys_write+0x10/0x10 [ 460.986247][T13727] ? debug_smp_processor_id+0x17/0x20 [ 460.991705][T13727] __x64_sys_bpf+0x7c/0x90 [ 460.996121][T13727] x64_sys_call+0x488/0x9a0 [ 461.000627][T13727] do_syscall_64+0x4c/0xa0 [ 461.005043][T13727] ? clear_bhb_loop+0x15/0x70 [ 461.009714][T13727] ? clear_bhb_loop+0x15/0x70 [ 461.014383][T13727] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 461.020278][T13727] RIP: 0033:0x7f8da1d8e969 [ 461.024685][T13727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 461.044285][T13727] RSP: 002b:00007f8da2b23038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 461.052723][T13727] RAX: ffffffffffffffda RBX: 00007f8da1fb5fa0 RCX: 00007f8da1d8e969 [ 461.060778][T13727] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 461.068743][T13727] RBP: 00007f8da2b23090 R08: 0000000000000000 R09: 0000000000000000 [ 461.076708][T13727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 461.084674][T13727] R13: 0000000000000000 R14: 00007f8da1fb5fa0 R15: 00007ffc29988ed8 [ 461.092649][T13727] [ 461.808494][T13756] bond_slave_1: mtu less than device minimum [ 461.833303][T13771] FAULT_INJECTION: forcing a failure. [ 461.833303][T13771] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 461.936082][T13771] CPU: 1 PID: 13771 Comm: syz.2.4087 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 461.947500][T13771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 461.957576][T13771] Call Trace: [ 461.960874][T13771] [ 461.963817][T13771] __dump_stack+0x21/0x24 [ 461.968185][T13771] dump_stack_lvl+0xee/0x150 [ 461.972794][T13771] ? __cfi_dump_stack_lvl+0x8/0x8 [ 461.977847][T13771] ? migrate_enable+0x19c/0x280 [ 461.982727][T13771] dump_stack+0x15/0x24 [ 461.986901][T13771] should_fail_ex+0x3d4/0x520 [ 461.991600][T13771] should_fail+0xb/0x10 [ 461.995776][T13771] should_fail_usercopy+0x1a/0x20 [ 462.000815][T13771] _copy_from_user+0x1e/0xc0 [ 462.005425][T13771] generic_map_update_batch+0x458/0x780 [ 462.011001][T13771] ? __cfi_generic_map_update_batch+0x10/0x10 [ 462.017091][T13771] ? __fdget+0x19c/0x220 [ 462.021363][T13771] ? __cfi_generic_map_update_batch+0x10/0x10 [ 462.027451][T13771] bpf_map_do_batch+0x48c/0x620 [ 462.032319][T13771] __sys_bpf+0x624/0x780 [ 462.036590][T13771] ? bpf_link_show_fdinfo+0x320/0x320 [ 462.041991][T13771] ? __cfi_ksys_write+0x10/0x10 [ 462.046874][T13771] ? debug_smp_processor_id+0x17/0x20 [ 462.052268][T13771] __x64_sys_bpf+0x7c/0x90 [ 462.056726][T13771] x64_sys_call+0x488/0x9a0 [ 462.061250][T13771] do_syscall_64+0x4c/0xa0 [ 462.065688][T13771] ? clear_bhb_loop+0x15/0x70 [ 462.070378][T13771] ? clear_bhb_loop+0x15/0x70 [ 462.075072][T13771] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 462.080990][T13771] RIP: 0033:0x7f8da1d8e969 [ 462.085419][T13771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 462.105043][T13771] RSP: 002b:00007f8da2b23038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 462.113480][T13771] RAX: ffffffffffffffda RBX: 00007f8da1fb5fa0 RCX: 00007f8da1d8e969 [ 462.121480][T13771] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 462.129479][T13771] RBP: 00007f8da2b23090 R08: 0000000000000000 R09: 0000000000000000 [ 462.137471][T13771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 462.145459][T13771] R13: 0000000000000000 R14: 00007f8da1fb5fa0 R15: 00007ffc29988ed8 [ 462.153546][T13771] [ 462.669148][ T28] audit: type=1400 audit(1747300863.397:169): avc: denied { create } for pid=13803 comm="syz.7.4100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 462.787510][T13808] device sit0 left promiscuous mode [ 462.793716][T13819] FAULT_INJECTION: forcing a failure. [ 462.793716][T13819] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 462.809877][ T28] audit: type=1400 audit(1747300863.537:170): avc: denied { create } for pid=13817 comm="syz.0.4105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 462.868042][T13819] CPU: 1 PID: 13819 Comm: syz.2.4104 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 462.879462][T13819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 462.889546][T13819] Call Trace: [ 462.892840][T13819] [ 462.895872][T13819] __dump_stack+0x21/0x24 [ 462.900237][T13819] dump_stack_lvl+0xee/0x150 [ 462.904851][T13819] ? __cfi_dump_stack_lvl+0x8/0x8 [ 462.909903][T13819] ? migrate_enable+0x19c/0x280 [ 462.914775][T13819] dump_stack+0x15/0x24 [ 462.918956][T13819] should_fail_ex+0x3d4/0x520 [ 462.923657][T13819] should_fail+0xb/0x10 [ 462.927835][T13819] should_fail_usercopy+0x1a/0x20 [ 462.932880][T13819] _copy_from_user+0x1e/0xc0 [ 462.937510][T13819] generic_map_update_batch+0x4b1/0x780 [ 462.943091][T13819] ? __cfi_generic_map_update_batch+0x10/0x10 [ 462.949189][T13819] ? __fdget+0x19c/0x220 [ 462.953466][T13819] ? __cfi_generic_map_update_batch+0x10/0x10 [ 462.959590][T13819] bpf_map_do_batch+0x48c/0x620 [ 462.964466][T13819] __sys_bpf+0x624/0x780 [ 462.968744][T13819] ? bpf_link_show_fdinfo+0x320/0x320 [ 462.974156][T13819] ? __cfi_ksys_write+0x10/0x10 [ 462.979040][T13819] ? debug_smp_processor_id+0x17/0x20 [ 462.984436][T13819] __x64_sys_bpf+0x7c/0x90 [ 462.988882][T13819] x64_sys_call+0x488/0x9a0 [ 462.993411][T13819] do_syscall_64+0x4c/0xa0 [ 462.997853][T13819] ? clear_bhb_loop+0x15/0x70 [ 463.002544][T13819] ? clear_bhb_loop+0x15/0x70 [ 463.007239][T13819] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 463.013162][T13819] RIP: 0033:0x7f8da1d8e969 [ 463.017598][T13819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 463.037219][T13819] RSP: 002b:00007f8da2b23038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 463.045657][T13819] RAX: ffffffffffffffda RBX: 00007f8da1fb5fa0 RCX: 00007f8da1d8e969 [ 463.053653][T13819] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 463.061731][T13819] RBP: 00007f8da2b23090 R08: 0000000000000000 R09: 0000000000000000 [ 463.069723][T13819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 463.077711][T13819] R13: 0000000000000000 R14: 00007f8da1fb5fa0 R15: 00007ffc29988ed8 [ 463.085715][T13819] [ 463.222472][T13827] device pim6reg1 entered promiscuous mode [ 464.437002][T13874] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.444256][T13874] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.475047][T13922] device veth0_vlan left promiscuous mode [ 466.491594][T13922] device veth0_vlan entered promiscuous mode [ 466.594331][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 466.614172][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 466.646771][ T346] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 468.180162][T13961] device veth0_vlan left promiscuous mode [ 468.215375][T13961] device veth0_vlan entered promiscuous mode [ 468.841847][T13971] bond_slave_1: mtu less than device minimum [ 469.987142][T14031] FAULT_INJECTION: forcing a failure. [ 469.987142][T14031] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 470.037050][T14031] CPU: 1 PID: 14031 Comm: syz.0.4165 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 470.048477][T14031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 470.058550][T14031] Call Trace: [ 470.061845][T14031] [ 470.064785][T14031] __dump_stack+0x21/0x24 [ 470.069141][T14031] dump_stack_lvl+0xee/0x150 [ 470.073758][T14031] ? __cfi_dump_stack_lvl+0x8/0x8 [ 470.078817][T14031] ? migrate_enable+0x19c/0x280 [ 470.083691][T14031] dump_stack+0x15/0x24 [ 470.087871][T14031] should_fail_ex+0x3d4/0x520 [ 470.092568][T14031] should_fail+0xb/0x10 [ 470.096739][T14031] should_fail_usercopy+0x1a/0x20 [ 470.101783][T14031] _copy_from_user+0x1e/0xc0 [ 470.106387][T14031] generic_map_update_batch+0x4b1/0x780 [ 470.111959][T14031] ? __cfi_generic_map_update_batch+0x10/0x10 [ 470.118057][T14031] ? __fdget+0x19c/0x220 [ 470.122330][T14031] ? __cfi_generic_map_update_batch+0x10/0x10 [ 470.128425][T14031] bpf_map_do_batch+0x48c/0x620 [ 470.133302][T14031] __sys_bpf+0x624/0x780 [ 470.137576][T14031] ? bpf_link_show_fdinfo+0x320/0x320 [ 470.142981][T14031] ? __cfi_ksys_write+0x10/0x10 [ 470.147857][T14031] ? debug_smp_processor_id+0x17/0x20 [ 470.153247][T14031] __x64_sys_bpf+0x7c/0x90 [ 470.157671][T14031] x64_sys_call+0x488/0x9a0 [ 470.162194][T14031] do_syscall_64+0x4c/0xa0 [ 470.166705][T14031] ? clear_bhb_loop+0x15/0x70 [ 470.171382][T14031] ? clear_bhb_loop+0x15/0x70 [ 470.176057][T14031] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 470.181977][T14031] RIP: 0033:0x7f981878e969 [ 470.186390][T14031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 470.205995][T14031] RSP: 002b:00007f98195c9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 470.214434][T14031] RAX: ffffffffffffffda RBX: 00007f98189b5fa0 RCX: 00007f981878e969 [ 470.222402][T14031] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 470.230368][T14031] RBP: 00007f98195c9090 R08: 0000000000000000 R09: 0000000000000000 [ 470.238334][T14031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 470.246300][T14031] R13: 0000000000000000 R14: 00007f98189b5fa0 R15: 00007ffdc861c058 [ 470.254270][T14031] [ 471.715125][T14090] device syzkaller0 entered promiscuous mode [ 472.021149][T14108] device veth0_vlan left promiscuous mode [ 472.054095][T14108] device veth0_vlan entered promiscuous mode [ 472.172942][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 472.197117][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 472.246502][ T9283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 472.446461][T14129] bond_slave_1: mtu less than device minimum [ 472.679962][T14136] device sit0 entered promiscuous mode [ 473.223015][T14148] FAULT_INJECTION: forcing a failure. [ 473.223015][T14148] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 473.305826][T14148] CPU: 1 PID: 14148 Comm: syz.0.4197 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 473.317283][T14148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 473.327353][T14148] Call Trace: [ 473.330667][T14148] [ 473.333607][T14148] __dump_stack+0x21/0x24 [ 473.337958][T14148] dump_stack_lvl+0xee/0x150 [ 473.342567][T14148] ? __cfi_dump_stack_lvl+0x8/0x8 [ 473.347612][T14148] ? migrate_enable+0x19c/0x280 [ 473.352484][T14148] dump_stack+0x15/0x24 [ 473.356659][T14148] should_fail_ex+0x3d4/0x520 [ 473.361359][T14148] should_fail+0xb/0x10 [ 473.365529][T14148] should_fail_usercopy+0x1a/0x20 [ 473.370569][T14148] _copy_from_user+0x1e/0xc0 [ 473.375172][T14148] generic_map_update_batch+0x4b1/0x780 [ 473.380737][T14148] ? __cfi_generic_map_update_batch+0x10/0x10 [ 473.386825][T14148] ? __fdget+0x19c/0x220 [ 473.391086][T14148] ? __cfi_generic_map_update_batch+0x10/0x10 [ 473.397170][T14148] bpf_map_do_batch+0x48c/0x620 [ 473.402031][T14148] __sys_bpf+0x624/0x780 [ 473.406299][T14148] ? bpf_link_show_fdinfo+0x320/0x320 [ 473.411699][T14148] ? __cfi_ksys_write+0x10/0x10 [ 473.416568][T14148] ? debug_smp_processor_id+0x17/0x20 [ 473.421956][T14148] __x64_sys_bpf+0x7c/0x90 [ 473.426393][T14148] x64_sys_call+0x488/0x9a0 [ 473.430912][T14148] do_syscall_64+0x4c/0xa0 [ 473.435346][T14148] ? clear_bhb_loop+0x15/0x70 [ 473.440030][T14148] ? clear_bhb_loop+0x15/0x70 [ 473.444732][T14148] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 473.450650][T14148] RIP: 0033:0x7f981878e969 [ 473.455079][T14148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 473.474790][T14148] RSP: 002b:00007f98195c9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 473.483228][T14148] RAX: ffffffffffffffda RBX: 00007f98189b5fa0 RCX: 00007f981878e969 [ 473.491214][T14148] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 473.499201][T14148] RBP: 00007f98195c9090 R08: 0000000000000000 R09: 0000000000000000 [ 473.507208][T14148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 473.515193][T14148] R13: 0000000000000000 R14: 00007f98189b5fa0 R15: 00007ffdc861c058 [ 473.523183][T14148] [ 473.682280][T14162] device sit0 left promiscuous mode [ 474.250908][T14187] bond_slave_1: mtu less than device minimum [ 474.419362][T14197] bridge0: port 3(dummy0) entered blocking state [ 474.455890][T14197] bridge0: port 3(dummy0) entered disabled state [ 474.476021][T14197] device dummy0 entered promiscuous mode [ 474.548816][T14197] bridge0: port 3(dummy0) entered blocking state [ 474.555254][T14197] bridge0: port 3(dummy0) entered forwarding state [ 474.770225][T14214] device pim6reg1 entered promiscuous mode [ 475.584799][T14234] device syzkaller0 entered promiscuous mode [ 478.517356][T14320] bond_slave_1: mtu less than device minimum [ 482.438700][T14413] device veth1_macvtap entered promiscuous mode [ 482.455669][T14413] device macsec0 entered promiscuous mode [ 482.502082][T14049] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 483.610639][T14434] device syzkaller0 entered promiscuous mode [ 485.522918][T14521] device pim6reg1 entered promiscuous mode [ 485.577865][T14534] device wg2 entered promiscuous mode [ 485.708882][T14537] device syzkaller0 entered promiscuous mode [ 485.765980][T14554] bond_slave_1: mtu less than device minimum [ 486.359909][T14552] device syzkaller0 entered promiscuous mode [ 486.515017][T14585] tap0: tun_chr_ioctl cmd 1074025673 [ 486.851582][T14594] device pim6reg1 entered promiscuous mode [ 487.667662][T14649] device veth1_macvtap left promiscuous mode [ 487.710546][T14649] device macsec0 left promiscuous mode [ 488.462584][T14662] device veth0_vlan left promiscuous mode [ 488.498705][T14662] device veth0_vlan entered promiscuous mode [ 488.568847][T14047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 488.579762][T14047] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 488.609713][T14047] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 490.168416][T14710] device syzkaller0 entered promiscuous mode [ 490.550794][T14722] device pim6reg1 entered promiscuous mode [ 491.445846][T14780] device sit0 entered promiscuous mode [ 492.995208][T14880] bridge0: port 3(dummy0) entered disabled state [ 493.002145][T14880] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.010180][T14880] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.059036][T14880] device bridge0 left promiscuous mode [ 493.083362][T14879] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 493.089753][T14879] syzkaller0: linktype set to 774 [ 493.129722][T14883] device dummy0 left promiscuous mode [ 493.145430][T14883] bridge0: port 3(dummy0) entered disabled state [ 493.152869][T14883] device bridge_slave_1 left promiscuous mode [ 493.165687][T14883] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.180144][T14883] device bridge_slave_0 left promiscuous mode [ 493.196580][T14883] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.968303][T14914] syzkaller0: tun_chr_ioctl cmd 35108 [ 494.393068][T14917] device syzkaller0 entered promiscuous mode [ 494.849996][T14931] device syzkaller0 entered promiscuous mode [ 495.387815][T14943] bond_slave_1: mtu less than device minimum [ 496.348076][T15036] device bridge_slave_1 left promiscuous mode [ 496.355263][T15036] bridge0: port 2(bridge_slave_1) entered disabled state [ 496.412057][T15036] device bridge_slave_0 left promiscuous mode [ 496.445367][T15036] bridge0: port 1(bridge_slave_0) entered disabled state [ 496.979079][T15063] device veth0 left promiscuous mode [ 497.018423][T15063] bridge0: port 1(veth0) entered disabled state [ 497.118344][T15061] device pim6reg1 entered promiscuous mode [ 497.286579][T15074] device pim6reg1 entered promiscuous mode [ 497.363631][T15077] bond_slave_1: mtu less than device minimum [ 497.773063][T15088] device syzkaller0 entered promiscuous mode [ 497.795769][T15094] device sit0 entered promiscuous mode [ 498.082946][T15090] device sit0 left promiscuous mode [ 498.160131][T15099] device sit0 entered promiscuous mode [ 499.371659][T15135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 499.708782][T15138] bond_slave_1: mtu less than device minimum [ 500.705057][T15177] device syzkaller0 entered promiscuous mode [ 501.406357][T15197] bond_slave_1: mtu less than device minimum [ 503.609620][T15263] bond_slave_1: mtu less than device minimum [ 513.035784][T15470] device pim6reg1 entered promiscuous mode [ 513.048792][T15450] device veth1_macvtap left promiscuous mode [ 513.055027][T15450] device macsec0 left promiscuous mode [ 513.238809][T15470] device sit0 left promiscuous mode [ 513.728200][T15485] device veth0_vlan left promiscuous mode [ 513.799773][T15485] device veth0_vlan entered promiscuous mode [ 514.126939][T15491] bond_slave_1: mtu less than device minimum [ 517.905871][T15610] device syzkaller0 entered promiscuous mode [ 518.431880][T15639] device veth1_macvtap left promiscuous mode [ 518.739303][T15639] device veth1_macvtap entered promiscuous mode [ 518.747394][T15639] device macsec0 entered promiscuous mode [ 522.257703][T15739] device syzkaller0 entered promiscuous mode [ 522.650494][T15749] : port 1(veth0) entered blocking state [ 522.675860][T15749] : port 1(veth0) entered disabled state [ 522.711680][T15749] device veth0 entered promiscuous mode [ 523.462359][T15784] syz.7.4667[15784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 523.462480][T15784] syz.7.4667[15784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.573114][T15801] device veth0_vlan left promiscuous mode [ 524.599547][T15801] device veth0_vlan entered promiscuous mode [ 524.683989][T15689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 524.692962][T15689] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 524.700924][T15689] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 524.921312][T15810] device veth0_vlan left promiscuous mode [ 524.933292][T15810] device veth0_vlan entered promiscuous mode [ 525.033945][T14047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 525.042245][T14047] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 525.049907][T14047] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 527.718374][T15851] GPL: port 1(gretap0) entered blocking state [ 527.724753][T15851] GPL: port 1(gretap0) entered disabled state [ 527.810362][T15851] device gretap0 entered promiscuous mode [ 527.932609][T15856] bond_slave_1: mtu less than device minimum [ 528.614313][T15899] device pim6reg1 entered promiscuous mode [ 529.180735][T15918] pim6reg0: tun_chr_ioctl cmd 1074025681 [ 530.573445][T15985] device veth1_macvtap left promiscuous mode [ 530.606615][T15985] device macsec0 left promiscuous mode [ 531.497047][T16031] device sit0 entered promiscuous mode [ 531.545424][T16035] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.621855][T16035] device bridge_slave_0 left promiscuous mode [ 531.639359][T16035] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.202485][T16223] device veth0_vlan left promiscuous mode [ 537.345191][T16223] device veth0_vlan entered promiscuous mode [ 537.595569][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 537.607671][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 537.645812][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 537.669289][T16226] @0Ù: renamed from bond_slave_1 [ 541.324619][T16412] syz.7.4886[16412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.324728][T16412] syz.7.4886[16412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.405787][T16388] device veth0_vlan left promiscuous mode [ 541.505988][T16388] device veth0_vlan entered promiscuous mode [ 548.505995][T16604] device veth0_vlan left promiscuous mode [ 548.515185][T16604] device veth0_vlan entered promiscuous mode [ 548.524736][T14047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 548.542434][T14047] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 548.549836][T14047] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 548.910740][T16628] device syzkaller0 entered promiscuous mode [ 549.887442][T16703] FAULT_INJECTION: forcing a failure. [ 549.887442][T16703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 549.986293][T16703] CPU: 0 PID: 16703 Comm: syz.0.4984 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 549.997723][T16703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 550.007804][T16703] Call Trace: [ 550.011100][T16703] [ 550.014042][T16703] __dump_stack+0x21/0x24 [ 550.018401][T16703] dump_stack_lvl+0xee/0x150 [ 550.023018][T16703] ? __cfi_dump_stack_lvl+0x8/0x8 [ 550.028071][T16703] dump_stack+0x15/0x24 [ 550.032250][T16703] should_fail_ex+0x3d4/0x520 [ 550.036958][T16703] should_fail+0xb/0x10 [ 550.041135][T16703] should_fail_usercopy+0x1a/0x20 [ 550.046178][T16703] _copy_from_user+0x1e/0xc0 [ 550.050787][T16703] ___sys_recvmsg+0x12b/0x510 [ 550.055508][T16703] ? __sys_recvmsg+0x270/0x270 [ 550.060296][T16703] ? security_file_permission+0x94/0xb0 [ 550.065854][T16703] ? __fget_files+0x2d5/0x330 [ 550.070537][T16703] ? __fdget+0x19c/0x220 [ 550.074780][T16703] __x64_sys_recvmsg+0x1ed/0x2c0 [ 550.079723][T16703] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 550.085188][T16703] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 550.091254][T16703] x64_sys_call+0x75/0x9a0 [ 550.095675][T16703] do_syscall_64+0x4c/0xa0 [ 550.100090][T16703] ? clear_bhb_loop+0x15/0x70 [ 550.104766][T16703] ? clear_bhb_loop+0x15/0x70 [ 550.109456][T16703] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 550.115356][T16703] RIP: 0033:0x7f981878e969 [ 550.119765][T16703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 550.139451][T16703] RSP: 002b:00007f98195c9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 550.147869][T16703] RAX: ffffffffffffffda RBX: 00007f98189b5fa0 RCX: 00007f981878e969 [ 550.155838][T16703] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000000006 [ 550.163807][T16703] RBP: 00007f98195c9090 R08: 0000000000000000 R09: 0000000000000000 [ 550.171793][T16703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 550.179757][T16703] R13: 0000000000000000 R14: 00007f98189b5fa0 R15: 00007ffdc861c058 [ 550.187731][T16703] [ 555.508334][T16907] GPL: port 1(erspan0) entered blocking state [ 555.629834][T16907] GPL: port 1(erspan0) entered disabled state [ 555.659758][T16907] device erspan0 entered promiscuous mode [ 556.711118][T16947] FAULT_INJECTION: forcing a failure. [ 556.711118][T16947] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 556.782606][T16947] CPU: 1 PID: 16947 Comm: syz.0.5070 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 556.794042][T16947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 556.804120][T16947] Call Trace: [ 556.807412][T16947] [ 556.810352][T16947] __dump_stack+0x21/0x24 [ 556.814706][T16947] dump_stack_lvl+0xee/0x150 [ 556.819341][T16947] ? __cfi_dump_stack_lvl+0x8/0x8 [ 556.824390][T16947] dump_stack+0x15/0x24 [ 556.828566][T16947] should_fail_ex+0x3d4/0x520 [ 556.833263][T16947] should_fail+0xb/0x10 [ 556.837436][T16947] should_fail_usercopy+0x1a/0x20 [ 556.842477][T16947] _copy_to_user+0x1e/0x90 [ 556.846958][T16947] simple_read_from_buffer+0xe9/0x160 [ 556.852359][T16947] proc_fail_nth_read+0x19a/0x210 [ 556.857414][T16947] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 556.862988][T16947] ? security_file_permission+0x94/0xb0 [ 556.868555][T16947] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 556.874123][T16947] vfs_read+0x26e/0x8c0 [ 556.878299][T16947] ? __cfi_vfs_read+0x10/0x10 [ 556.882998][T16947] ? __kasan_check_write+0x14/0x20 [ 556.888137][T16947] ? mutex_lock+0x8d/0x1a0 [ 556.892590][T16947] ? __cfi_mutex_lock+0x10/0x10 [ 556.897474][T16947] ? __fdget_pos+0x2cd/0x380 [ 556.902189][T16947] ? ksys_read+0x71/0x240 [ 556.906567][T16947] ksys_read+0x140/0x240 [ 556.910836][T16947] ? __cfi_ksys_read+0x10/0x10 [ 556.915635][T16947] __x64_sys_read+0x7b/0x90 [ 556.920162][T16947] x64_sys_call+0x2f/0x9a0 [ 556.924598][T16947] do_syscall_64+0x4c/0xa0 [ 556.929037][T16947] ? clear_bhb_loop+0x15/0x70 [ 556.933733][T16947] ? clear_bhb_loop+0x15/0x70 [ 556.938425][T16947] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 556.944345][T16947] RIP: 0033:0x7f981878d37c [ 556.948779][T16947] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 556.968398][T16947] RSP: 002b:00007f98195c9030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 556.976833][T16947] RAX: ffffffffffffffda RBX: 00007f98189b5fa0 RCX: 00007f981878d37c [ 556.984836][T16947] RDX: 000000000000000f RSI: 00007f98195c90a0 RDI: 0000000000000007 [ 556.992826][T16947] RBP: 00007f98195c9090 R08: 0000000000000000 R09: 0000000000000000 [ 557.000810][T16947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 557.008797][T16947] R13: 0000000000000000 R14: 00007f98189b5fa0 R15: 00007ffdc861c058 [ 557.016793][T16947] [ 557.580540][T16971] device pim6reg1 entered promiscuous mode [ 558.078736][T16999] FAULT_INJECTION: forcing a failure. [ 558.078736][T16999] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 558.143900][T16999] CPU: 1 PID: 16999 Comm: syz.8.5092 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 558.155384][T16999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 558.165463][T16999] Call Trace: [ 558.168759][T16999] [ 558.171742][T16999] __dump_stack+0x21/0x24 [ 558.176099][T16999] dump_stack_lvl+0xee/0x150 [ 558.180712][T16999] ? __cfi_dump_stack_lvl+0x8/0x8 [ 558.185850][T16999] dump_stack+0x15/0x24 [ 558.190218][T16999] should_fail_ex+0x3d4/0x520 [ 558.194961][T16999] should_fail+0xb/0x10 [ 558.199142][T16999] should_fail_usercopy+0x1a/0x20 [ 558.204188][T16999] _copy_from_user+0x1e/0xc0 [ 558.208798][T16999] ___sys_recvmsg+0x12b/0x510 [ 558.213592][T16999] ? __sys_recvmsg+0x270/0x270 [ 558.218390][T16999] ? security_file_permission+0x94/0xb0 [ 558.223963][T16999] ? __fget_files+0x2d5/0x330 [ 558.228679][T16999] ? __fdget+0x19c/0x220 [ 558.232979][T16999] __x64_sys_recvmsg+0x1ed/0x2c0 [ 558.237949][T16999] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 558.243529][T16999] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 558.249628][T16999] x64_sys_call+0x75/0x9a0 [ 558.254069][T16999] do_syscall_64+0x4c/0xa0 [ 558.258507][T16999] ? clear_bhb_loop+0x15/0x70 [ 558.263197][T16999] ? clear_bhb_loop+0x15/0x70 [ 558.267896][T16999] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 558.273819][T16999] RIP: 0033:0x7f032118e969 [ 558.278248][T16999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 558.297873][T16999] RSP: 002b:00007f03220dc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 558.306311][T16999] RAX: ffffffffffffffda RBX: 00007f03213b5fa0 RCX: 00007f032118e969 [ 558.314313][T16999] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000000006 [ 558.322320][T16999] RBP: 00007f03220dc090 R08: 0000000000000000 R09: 0000000000000000 [ 558.330316][T16999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 558.338304][T16999] R13: 0000000000000000 R14: 00007f03213b5fa0 R15: 00007ffca798f6e8 [ 558.346300][T16999] [ 558.777138][T17013] device veth0_vlan left promiscuous mode [ 558.806614][T17013] device veth0_vlan entered promiscuous mode [ 558.814241][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 558.857350][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 558.891940][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 559.208667][T17033] FAULT_INJECTION: forcing a failure. [ 559.208667][T17033] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 559.266475][T17033] CPU: 0 PID: 17033 Comm: syz.0.5105 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 559.277904][T17033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 559.287982][T17033] Call Trace: [ 559.291279][T17033] [ 559.294220][T17033] __dump_stack+0x21/0x24 [ 559.298574][T17033] dump_stack_lvl+0xee/0x150 [ 559.303198][T17033] ? __cfi_dump_stack_lvl+0x8/0x8 [ 559.308255][T17033] dump_stack+0x15/0x24 [ 559.312446][T17033] should_fail_ex+0x3d4/0x520 [ 559.317146][T17033] should_fail+0xb/0x10 [ 559.321328][T17033] should_fail_usercopy+0x1a/0x20 [ 559.326372][T17033] _copy_to_user+0x1e/0x90 [ 559.330811][T17033] simple_read_from_buffer+0xe9/0x160 [ 559.336214][T17033] proc_fail_nth_read+0x19a/0x210 [ 559.341293][T17033] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 559.346855][T17033] ? security_file_permission+0x94/0xb0 [ 559.352408][T17033] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 559.357963][T17033] vfs_read+0x26e/0x8c0 [ 559.362126][T17033] ? __cfi_vfs_read+0x10/0x10 [ 559.366808][T17033] ? __kasan_check_write+0x14/0x20 [ 559.371927][T17033] ? mutex_lock+0x8d/0x1a0 [ 559.376359][T17033] ? __cfi_mutex_lock+0x10/0x10 [ 559.381230][T17033] ? __fdget_pos+0x2cd/0x380 [ 559.385835][T17033] ? ksys_read+0x71/0x240 [ 559.390180][T17033] ksys_read+0x140/0x240 [ 559.394438][T17033] ? __cfi_ksys_read+0x10/0x10 [ 559.399215][T17033] ? debug_smp_processor_id+0x17/0x20 [ 559.404594][T17033] __x64_sys_read+0x7b/0x90 [ 559.409102][T17033] x64_sys_call+0x2f/0x9a0 [ 559.413525][T17033] do_syscall_64+0x4c/0xa0 [ 559.417956][T17033] ? clear_bhb_loop+0x15/0x70 [ 559.422641][T17033] ? clear_bhb_loop+0x15/0x70 [ 559.427323][T17033] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 559.433226][T17033] RIP: 0033:0x7f981878d37c [ 559.437643][T17033] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 559.457248][T17033] RSP: 002b:00007f98195c9030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 559.465663][T17033] RAX: ffffffffffffffda RBX: 00007f98189b5fa0 RCX: 00007f981878d37c [ 559.473629][T17033] RDX: 000000000000000f RSI: 00007f98195c90a0 RDI: 0000000000000008 [ 559.481593][T17033] RBP: 00007f98195c9090 R08: 0000000000000000 R09: 0000000000000000 [ 559.489646][T17033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 559.497611][T17033] R13: 0000000000000000 R14: 00007f98189b5fa0 R15: 00007ffdc861c058 [ 559.505584][T17033] [ 563.394843][T17152] bond_slave_1: mtu less than device minimum [ 563.519452][T17152] cgroup: fork rejected by pids controller in /syz8 [ 565.109188][T15683] device gretap0 left promiscuous mode [ 565.114705][T15683] GPL: port 1(gretap0) entered disabled state [ 565.445950][T15683] device veth0 left promiscuous mode [ 565.451468][T15683] : port 1(veth0) entered disabled state [ 565.518949][T15683] device veth1_macvtap left promiscuous mode [ 566.077646][T17230] bridge0: port 1(bridge_slave_0) entered blocking state [ 566.084719][T17230] bridge0: port 1(bridge_slave_0) entered disabled state [ 566.110193][T17230] device bridge_slave_0 entered promiscuous mode [ 566.117620][T17230] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.171321][T17230] bridge0: port 2(bridge_slave_1) entered disabled state [ 566.200532][T17230] device bridge_slave_1 entered promiscuous mode [ 566.718973][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 566.736666][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 566.814019][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 566.856675][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 566.900824][T15687] bridge0: port 1(bridge_slave_0) entered blocking state [ 566.908010][T15687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 566.985328][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 567.029870][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 567.096480][T15687] bridge0: port 2(bridge_slave_1) entered blocking state [ 567.103552][T15687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 567.159770][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 567.266296][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 567.306450][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 567.346554][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 567.396407][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 567.457861][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 567.486614][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 567.520957][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 567.546841][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 567.583058][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 567.606624][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 567.657583][T17230] device veth0_vlan entered promiscuous mode [ 567.717990][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 567.746600][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 567.787845][T17230] device veth1_macvtap entered promiscuous mode [ 567.847182][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 567.857345][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 567.905392][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 567.983800][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 568.036591][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 568.429590][T17318] device veth1_macvtap left promiscuous mode [ 568.549462][T17318] device veth1_macvtap entered promiscuous mode [ 568.579531][T17318] device macsec0 entered promiscuous mode [ 574.239248][T17399] device pim6reg1 entered promiscuous mode [ 574.926691][T17428] GPL: port 1(gretap0) entered blocking state [ 574.958830][T17428] GPL: port 1(gretap0) entered disabled state [ 575.022410][T17428] device gretap0 entered promiscuous mode [ 576.816264][T17522] device veth0_vlan left promiscuous mode [ 576.880453][T17522] device veth0_vlan entered promiscuous mode [ 576.940865][T17522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 576.979767][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 577.015177][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 577.031527][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 577.518358][T17550] device syzkaller0 entered promiscuous mode [ 580.665932][T17671] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 580.722647][T17671] syzkaller0: linktype set to 774 [ 582.053154][T17718] device pim6reg1 entered promiscuous mode [ 582.138487][T17729] device sit0 left promiscuous mode [ 582.248545][T17733] device veth1_macvtap entered promiscuous mode [ 582.276476][T17733] device macsec0 entered promiscuous mode [ 582.311375][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 583.326991][T17760] device sit0 entered promiscuous mode [ 583.792463][T17773] device syzkaller0 entered promiscuous mode [ 583.913626][T17780] device sit0 left promiscuous mode [ 583.986467][T17783] device sit0 entered promiscuous mode [ 584.030648][T17782] @0Ù: renamed from bond_slave_1 [ 584.434179][T17806] sit0: mtu less than device minimum [ 586.570375][T17863] device syzkaller0 entered promiscuous mode [ 590.115937][T17966] bond_slave_1: mtu less than device minimum [ 603.532223][T18310] device pim6reg1 entered promiscuous mode [ 604.808901][T18366] GPL: port 1(erspan0) entered blocking state [ 604.912383][T18366] GPL: port 1(erspan0) entered disabled state [ 604.938176][T18366] device erspan0 entered promiscuous mode [ 609.366809][T18457] FAULT_INJECTION: forcing a failure. [ 609.366809][T18457] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 609.476412][T18457] CPU: 1 PID: 18457 Comm: syz.8.5591 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 609.487831][T18457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 609.497903][T18457] Call Trace: [ 609.501202][T18457] [ 609.504139][T18457] __dump_stack+0x21/0x24 [ 609.508492][T18457] dump_stack_lvl+0xee/0x150 [ 609.513108][T18457] ? __cfi_dump_stack_lvl+0x8/0x8 [ 609.518156][T18457] dump_stack+0x15/0x24 [ 609.522335][T18457] should_fail_ex+0x3d4/0x520 [ 609.527033][T18457] should_fail+0xb/0x10 [ 609.531210][T18457] should_fail_usercopy+0x1a/0x20 [ 609.536249][T18457] _copy_from_user+0x1e/0xc0 [ 609.540853][T18457] __sys_bpf+0x277/0x780 [ 609.545128][T18457] ? bpf_link_show_fdinfo+0x320/0x320 [ 609.550527][T18457] ? __cfi_ksys_write+0x10/0x10 [ 609.555401][T18457] ? debug_smp_processor_id+0x17/0x20 [ 609.560792][T18457] __x64_sys_bpf+0x7c/0x90 [ 609.565229][T18457] x64_sys_call+0x488/0x9a0 [ 609.569745][T18457] do_syscall_64+0x4c/0xa0 [ 609.574181][T18457] ? clear_bhb_loop+0x15/0x70 [ 609.578867][T18457] ? clear_bhb_loop+0x15/0x70 [ 609.583555][T18457] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 609.589469][T18457] RIP: 0033:0x7f5db518e969 [ 609.593894][T18457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 609.613515][T18457] RSP: 002b:00007f5db5f35038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 609.621948][T18457] RAX: ffffffffffffffda RBX: 00007f5db53b5fa0 RCX: 00007f5db518e969 [ 609.629938][T18457] RDX: 0000000000000010 RSI: 00002000000004c0 RDI: 0000000000000011 [ 609.637925][T18457] RBP: 00007f5db5f35090 R08: 0000000000000000 R09: 0000000000000000 [ 609.645919][T18457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 609.653914][T18457] R13: 0000000000000000 R14: 00007f5db53b5fa0 R15: 00007fff2caaa0d8 [ 609.661915][T18457] [ 610.469800][T18486] device pim6reg1 entered promiscuous mode [ 610.969035][T18511] device pim6reg1 entered promiscuous mode [ 611.026975][T18512] device wg2 entered promiscuous mode [ 612.481863][T18580] FAULT_INJECTION: forcing a failure. [ 612.481863][T18580] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 612.509317][T18580] CPU: 0 PID: 18580 Comm: syz.2.5630 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 612.520736][T18580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 612.530821][T18580] Call Trace: [ 612.534114][T18580] [ 612.537057][T18580] __dump_stack+0x21/0x24 [ 612.541415][T18580] dump_stack_lvl+0xee/0x150 [ 612.546032][T18580] ? __cfi_dump_stack_lvl+0x8/0x8 [ 612.551082][T18580] dump_stack+0x15/0x24 [ 612.555260][T18580] should_fail_ex+0x3d4/0x520 [ 612.559953][T18580] should_fail+0xb/0x10 [ 612.564242][T18580] should_fail_usercopy+0x1a/0x20 [ 612.569281][T18580] _copy_from_user+0x1e/0xc0 [ 612.573976][T18580] ___sys_recvmsg+0x12b/0x510 [ 612.578668][T18580] ? __sys_recvmsg+0x270/0x270 [ 612.583439][T18580] ? security_file_permission+0x94/0xb0 [ 612.588982][T18580] ? __fget_files+0x2d5/0x330 [ 612.593666][T18580] ? __fdget+0x19c/0x220 [ 612.597909][T18580] __x64_sys_recvmsg+0x1ed/0x2c0 [ 612.602855][T18580] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 612.608318][T18580] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 612.614385][T18580] x64_sys_call+0x75/0x9a0 [ 612.618809][T18580] do_syscall_64+0x4c/0xa0 [ 612.623229][T18580] ? clear_bhb_loop+0x15/0x70 [ 612.627986][T18580] ? clear_bhb_loop+0x15/0x70 [ 612.632661][T18580] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 612.638556][T18580] RIP: 0033:0x7f8da1d8e969 [ 612.642967][T18580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 612.662574][T18580] RSP: 002b:00007f8da1bde038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 612.671033][T18580] RAX: ffffffffffffffda RBX: 00007f8da1fb6160 RCX: 00007f8da1d8e969 [ 612.679022][T18580] RDX: 0000000000010121 RSI: 0000200000000300 RDI: 0000000000000003 [ 612.686992][T18580] RBP: 00007f8da1bde090 R08: 0000000000000000 R09: 0000000000000000 [ 612.695000][T18580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 612.702965][T18580] R13: 0000000000000001 R14: 00007f8da1fb6160 R15: 00007ffc29988ed8 [ 612.710938][T18580] [ 613.459500][T18617] FAULT_INJECTION: forcing a failure. [ 613.459500][T18617] name failslab, interval 1, probability 0, space 0, times 0 [ 613.589901][T18617] CPU: 1 PID: 18617 Comm: syz.2.5644 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 613.601327][T18617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 613.611402][T18617] Call Trace: [ 613.614696][T18617] [ 613.617638][T18617] __dump_stack+0x21/0x24 [ 613.621998][T18617] dump_stack_lvl+0xee/0x150 [ 613.626615][T18617] ? __cfi_dump_stack_lvl+0x8/0x8 [ 613.631667][T18617] dump_stack+0x15/0x24 [ 613.635849][T18617] should_fail_ex+0x3d4/0x520 [ 613.640561][T18617] __should_failslab+0xac/0xf0 [ 613.645343][T18617] should_failslab+0x9/0x20 [ 613.649876][T18617] slab_pre_alloc_hook+0x30/0x1e0 [ 613.654932][T18617] kmem_cache_alloc_lru+0x49/0x280 [ 613.660060][T18617] ? __d_alloc+0x34/0x6c0 [ 613.664408][T18617] __d_alloc+0x34/0x6c0 [ 613.668581][T18617] ? radix_tree_iter_tag_clear+0x68/0x80 [ 613.674230][T18617] d_alloc_pseudo+0x1d/0x70 [ 613.678757][T18617] alloc_file_pseudo+0xc8/0x1f0 [ 613.683710][T18617] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 613.689184][T18617] ? __kasan_check_write+0x14/0x20 [ 613.694407][T18617] ? _raw_spin_lock_bh+0x8e/0xe0 [ 613.699366][T18617] anon_inode_getfile+0xa6/0x180 [ 613.704324][T18617] bpf_link_prime+0xf0/0x250 [ 613.708936][T18617] bpf_raw_tp_link_attach+0x273/0x550 [ 613.714332][T18617] ? bpf_insn_prepare_dump+0x840/0x840 [ 613.719813][T18617] ? __kasan_check_write+0x14/0x20 [ 613.724954][T18617] bpf_raw_tracepoint_open+0x258/0x480 [ 613.730438][T18617] ? slab_free_freelist_hook+0xc2/0x190 [ 613.736007][T18617] ? bpf_obj_get_info_by_fd+0x2b10/0x2b10 [ 613.741758][T18617] ? selinux_bpf+0xce/0xf0 [ 613.746201][T18617] ? security_bpf+0x93/0xb0 [ 613.750724][T18617] __sys_bpf+0x4d1/0x780 [ 613.754993][T18617] ? bpf_link_show_fdinfo+0x320/0x320 [ 613.760396][T18617] ? __cfi_ksys_write+0x10/0x10 [ 613.765270][T18617] ? debug_smp_processor_id+0x17/0x20 [ 613.770665][T18617] __x64_sys_bpf+0x7c/0x90 [ 613.775107][T18617] x64_sys_call+0x488/0x9a0 [ 613.779634][T18617] do_syscall_64+0x4c/0xa0 [ 613.784160][T18617] ? clear_bhb_loop+0x15/0x70 [ 613.788850][T18617] ? clear_bhb_loop+0x15/0x70 [ 613.793558][T18617] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 613.799480][T18617] RIP: 0033:0x7f8da1d8e969 [ 613.803911][T18617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 613.823538][T18617] RSP: 002b:00007f8da2b23038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 613.831976][T18617] RAX: ffffffffffffffda RBX: 00007f8da1fb5fa0 RCX: 00007f8da1d8e969 [ 613.839968][T18617] RDX: 0000000000000010 RSI: 00002000000004c0 RDI: 0000000000000011 [ 613.847987][T18617] RBP: 00007f8da2b23090 R08: 0000000000000000 R09: 0000000000000000 [ 613.856176][T18617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 613.864164][T18617] R13: 0000000000000000 R14: 00007f8da1fb5fa0 R15: 00007ffc29988ed8 [ 613.872160][T18617] [ 614.295926][T18657] device pim6reg1 entered promiscuous mode [ 614.363310][T18660] device sit0 entered promiscuous mode [ 615.010827][T18676] device veth1_macvtap left promiscuous mode [ 615.060270][T18676] device macsec0 left promiscuous mode [ 615.126454][T18676] device veth1_macvtap entered promiscuous mode [ 615.132799][T18676] device macsec0 entered promiscuous mode [ 615.166747][T18674] device pim6reg1 entered promiscuous mode [ 616.071007][T18715] syz.2.5674[18715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.071092][T18715] syz.2.5674[18715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.239416][T18715] device veth0_vlan left promiscuous mode [ 616.419025][T18715] device veth0_vlan entered promiscuous mode [ 616.460561][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 616.483266][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 616.533739][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 616.725921][T18743] device veth0_vlan left promiscuous mode [ 616.792370][T18743] device veth0_vlan entered promiscuous mode [ 617.108957][T18760] FAULT_INJECTION: forcing a failure. [ 617.108957][T18760] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 617.125472][T18760] CPU: 1 PID: 18760 Comm: syz.2.5682 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 617.136885][T18760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 617.146958][T18760] Call Trace: [ 617.150253][T18760] [ 617.153194][T18760] __dump_stack+0x21/0x24 [ 617.157551][T18760] dump_stack_lvl+0xee/0x150 [ 617.162159][T18760] ? __cfi_dump_stack_lvl+0x8/0x8 [ 617.167199][T18760] ? __this_cpu_preempt_check+0x13/0x20 [ 617.172760][T18760] ? __perf_event_task_sched_in+0x188/0x1d0 [ 617.178852][T18760] dump_stack+0x15/0x24 [ 617.183120][T18760] should_fail_ex+0x3d4/0x520 [ 617.187880][T18760] should_fail+0xb/0x10 [ 617.192149][T18760] should_fail_usercopy+0x1a/0x20 [ 617.197188][T18760] copyout+0x20/0xa0 [ 617.201105][T18760] _copy_to_iter+0x3f0/0xe50 [ 617.205708][T18760] ? __cfi__copy_to_iter+0x10/0x10 [ 617.210827][T18760] ? __kasan_check_write+0x14/0x20 [ 617.215968][T18760] ? _raw_spin_lock_bh+0x8e/0xe0 [ 617.220923][T18760] ? check_stack_object+0x81/0x140 [ 617.226062][T18760] ? __kasan_check_read+0x11/0x20 [ 617.231114][T18760] ? __check_object_size+0x45a/0x600 [ 617.236431][T18760] simple_copy_to_iter+0x50/0x70 [ 617.241430][T18760] __skb_datagram_iter+0xf1/0x730 [ 617.246654][T18760] ? tsk_importance+0x150/0x150 [ 617.251529][T18760] ? kernel_text_address+0xa0/0xd0 [ 617.256655][T18760] ? __cfi_simple_copy_to_iter+0x10/0x10 [ 617.262313][T18760] skb_copy_datagram_iter+0x40/0x150 [ 617.267616][T18760] tipc_recvstream+0x6fe/0xe80 [ 617.272412][T18760] ? __cfi_tipc_recvstream+0x10/0x10 [ 617.277719][T18760] ____sys_recvmsg+0x2a0/0x590 [ 617.282516][T18760] ? __sys_recvmsg_sock+0x50/0x50 [ 617.287572][T18760] ? import_iovec+0x7c/0xb0 [ 617.292100][T18760] ___sys_recvmsg+0x1b2/0x510 [ 617.296807][T18760] ? __sys_recvmsg+0x270/0x270 [ 617.301593][T18760] ? security_file_permission+0x94/0xb0 [ 617.307162][T18760] ? __fget_files+0x2d5/0x330 [ 617.311864][T18760] ? __fdget+0x19c/0x220 [ 617.316132][T18760] __x64_sys_recvmsg+0x1ed/0x2c0 [ 617.321093][T18760] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 617.326583][T18760] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 617.332677][T18760] x64_sys_call+0x75/0x9a0 [ 617.337115][T18760] do_syscall_64+0x4c/0xa0 [ 617.341644][T18760] ? clear_bhb_loop+0x15/0x70 [ 617.346330][T18760] ? clear_bhb_loop+0x15/0x70 [ 617.351023][T18760] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 617.356935][T18760] RIP: 0033:0x7f8da1d8e969 [ 617.361365][T18760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 617.380980][T18760] RSP: 002b:00007f8da1bde038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 617.389418][T18760] RAX: ffffffffffffffda RBX: 00007f8da1fb6160 RCX: 00007f8da1d8e969 [ 617.397440][T18760] RDX: 0000000000010121 RSI: 0000200000000300 RDI: 0000000000000003 [ 617.405409][T18760] RBP: 00007f8da1bde090 R08: 0000000000000000 R09: 0000000000000000 [ 617.413377][T18760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 617.421345][T18760] R13: 0000000000000001 R14: 00007f8da1fb6160 R15: 00007ffc29988ed8 [ 617.429345][T18760] [ 618.898692][T18834] FAULT_INJECTION: forcing a failure. [ 618.898692][T18834] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 618.956490][T18834] CPU: 1 PID: 18834 Comm: syz.7.5707 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 618.967922][T18834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 618.977999][T18834] Call Trace: [ 618.981290][T18834] [ 618.984229][T18834] __dump_stack+0x21/0x24 [ 618.988587][T18834] dump_stack_lvl+0xee/0x150 [ 618.993239][T18834] ? __cfi_dump_stack_lvl+0x8/0x8 [ 618.998285][T18834] dump_stack+0x15/0x24 [ 619.002463][T18834] should_fail_ex+0x3d4/0x520 [ 619.007224][T18834] should_fail+0xb/0x10 [ 619.011395][T18834] should_fail_usercopy+0x1a/0x20 [ 619.016446][T18834] _copy_to_user+0x1e/0x90 [ 619.020881][T18834] simple_read_from_buffer+0xe9/0x160 [ 619.026279][T18834] proc_fail_nth_read+0x19a/0x210 [ 619.031326][T18834] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 619.036895][T18834] ? security_file_permission+0x94/0xb0 [ 619.042457][T18834] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 619.048056][T18834] vfs_read+0x26e/0x8c0 [ 619.052243][T18834] ? __cfi_vfs_read+0x10/0x10 [ 619.056938][T18834] ? __kasan_check_write+0x14/0x20 [ 619.062072][T18834] ? mutex_lock+0x8d/0x1a0 [ 619.066511][T18834] ? __cfi_mutex_lock+0x10/0x10 [ 619.071384][T18834] ? __fdget_pos+0x2cd/0x380 [ 619.075998][T18834] ? ksys_read+0x71/0x240 [ 619.080348][T18834] ksys_read+0x140/0x240 [ 619.084610][T18834] ? __cfi_ksys_read+0x10/0x10 [ 619.089401][T18834] ? fpregs_restore_userregs+0x128/0x260 [ 619.095060][T18834] __x64_sys_read+0x7b/0x90 [ 619.099587][T18834] x64_sys_call+0x2f/0x9a0 [ 619.104020][T18834] do_syscall_64+0x4c/0xa0 [ 619.108460][T18834] ? clear_bhb_loop+0x15/0x70 [ 619.113154][T18834] ? clear_bhb_loop+0x15/0x70 [ 619.117847][T18834] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 619.123767][T18834] RIP: 0033:0x7f2e8018d37c [ 619.128199][T18834] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 619.147819][T18834] RSP: 002b:00007f2e7ffde030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 619.156257][T18834] RAX: ffffffffffffffda RBX: 00007f2e803b6160 RCX: 00007f2e8018d37c [ 619.164259][T18834] RDX: 000000000000000f RSI: 00007f2e7ffde0a0 RDI: 0000000000000005 [ 619.172247][T18834] RBP: 00007f2e7ffde090 R08: 0000000000000000 R09: 0000000000000000 [ 619.180235][T18834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 619.188222][T18834] R13: 0000000000000001 R14: 00007f2e803b6160 R15: 00007ffe715808e8 [ 619.196218][T18834] [ 619.669020][T18848] device veth0_vlan left promiscuous mode [ 619.697520][T18848] device veth0_vlan entered promiscuous mode [ 619.741394][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 619.769934][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 619.810050][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 620.132200][T18867] device veth0_vlan left promiscuous mode [ 620.148118][T18867] device veth0_vlan entered promiscuous mode [ 620.164766][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 620.173393][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 620.180729][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 620.538297][T18881] FAULT_INJECTION: forcing a failure. [ 620.538297][T18881] name failslab, interval 1, probability 0, space 0, times 0 [ 620.571668][T18881] CPU: 1 PID: 18881 Comm: syz.8.5725 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 620.583101][T18881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 620.593172][T18881] Call Trace: [ 620.596472][T18881] [ 620.599409][T18881] __dump_stack+0x21/0x24 [ 620.603844][T18881] dump_stack_lvl+0xee/0x150 [ 620.608450][T18881] ? __cfi_dump_stack_lvl+0x8/0x8 [ 620.613484][T18881] ? security_file_alloc+0x33/0x130 [ 620.618689][T18881] ? kmem_cache_alloc+0x16e/0x330 [ 620.623720][T18881] ? security_file_alloc+0x33/0x130 [ 620.628924][T18881] dump_stack+0x15/0x24 [ 620.633094][T18881] should_fail_ex+0x3d4/0x520 [ 620.637793][T18881] __should_failslab+0xac/0xf0 [ 620.642566][T18881] ? tracepoint_add_func+0x28d/0x900 [ 620.647863][T18881] should_failslab+0x9/0x20 [ 620.652395][T18881] __kmem_cache_alloc_node+0x3d/0x2c0 [ 620.657786][T18881] ? tracepoint_add_func+0x28d/0x900 [ 620.663129][T18881] __kmalloc+0xa1/0x1e0 [ 620.667310][T18881] ? __kasan_check_write+0x14/0x20 [ 620.672442][T18881] tracepoint_add_func+0x28d/0x900 [ 620.677569][T18881] ? __cfi___bpf_trace_tlb_flush+0x10/0x10 [ 620.683390][T18881] ? __cfi___bpf_trace_tlb_flush+0x10/0x10 [ 620.689217][T18881] tracepoint_probe_register_prio_may_exist+0x5b/0x90 [ 620.696038][T18881] ? __cfi___bpf_trace_tlb_flush+0x10/0x10 [ 620.701856][T18881] bpf_probe_register+0x13f/0x1d0 [ 620.706895][T18881] bpf_raw_tp_link_attach+0x3d1/0x550 [ 620.712281][T18881] ? bpf_insn_prepare_dump+0x840/0x840 [ 620.717762][T18881] ? __kasan_check_write+0x14/0x20 [ 620.722883][T18881] bpf_raw_tracepoint_open+0x258/0x480 [ 620.728342][T18881] ? slab_free_freelist_hook+0xc2/0x190 [ 620.733895][T18881] ? bpf_obj_get_info_by_fd+0x2b10/0x2b10 [ 620.739621][T18881] ? selinux_bpf+0xce/0xf0 [ 620.744050][T18881] ? security_bpf+0x93/0xb0 [ 620.748556][T18881] __sys_bpf+0x4d1/0x780 [ 620.752811][T18881] ? bpf_link_show_fdinfo+0x320/0x320 [ 620.758210][T18881] ? __cfi_ksys_write+0x10/0x10 [ 620.763090][T18881] ? debug_smp_processor_id+0x17/0x20 [ 620.768474][T18881] __x64_sys_bpf+0x7c/0x90 [ 620.772908][T18881] x64_sys_call+0x488/0x9a0 [ 620.777430][T18881] do_syscall_64+0x4c/0xa0 [ 620.781862][T18881] ? clear_bhb_loop+0x15/0x70 [ 620.786541][T18881] ? clear_bhb_loop+0x15/0x70 [ 620.791218][T18881] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 620.797121][T18881] RIP: 0033:0x7f5db518e969 [ 620.801534][T18881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 620.821138][T18881] RSP: 002b:00007f5db5f35038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 620.829561][T18881] RAX: ffffffffffffffda RBX: 00007f5db53b5fa0 RCX: 00007f5db518e969 [ 620.837534][T18881] RDX: 0000000000000010 RSI: 00002000000004c0 RDI: 0000000000000011 [ 620.845509][T18881] RBP: 00007f5db5f35090 R08: 0000000000000000 R09: 0000000000000000 [ 620.853478][T18881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 620.861448][T18881] R13: 0000000000000000 R14: 00007f5db53b5fa0 R15: 00007fff2caaa0d8 [ 620.869432][T18881] [ 624.301202][T18996] device pim6reg1 entered promiscuous mode [ 624.507527][T19011] device sit0 left promiscuous mode [ 624.534728][T19013] FAULT_INJECTION: forcing a failure. [ 624.534728][T19013] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 624.619653][T19013] CPU: 0 PID: 19013 Comm: syz.7.5766 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 624.631075][T19013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 624.641149][T19013] Call Trace: [ 624.644440][T19013] [ 624.647379][T19013] __dump_stack+0x21/0x24 [ 624.651729][T19013] dump_stack_lvl+0xee/0x150 [ 624.656336][T19013] ? __cfi_dump_stack_lvl+0x8/0x8 [ 624.661378][T19013] dump_stack+0x15/0x24 [ 624.665548][T19013] should_fail_ex+0x3d4/0x520 [ 624.670245][T19013] should_fail_alloc_page+0x61/0x90 [ 624.675457][T19013] prepare_alloc_pages+0x148/0x5f0 [ 624.680586][T19013] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 624.685803][T19013] ? do_syscall_64+0x4c/0xa0 [ 624.690407][T19013] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 624.696497][T19013] __alloc_pages+0x115/0x3a0 [ 624.701102][T19013] ? __cfi___alloc_pages+0x10/0x10 [ 624.706227][T19013] __get_free_pages+0xe/0x30 [ 624.710835][T19013] kasan_populate_vmalloc_pte+0x29/0x120 [ 624.716495][T19013] __apply_to_page_range+0x8cc/0xc10 [ 624.721795][T19013] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 624.728054][T19013] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 624.734310][T19013] apply_to_page_range+0x3b/0x50 [ 624.739259][T19013] kasan_populate_vmalloc+0x60/0x70 [ 624.744473][T19013] alloc_vmap_area+0x173e/0x1870 [ 624.749444][T19013] ? vm_map_ram+0x930/0x930 [ 624.753962][T19013] ? __kasan_kmalloc+0x95/0xb0 [ 624.758733][T19013] ? kmalloc_node_trace+0x3d/0xb0 [ 624.763774][T19013] __get_vm_area_node+0x160/0x360 [ 624.768817][T19013] __vmalloc_node_range+0x326/0x13d0 [ 624.774119][T19013] ? xsk_map_alloc+0x16d/0x280 [ 624.778896][T19013] ? avc_has_perm_noaudit+0x2f4/0x460 [ 624.784282][T19013] ? __cfi_selinux_capable+0x10/0x10 [ 624.789592][T19013] ? __cfi___vmalloc_node_range+0x10/0x10 [ 624.795344][T19013] ? avc_has_perm+0x158/0x240 [ 624.800040][T19013] ? cap_capable+0x1aa/0x230 [ 624.804649][T19013] ? security_capable+0x99/0xc0 [ 624.809518][T19013] bpf_map_area_alloc+0xd7/0xe0 [ 624.814380][T19013] ? xsk_map_alloc+0x16d/0x280 [ 624.819157][T19013] xsk_map_alloc+0x16d/0x280 [ 624.823757][T19013] map_create+0x49c/0xd80 [ 624.828105][T19013] __sys_bpf+0x30b/0x780 [ 624.832362][T19013] ? bpf_link_show_fdinfo+0x320/0x320 [ 624.837757][T19013] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 624.843579][T19013] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 624.849760][T19013] __x64_sys_bpf+0x7c/0x90 [ 624.854199][T19013] x64_sys_call+0x488/0x9a0 [ 624.858715][T19013] do_syscall_64+0x4c/0xa0 [ 624.863148][T19013] ? clear_bhb_loop+0x15/0x70 [ 624.867834][T19013] ? clear_bhb_loop+0x15/0x70 [ 624.872520][T19013] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 624.878431][T19013] RIP: 0033:0x7f2e8018e969 [ 624.882856][T19013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 624.902470][T19013] RSP: 002b:00007f2e80f1e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 624.910893][T19013] RAX: ffffffffffffffda RBX: 00007f2e803b5fa0 RCX: 00007f2e8018e969 [ 624.918872][T19013] RDX: 0000000000000048 RSI: 0000200000000b40 RDI: 0000000000000000 [ 624.926854][T19013] RBP: 00007f2e80f1e090 R08: 0000000000000000 R09: 0000000000000000 [ 624.934832][T19013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 624.942813][T19013] R13: 0000000000000000 R14: 00007f2e803b5fa0 R15: 00007ffe715808e8 [ 624.950798][T19013] [ 625.373699][T19014] device sit0 entered promiscuous mode [ 627.978182][T19115] device pim6reg1 entered promiscuous mode [ 628.231676][T19124] device pim6reg1 entered promiscuous mode [ 628.257633][T19124] device pim6reg1 left promiscuous mode [ 628.736282][T19142] device sit0 entered promiscuous mode [ 629.066212][T19150] GPL: port 1(erspan0) entered blocking state [ 629.072379][T19150] GPL: port 1(erspan0) entered forwarding state [ 629.138285][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 631.204744][T19199] device sit0 left promiscuous mode [ 631.883304][T19210] bridge0: port 1(veth0) entered blocking state [ 631.930288][T19210] bridge0: port 1(veth0) entered disabled state [ 632.094573][T19210] device veth0 entered promiscuous mode [ 632.512465][T19224] device sit0 left promiscuous mode [ 632.686279][T19227] device sit0 entered promiscuous mode [ 632.965080][T19237] device veth0 left promiscuous mode [ 633.037121][T19237] bridge0: port 1(veth0) entered disabled state [ 633.408461][T19245] device veth0_vlan left promiscuous mode [ 633.416061][T19245] device veth0_vlan entered promiscuous mode [ 633.428643][T19245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 633.453030][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 633.462297][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 633.528288][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 634.251738][T19277] bridge0: port 2(bridge_slave_1) entered disabled state [ 634.259830][T19277] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.387603][T19278] device bridge_slave_1 left promiscuous mode [ 634.393843][T19278] bridge0: port 2(bridge_slave_1) entered disabled state [ 634.401884][T19278] device bridge_slave_0 left promiscuous mode [ 634.408136][T19278] bridge0: port 1(bridge_slave_0) entered disabled state [ 635.581433][T19308] device veth1_macvtap left promiscuous mode [ 635.691483][T19310] device sit0 left promiscuous mode [ 635.813668][T19314] device sit0 entered promiscuous mode [ 637.095589][T19335] device veth0_vlan left promiscuous mode [ 637.119445][T19335] device veth0_vlan entered promiscuous mode [ 641.693236][T19391] device wg2 left promiscuous mode [ 641.736632][T19397] device wg2 entered promiscuous mode [ 643.921962][T19468] device sit0 left promiscuous mode [ 644.099449][T19477] device sit0 entered promiscuous mode [ 645.370619][T19549] device wg2 entered promiscuous mode [ 645.401093][T19547] device veth1_macvtap entered promiscuous mode [ 645.417834][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 645.495085][T16869] syzkaller0: tun_net_xmit 76 [ 645.500341][T16869] syzkaller0: tun_net_xmit 48 [ 645.505531][T19553] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 645.516256][T16869] syzkaller0: tun_net_xmit 76 [ 645.520999][T19553] syzkaller0: Linktype set failed because interface is up [ 645.659058][T19553] device veth0_vlan left promiscuous mode [ 645.687306][T19553] device veth0_vlan entered promiscuous mode [ 645.746306][T15683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 645.801701][T15683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 645.824499][T15683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 647.091372][T19627] device veth0_vlan left promiscuous mode [ 647.121473][T19627] device veth0_vlan entered promiscuous mode [ 647.192977][T19627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 647.269401][T15683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 647.289401][T15683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 647.316755][T15683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 650.843341][T19739] device veth1_macvtap left promiscuous mode [ 650.853787][T19739] device macsec0 left promiscuous mode [ 650.925822][T19747] device pim6reg1 entered promiscuous mode [ 650.938154][T19726] bridge0: port 1(bridge_slave_0) entered blocking state [ 650.956303][T19726] bridge0: port 1(bridge_slave_0) entered disabled state [ 650.963893][T19726] device bridge_slave_0 entered promiscuous mode [ 651.010802][T19748] device sit0 left promiscuous mode [ 651.047793][T19726] bridge0: port 2(bridge_slave_1) entered blocking state [ 651.056301][T19726] bridge0: port 2(bridge_slave_1) entered disabled state [ 651.063847][T19726] device bridge_slave_1 entered promiscuous mode [ 652.067756][T15685] device veth0_vlan left promiscuous mode [ 652.294959][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 652.337466][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 652.393904][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 652.402551][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 652.411765][T15686] bridge0: port 1(bridge_slave_0) entered blocking state [ 652.418832][T15686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 652.426506][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 652.435032][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 652.443217][T15686] bridge0: port 2(bridge_slave_1) entered blocking state [ 652.450258][T15686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 652.457809][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 652.472480][T19782] device veth1_macvtap left promiscuous mode [ 652.480628][T19782] device macsec0 left promiscuous mode [ 652.535296][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 652.544325][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 652.564354][T15688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 652.580937][T15688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 652.641835][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 652.672179][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 652.747934][T19800] device syzkaller0 entered promiscuous mode [ 652.797119][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 652.835243][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 652.875715][T19726] device veth0_vlan entered promiscuous mode [ 652.936457][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 652.947111][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 652.983663][T19726] device veth1_macvtap entered promiscuous mode [ 653.026768][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 653.079423][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 653.135182][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 653.222308][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 653.236849][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 653.247777][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 653.256553][T15687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 653.419394][T19824] device wg2 left promiscuous mode [ 653.543431][T19838] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.552888][T19838] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.633560][T19841] device bridge_slave_1 left promiscuous mode [ 653.644986][T19841] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.654417][T19841] device bridge_slave_0 left promiscuous mode [ 653.690099][T19841] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.098690][T19860] device sit0 left promiscuous mode [ 654.269713][T19868] device sit0 entered promiscuous mode [ 655.469959][T19899] device veth0_vlan left promiscuous mode [ 655.512955][T19899] device veth0_vlan entered promiscuous mode [ 655.539015][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 655.547450][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 655.555081][T15686] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 655.658174][T19929] device sit0 entered promiscuous mode [ 656.803316][T19980] device wg2 left promiscuous mode [ 656.827556][T19986] device wg2 entered promiscuous mode [ 657.534937][T20020] device syzkaller0 entered promiscuous mode [ 657.579900][T20016] device syzkaller0 entered promiscuous mode [ 658.715495][T20090] device syzkaller0 entered promiscuous mode [ 659.075022][T20111] device wg2 left promiscuous mode [ 659.149285][T20111] device wg2 entered promiscuous mode [ 662.742127][T20131] device wg2 entered promiscuous mode [ 662.984387][T20148] device bridge_slave_1 entered promiscuous mode [ 663.077261][T20153] device wg2 entered promiscuous mode [ 663.930496][T20194] device wg2 left promiscuous mode [ 663.971742][T20202] device wg2 entered promiscuous mode [ 664.034618][T20204] device wg2 entered promiscuous mode [ 665.151995][T20248] device wg2 entered promiscuous mode [ 665.949292][T20283] device veth0_vlan left promiscuous mode [ 666.144145][T20283] device veth0_vlan entered promiscuous mode [ 666.436728][T20304] FAULT_INJECTION: forcing a failure. [ 666.436728][T20304] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 666.459872][T20304] CPU: 0 PID: 20304 Comm: syz.9.6146 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 666.471303][T20304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 666.481400][T20304] Call Trace: [ 666.484694][T20304] [ 666.487633][T20304] __dump_stack+0x21/0x24 [ 666.491986][T20304] dump_stack_lvl+0xee/0x150 [ 666.496593][T20304] ? __cfi_dump_stack_lvl+0x8/0x8 [ 666.501649][T20304] ? has_cap_mac_admin+0x330/0x330 [ 666.506799][T20304] dump_stack+0x15/0x24 [ 666.510990][T20304] should_fail_ex+0x3d4/0x520 [ 666.515693][T20304] should_fail+0xb/0x10 [ 666.519872][T20304] should_fail_usercopy+0x1a/0x20 [ 666.524940][T20304] _copy_from_user+0x1e/0xc0 [ 666.529553][T20304] get_user_ifreq+0x6c/0x180 [ 666.534157][T20304] sock_ioctl+0x630/0x6e0 [ 666.538502][T20304] ? __cfi_sock_ioctl+0x10/0x10 [ 666.543377][T20304] ? security_file_ioctl+0x95/0xc0 [ 666.548519][T20304] ? __cfi_sock_ioctl+0x10/0x10 [ 666.553389][T20304] __se_sys_ioctl+0x12f/0x1b0 [ 666.558183][T20304] __x64_sys_ioctl+0x7b/0x90 [ 666.562803][T20304] x64_sys_call+0x58b/0x9a0 [ 666.567329][T20304] do_syscall_64+0x4c/0xa0 [ 666.571766][T20304] ? clear_bhb_loop+0x15/0x70 [ 666.576480][T20304] ? clear_bhb_loop+0x15/0x70 [ 666.581458][T20304] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 666.587389][T20304] RIP: 0033:0x7f328378e969 [ 666.591827][T20304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 666.611545][T20304] RSP: 002b:00007f32845ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 666.620168][T20304] RAX: ffffffffffffffda RBX: 00007f32839b6080 RCX: 00007f328378e969 [ 666.628167][T20304] RDX: 0000200000000080 RSI: 00000000000089f2 RDI: 0000000000000007 [ 666.636167][T20304] RBP: 00007f32845ed090 R08: 0000000000000000 R09: 0000000000000000 [ 666.644158][T20304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 666.652235][T20304] R13: 0000000000000001 R14: 00007f32839b6080 R15: 00007ffcb405a258 [ 666.660230][T20304] [ 666.664739][T20283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 666.678847][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 666.687072][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 666.694487][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 667.198904][T20340] FAULT_INJECTION: forcing a failure. [ 667.198904][T20340] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 667.282811][T20340] CPU: 1 PID: 20340 Comm: syz.9.6160 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 667.294322][T20340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 667.304399][T20340] Call Trace: [ 667.307690][T20340] [ 667.310632][T20340] __dump_stack+0x21/0x24 [ 667.315072][T20340] dump_stack_lvl+0xee/0x150 [ 667.319736][T20340] ? __cfi_dump_stack_lvl+0x8/0x8 [ 667.324784][T20340] dump_stack+0x15/0x24 [ 667.329048][T20340] should_fail_ex+0x3d4/0x520 [ 667.333744][T20340] should_fail+0xb/0x10 [ 667.337919][T20340] should_fail_usercopy+0x1a/0x20 [ 667.342966][T20340] _copy_from_user+0x1e/0xc0 [ 667.347577][T20340] vti6_siocdevprivate+0x4c1/0xd20 [ 667.352713][T20340] ? do_vfs_ioctl+0xc36/0x1c80 [ 667.357502][T20340] ? __cfi_vti6_siocdevprivate+0x10/0x10 [ 667.363168][T20340] ? full_name_hash+0xba/0xf0 [ 667.367876][T20340] dev_ifsioc+0xbc4/0xed0 [ 667.372311][T20340] ? ioctl_has_perm+0x391/0x4c0 [ 667.377179][T20340] ? dev_ioctl+0xd10/0xd10 [ 667.381612][T20340] ? __kasan_check_write+0x14/0x20 [ 667.386773][T20340] ? mutex_lock+0x8d/0x1a0 [ 667.391214][T20340] ? __cfi_mutex_lock+0x10/0x10 [ 667.396097][T20340] ? dev_get_by_name_rcu+0xe5/0x130 [ 667.401338][T20340] dev_ioctl+0x5f3/0xd10 [ 667.405607][T20340] sock_ioctl+0x675/0x6e0 [ 667.409953][T20340] ? __cfi_sock_ioctl+0x10/0x10 [ 667.414825][T20340] ? security_file_ioctl+0x95/0xc0 [ 667.419955][T20340] ? __cfi_sock_ioctl+0x10/0x10 [ 667.424835][T20340] __se_sys_ioctl+0x12f/0x1b0 [ 667.429539][T20340] __x64_sys_ioctl+0x7b/0x90 [ 667.434150][T20340] x64_sys_call+0x58b/0x9a0 [ 667.438670][T20340] do_syscall_64+0x4c/0xa0 [ 667.443103][T20340] ? clear_bhb_loop+0x15/0x70 [ 667.447792][T20340] ? clear_bhb_loop+0x15/0x70 [ 667.452482][T20340] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 667.458405][T20340] RIP: 0033:0x7f328378e969 [ 667.462834][T20340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 667.482456][T20340] RSP: 002b:00007f328460e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 667.490893][T20340] RAX: ffffffffffffffda RBX: 00007f32839b5fa0 RCX: 00007f328378e969 [ 667.498880][T20340] RDX: 0000200000000080 RSI: 00000000000089f2 RDI: 0000000000000007 [ 667.506862][T20340] RBP: 00007f328460e090 R08: 0000000000000000 R09: 0000000000000000 [ 667.514843][T20340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 667.522826][T20340] R13: 0000000000000000 R14: 00007f32839b5fa0 R15: 00007ffcb405a258 [ 667.530821][T20340] [ 667.950635][T20374] device veth1_macvtap entered promiscuous mode [ 667.967532][T20374] device macsec0 entered promiscuous mode [ 667.993395][T20379] FAULT_INJECTION: forcing a failure. [ 667.993395][T20379] name failslab, interval 1, probability 0, space 0, times 0 [ 668.096214][T20379] CPU: 1 PID: 20379 Comm: syz.2.6173 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 668.107642][T20379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 668.117717][T20379] Call Trace: [ 668.121023][T20379] [ 668.123962][T20379] __dump_stack+0x21/0x24 [ 668.128324][T20379] dump_stack_lvl+0xee/0x150 [ 668.132944][T20379] ? __cfi_dump_stack_lvl+0x8/0x8 [ 668.137992][T20379] dump_stack+0x15/0x24 [ 668.142171][T20379] should_fail_ex+0x3d4/0x520 [ 668.146870][T20379] __should_failslab+0xac/0xf0 [ 668.151659][T20379] should_failslab+0x9/0x20 [ 668.156192][T20379] kmem_cache_alloc_node+0x42/0x340 [ 668.161412][T20379] ? __alloc_skb+0xdf/0x7e0 [ 668.165944][T20379] __alloc_skb+0xdf/0x7e0 [ 668.170303][T20379] inet_netconf_notify_devconf+0x169/0x220 [ 668.176137][T20379] inetdev_event+0x831/0x10e0 [ 668.180846][T20379] ? __cfi_inetdev_event+0x10/0x10 [ 668.185997][T20379] ? arp_netdev_event+0xd4/0x2b0 [ 668.190965][T20379] raw_notifier_call_chain+0xa1/0x110 [ 668.196554][T20379] unregister_netdevice_many+0xf8f/0x1820 [ 668.202304][T20379] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 668.208482][T20379] ? selinux_capable+0x29c/0x380 [ 668.213450][T20379] ? __cfi_selinux_capable+0x10/0x10 [ 668.218767][T20379] ? __kasan_check_read+0x11/0x20 [ 668.223821][T20379] unregister_netdevice_queue+0x31c/0x360 [ 668.229645][T20379] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 668.235914][T20379] ? memcpy+0x56/0x70 [ 668.239925][T20379] vti6_siocdevprivate+0x305/0xd20 [ 668.245067][T20379] ? __cfi_vti6_siocdevprivate+0x10/0x10 [ 668.250721][T20379] ? __mutex_lock+0x2bf/0x16d0 [ 668.255508][T20379] ? full_name_hash+0xba/0xf0 [ 668.260216][T20379] dev_ifsioc+0xbc4/0xed0 [ 668.264563][T20379] ? ioctl_has_perm+0x391/0x4c0 [ 668.269432][T20379] ? dev_ioctl+0xd10/0xd10 [ 668.273864][T20379] ? __mutex_lock_slowpath+0xe/0x10 [ 668.279092][T20379] ? mutex_lock+0xf8/0x1a0 [ 668.283531][T20379] ? __cfi_mutex_lock+0x10/0x10 [ 668.288406][T20379] ? dev_get_by_name_rcu+0xe5/0x130 [ 668.293628][T20379] dev_ioctl+0x5f3/0xd10 [ 668.297882][T20379] sock_ioctl+0x675/0x6e0 [ 668.302231][T20379] ? __cfi_sock_ioctl+0x10/0x10 [ 668.307099][T20379] ? security_file_ioctl+0x95/0xc0 [ 668.312233][T20379] ? __cfi_sock_ioctl+0x10/0x10 [ 668.317098][T20379] __se_sys_ioctl+0x12f/0x1b0 [ 668.321805][T20379] __x64_sys_ioctl+0x7b/0x90 [ 668.326420][T20379] x64_sys_call+0x58b/0x9a0 [ 668.330939][T20379] do_syscall_64+0x4c/0xa0 [ 668.335371][T20379] ? clear_bhb_loop+0x15/0x70 [ 668.340065][T20379] ? clear_bhb_loop+0x15/0x70 [ 668.344758][T20379] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 668.350687][T20379] RIP: 0033:0x7f8da1d8e969 [ 668.355124][T20379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 668.374747][T20379] RSP: 002b:00007f8da2b23038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 668.383622][T20379] RAX: ffffffffffffffda RBX: 00007f8da1fb5fa0 RCX: 00007f8da1d8e969 [ 668.391618][T20379] RDX: 0000200000000080 RSI: 00000000000089f2 RDI: 0000000000000007 [ 668.399609][T20379] RBP: 00007f8da2b23090 R08: 0000000000000000 R09: 0000000000000000 [ 668.407597][T20379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 668.415579][T20379] R13: 0000000000000000 R14: 00007f8da1fb5fa0 R15: 00007ffc29988ed8 [ 668.423574][T20379] [ 668.529422][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 669.255335][T20404] bridge0: port 1(bridge_slave_0) entered blocking state [ 669.266525][T20404] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.274128][T20404] device bridge_slave_0 entered promiscuous mode [ 669.330229][T20404] bridge0: port 2(bridge_slave_1) entered blocking state [ 669.339609][T20404] bridge0: port 2(bridge_slave_1) entered disabled state [ 669.347236][T20404] device bridge_slave_1 entered promiscuous mode [ 669.707374][ T43] device erspan0 left promiscuous mode [ 669.712948][ T43] GPL: port 1(erspan0) entered disabled state [ 669.819564][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 669.834941][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 669.891745][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 669.922881][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 669.931568][T15685] bridge0: port 1(bridge_slave_0) entered blocking state [ 669.938645][T15685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 669.986896][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 670.023088][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 670.064798][T15685] bridge0: port 2(bridge_slave_1) entered blocking state [ 670.071950][T15685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 670.125588][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 670.163622][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 670.205674][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 670.272798][ T43] device veth0_vlan left promiscuous mode [ 670.728043][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 670.823207][T20452] FAULT_INJECTION: forcing a failure. [ 670.823207][T20452] name failslab, interval 1, probability 0, space 0, times 0 [ 670.835968][T20452] CPU: 1 PID: 20452 Comm: syz.7.6198 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 670.847355][T20452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 670.857404][T20452] Call Trace: [ 670.860679][T20452] [ 670.863611][T20452] __dump_stack+0x21/0x24 [ 670.867950][T20452] dump_stack_lvl+0xee/0x150 [ 670.872572][T20452] ? __cfi_dump_stack_lvl+0x8/0x8 [ 670.877625][T20452] dump_stack+0x15/0x24 [ 670.881814][T20452] should_fail_ex+0x3d4/0x520 [ 670.886502][T20452] __should_failslab+0xac/0xf0 [ 670.891284][T20452] should_failslab+0x9/0x20 [ 670.895785][T20452] kmem_cache_alloc_node+0x42/0x340 [ 670.900981][T20452] ? __alloc_skb+0xdf/0x7e0 [ 670.905482][T20452] __alloc_skb+0xdf/0x7e0 [ 670.909807][T20452] inet6_netconf_notify_devconf+0x107/0x1c0 [ 670.915693][T20452] addrconf_ifdown+0x1603/0x1910 [ 670.920639][T20452] ? addrconf_cleanup+0x130/0x130 [ 670.925673][T20452] ? __kasan_check_write+0x14/0x20 [ 670.930858][T20452] ? mutex_unlock+0x89/0x220 [ 670.935460][T20452] ? __cfi_mutex_unlock+0x10/0x10 [ 670.940494][T20452] ? _raw_spin_lock+0x8e/0xe0 [ 670.945169][T20452] ? __cfi__raw_spin_lock+0x10/0x10 [ 670.950366][T20452] addrconf_notify+0x39f/0xe40 [ 670.955130][T20452] ? ip6mr_device_event+0x1e7/0x200 [ 670.960324][T20452] raw_notifier_call_chain+0xa1/0x110 [ 670.965704][T20452] unregister_netdevice_many+0xf8f/0x1820 [ 670.971419][T20452] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 670.977566][T20452] ? selinux_capable+0x29c/0x380 [ 670.982504][T20452] ? __cfi_selinux_capable+0x10/0x10 [ 670.987785][T20452] ? __pv_queued_spin_lock_slowpath+0x889/0xc40 [ 670.994042][T20452] ? __kasan_check_read+0x11/0x20 [ 670.999066][T20452] unregister_netdevice_queue+0x31c/0x360 [ 671.004780][T20452] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 671.011015][T20452] ? memcpy+0x56/0x70 [ 671.014999][T20452] vti6_siocdevprivate+0x305/0xd20 [ 671.020109][T20452] ? __cfi_vti6_siocdevprivate+0x10/0x10 [ 671.025743][T20452] ? __mutex_lock+0x47a/0x16d0 [ 671.030505][T20452] ? full_name_hash+0xba/0xf0 [ 671.035182][T20452] dev_ifsioc+0xbc4/0xed0 [ 671.039506][T20452] ? ioctl_has_perm+0x391/0x4c0 [ 671.044353][T20452] ? dev_ioctl+0xd10/0xd10 [ 671.048770][T20452] ? __mutex_lock_slowpath+0xe/0x10 [ 671.053979][T20452] ? mutex_lock+0xf8/0x1a0 [ 671.058401][T20452] ? __cfi_mutex_lock+0x10/0x10 [ 671.063258][T20452] ? dev_get_by_name_rcu+0xe5/0x130 [ 671.068472][T20452] dev_ioctl+0x5f3/0xd10 [ 671.072715][T20452] sock_ioctl+0x675/0x6e0 [ 671.077050][T20452] ? __cfi_sock_ioctl+0x10/0x10 [ 671.081901][T20452] ? security_file_ioctl+0x95/0xc0 [ 671.087007][T20452] ? __cfi_sock_ioctl+0x10/0x10 [ 671.091854][T20452] __se_sys_ioctl+0x12f/0x1b0 [ 671.096537][T20452] __x64_sys_ioctl+0x7b/0x90 [ 671.101129][T20452] x64_sys_call+0x58b/0x9a0 [ 671.105649][T20452] do_syscall_64+0x4c/0xa0 [ 671.110064][T20452] ? clear_bhb_loop+0x15/0x70 [ 671.114751][T20452] ? clear_bhb_loop+0x15/0x70 [ 671.119426][T20452] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 671.125323][T20452] RIP: 0033:0x7f2e8018e969 [ 671.129741][T20452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 671.149340][T20452] RSP: 002b:00007f2e80f1e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 671.157750][T20452] RAX: ffffffffffffffda RBX: 00007f2e803b5fa0 RCX: 00007f2e8018e969 [ 671.165721][T20452] RDX: 0000200000000080 RSI: 00000000000089f2 RDI: 0000000000000007 [ 671.173685][T20452] RBP: 00007f2e80f1e090 R08: 0000000000000000 R09: 0000000000000000 [ 671.181653][T20452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 671.189620][T20452] R13: 0000000000000000 R14: 00007f2e803b5fa0 R15: 00007ffe715808e8 [ 671.197594][T20452] [ 671.206327][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 671.214493][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 671.263409][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 671.292336][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 671.316376][T20404] device veth0_vlan entered promiscuous mode [ 671.392285][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 671.414778][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 671.478042][T20404] device veth1_macvtap entered promiscuous mode [ 671.515173][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 671.533197][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 671.563438][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 671.618129][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 671.657008][T15666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 672.385729][T20475] device wg2 entered promiscuous mode [ 678.290760][T20541] device wg2 left promiscuous mode [ 678.356488][T20548] device wg2 entered promiscuous mode [ 680.779888][T20609] bond_slave_1: mtu less than device minimum [ 680.794843][T20601] device veth1_to_batadv entered promiscuous mode [ 681.139815][T20626] device veth0_vlan left promiscuous mode [ 681.187896][T20626] device veth0_vlan entered promiscuous mode [ 681.279405][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 681.290770][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 681.298502][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 682.349692][T20685] device wg2 left promiscuous mode [ 683.088654][T20701] bridge0: port 1(bridge_slave_0) entered blocking state [ 683.105612][T20701] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.121175][T20701] device bridge_slave_0 entered promiscuous mode [ 683.157026][T20701] bridge0: port 2(bridge_slave_1) entered blocking state [ 683.164093][T20701] bridge0: port 2(bridge_slave_1) entered disabled state [ 683.179074][T20701] device bridge_slave_1 entered promiscuous mode [ 683.995687][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 684.004703][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 684.012420][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 684.021203][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 684.029597][T15667] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.036709][T15667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 684.044305][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 684.052542][T20746] device pim6reg1 entered promiscuous mode [ 684.137018][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 684.145520][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 684.156433][T15667] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.163585][T15667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 684.172217][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 684.180527][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 684.189128][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 684.198336][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 684.240948][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 684.262857][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 684.282292][T20701] device veth0_vlan entered promiscuous mode [ 684.323483][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 684.333349][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 684.376537][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 684.384170][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 684.436374][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 684.444958][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 684.563327][ T43] device gretap0 left promiscuous mode [ 684.610126][ T43] GPL: port 1(gretap0) entered disabled state [ 684.652546][T20701] device veth1_macvtap entered promiscuous mode [ 684.785457][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 684.794720][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 684.823194][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 684.832064][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 684.903857][ T43] device veth1_macvtap left promiscuous mode [ 684.910086][ T43] device veth0_vlan left promiscuous mode [ 685.604419][T20778] device veth1_macvtap left promiscuous mode [ 685.748645][T20778] device veth1_macvtap entered promiscuous mode [ 685.755358][T20778] device macsec0 entered promiscuous mode [ 685.770742][T20783] tun0: tun_chr_ioctl cmd 1074025677 [ 685.776236][T20783] tun0: linktype set to 769 [ 687.540526][T20839] FAULT_INJECTION: forcing a failure. [ 687.540526][T20839] name failslab, interval 1, probability 0, space 0, times 0 [ 687.696205][T20839] CPU: 0 PID: 20839 Comm: syz.8.6324 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 687.707632][T20839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 687.717702][T20839] Call Trace: [ 687.720995][T20839] [ 687.723934][T20839] __dump_stack+0x21/0x24 [ 687.728290][T20839] dump_stack_lvl+0xee/0x150 [ 687.732903][T20839] ? __cfi_dump_stack_lvl+0x8/0x8 [ 687.737947][T20839] ? format_decode+0xbdc/0x1520 [ 687.742826][T20839] dump_stack+0x15/0x24 [ 687.747001][T20839] should_fail_ex+0x3d4/0x520 [ 687.751702][T20839] __should_failslab+0xac/0xf0 [ 687.756489][T20839] should_failslab+0x9/0x20 [ 687.761028][T20839] kmem_cache_alloc_node+0x42/0x340 [ 687.766253][T20839] ? __alloc_skb+0xdf/0x7e0 [ 687.770796][T20839] __alloc_skb+0xdf/0x7e0 [ 687.775150][T20839] alloc_uevent_skb+0x85/0x240 [ 687.779933][T20839] ? __cfi_netdev_queue_namespace+0x10/0x10 [ 687.785844][T20839] kobject_uevent_net_broadcast+0x1b4/0x5b0 [ 687.791763][T20839] kobject_uevent_env+0x54f/0x730 [ 687.796815][T20839] kobject_uevent+0x1d/0x30 [ 687.801340][T20839] __kobject_del+0xd7/0x2f0 [ 687.805875][T20839] kobject_put+0x1ee/0x280 [ 687.810320][T20839] netdev_queue_update_kobjects+0x3db/0x470 [ 687.816235][T20839] netdev_unregister_kobject+0x112/0x250 [ 687.821897][T20839] unregister_netdevice_many+0x135b/0x1820 [ 687.827727][T20839] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 687.833906][T20839] ? selinux_capable+0x29c/0x380 [ 687.838879][T20839] ? __cfi_selinux_capable+0x10/0x10 [ 687.844197][T20839] ? finish_task_switch+0x209/0x7b0 [ 687.849430][T20839] ? __kasan_check_read+0x11/0x20 [ 687.854491][T20839] unregister_netdevice_queue+0x31c/0x360 [ 687.860234][T20839] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 687.866500][T20839] ? memcpy+0x56/0x70 [ 687.870506][T20839] vti6_siocdevprivate+0x305/0xd20 [ 687.875734][T20839] ? __cfi_vti6_siocdevprivate+0x10/0x10 [ 687.881390][T20839] ? __mutex_lock+0x47a/0x16d0 [ 687.886179][T20839] ? full_name_hash+0xba/0xf0 [ 687.890887][T20839] dev_ifsioc+0xbc4/0xed0 [ 687.895240][T20839] ? ioctl_has_perm+0x391/0x4c0 [ 687.900108][T20839] ? dev_ioctl+0xd10/0xd10 [ 687.904543][T20839] ? __mutex_lock_slowpath+0xe/0x10 [ 687.909777][T20839] ? mutex_lock+0xf8/0x1a0 [ 687.914227][T20839] ? __cfi_mutex_lock+0x10/0x10 [ 687.919137][T20839] ? dev_get_by_name_rcu+0xe5/0x130 [ 687.924379][T20839] dev_ioctl+0x5f3/0xd10 [ 687.928646][T20839] sock_ioctl+0x675/0x6e0 [ 687.932998][T20839] ? __cfi_sock_ioctl+0x10/0x10 [ 687.937871][T20839] ? security_file_ioctl+0x95/0xc0 [ 687.943002][T20839] ? __cfi_sock_ioctl+0x10/0x10 [ 687.947871][T20839] __se_sys_ioctl+0x12f/0x1b0 [ 687.952568][T20839] __x64_sys_ioctl+0x7b/0x90 [ 687.957185][T20839] x64_sys_call+0x58b/0x9a0 [ 687.961714][T20839] do_syscall_64+0x4c/0xa0 [ 687.966159][T20839] ? clear_bhb_loop+0x15/0x70 [ 687.970858][T20839] ? clear_bhb_loop+0x15/0x70 [ 687.975550][T20839] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 687.981468][T20839] RIP: 0033:0x7f5db518e969 [ 687.985891][T20839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 688.005507][T20839] RSP: 002b:00007f5db5f14038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 688.013951][T20839] RAX: ffffffffffffffda RBX: 00007f5db53b6080 RCX: 00007f5db518e969 [ 688.021939][T20839] RDX: 0000200000000080 RSI: 00000000000089f2 RDI: 0000000000000007 [ 688.030004][T20839] RBP: 00007f5db5f14090 R08: 0000000000000000 R09: 0000000000000000 [ 688.037981][T20839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 688.045955][T20839] R13: 0000000000000001 R14: 00007f5db53b6080 R15: 00007fff2caaa0d8 [ 688.053939][T20839] [ 688.062247][T20818] bridge0: port 1(bridge_slave_0) entered blocking state [ 688.069484][T20818] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.077232][T20818] device bridge_slave_0 entered promiscuous mode [ 688.199754][T20818] bridge0: port 2(bridge_slave_1) entered blocking state [ 688.208298][T20818] bridge0: port 2(bridge_slave_1) entered disabled state [ 688.215878][T20818] device bridge_slave_1 entered promiscuous mode [ 688.506999][T20867] device wg2 left promiscuous mode [ 688.540896][T20870] device wg2 entered promiscuous mode [ 688.745368][T20882] device sit0 entered promiscuous mode [ 688.995607][ T43] device veth1_macvtap left promiscuous mode [ 689.020010][ T43] device veth0_vlan left promiscuous mode [ 689.306066][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 689.318699][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 689.347697][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 689.393041][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 689.452499][T15667] bridge0: port 1(bridge_slave_0) entered blocking state [ 689.459981][T15667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 689.576528][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 689.620370][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 689.661128][T15667] bridge0: port 2(bridge_slave_1) entered blocking state [ 689.668240][T15667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 689.815207][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 689.838722][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 689.859512][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 689.897302][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 689.916352][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 689.973111][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 689.981677][T15667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 690.021271][T20818] device veth0_vlan entered promiscuous mode [ 690.066271][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 690.084838][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 690.097265][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 690.126013][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 690.196734][T20818] device veth1_macvtap entered promiscuous mode [ 690.227870][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 690.246471][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 690.275044][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 690.318532][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 690.347184][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 690.398306][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 690.439101][T15685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 691.538149][T20940] device syzkaller0 entered promiscuous mode [ 691.676623][T20952] device wg2 left promiscuous mode [ 691.741808][T20952] device wg2 entered promiscuous mode [ 692.606356][T20991] device veth0_vlan left promiscuous mode [ 692.632178][T20991] device veth0_vlan entered promiscuous mode [ 693.976688][T21001] device wg2 entered promiscuous mode [ 694.467466][T21029] device veth0_vlan left promiscuous mode [ 694.481663][T21029] device veth0_vlan entered promiscuous mode [ 694.612850][T21035] device veth0_vlan left promiscuous mode [ 694.633314][T21035] device veth0_vlan entered promiscuous mode [ 694.796735][T21054] device wg2 entered promiscuous mode [ 695.265344][T21065] device wg2 left promiscuous mode [ 695.314589][T21065] device wg2 entered promiscuous mode [ 695.382324][T21067] device syzkaller0 entered promiscuous mode [ 695.519058][T21079] device pim6reg1 entered promiscuous mode [ 696.149206][T21094] device veth0_vlan left promiscuous mode [ 696.179044][T21094] device veth0_vlan entered promiscuous mode [ 696.275321][T21101] device wg2 left promiscuous mode [ 696.505901][T21112] device wg2 left promiscuous mode [ 696.540540][T21115] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.857491][T21121] device syzkaller0 entered promiscuous mode [ 698.083642][T21160] device wg2 left promiscuous mode [ 698.102925][T21160] device wg2 entered promiscuous mode [ 698.854863][T21182] device wg2 entered promiscuous mode [ 699.589675][T21195] device wg2 left promiscuous mode [ 699.640188][T21195] device wg2 entered promiscuous mode [ 699.983003][T21203] FAULT_INJECTION: forcing a failure. [ 699.983003][T21203] name failslab, interval 1, probability 0, space 0, times 0 [ 700.016006][T21203] CPU: 1 PID: 21203 Comm: syz.8.6437 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 700.027432][T21203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 700.037508][T21203] Call Trace: [ 700.040798][T21203] [ 700.043735][T21203] __dump_stack+0x21/0x24 [ 700.048092][T21203] dump_stack_lvl+0xee/0x150 [ 700.052702][T21203] ? __cfi_dump_stack_lvl+0x8/0x8 [ 700.057756][T21203] dump_stack+0x15/0x24 [ 700.062020][T21203] should_fail_ex+0x3d4/0x520 [ 700.066720][T21203] __should_failslab+0xac/0xf0 [ 700.071514][T21203] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 700.077512][T21203] should_failslab+0x9/0x20 [ 700.082035][T21203] __kmem_cache_alloc_node+0x3d/0x2c0 [ 700.087427][T21203] ? __cfi_mutex_lock+0x10/0x10 [ 700.092304][T21203] ? delete_node+0x2f4/0xa60 [ 700.096920][T21203] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 700.102919][T21203] __kmalloc+0xa1/0x1e0 [ 700.107098][T21203] ? __cfi___bpf_trace_tlb_flush+0x10/0x10 [ 700.112923][T21203] tracepoint_probe_unregister+0x1e6/0x8b0 [ 700.118766][T21203] bpf_probe_unregister+0x61/0x70 [ 700.123821][T21203] bpf_raw_tp_link_release+0x63/0x90 [ 700.129127][T21203] bpf_link_free+0x13a/0x390 [ 700.133748][T21203] ? bpf_link_put_deferred+0x20/0x20 [ 700.139063][T21203] bpf_link_release+0x15f/0x170 [ 700.143944][T21203] ? __cfi_bpf_link_release+0x10/0x10 [ 700.149347][T21203] __fput+0x1fc/0x8f0 [ 700.153359][T21203] ____fput+0x15/0x20 [ 700.157361][T21203] task_work_run+0x1db/0x240 [ 700.161970][T21203] ? __cfi_task_work_run+0x10/0x10 [ 700.167101][T21203] ? filp_close+0x111/0x160 [ 700.171621][T21203] exit_to_user_mode_loop+0x9b/0xb0 [ 700.176818][T21203] exit_to_user_mode_prepare+0x5a/0xa0 [ 700.182283][T21203] syscall_exit_to_user_mode+0x1a/0x30 [ 700.187737][T21203] do_syscall_64+0x58/0xa0 [ 700.192153][T21203] ? clear_bhb_loop+0x15/0x70 [ 700.196824][T21203] ? clear_bhb_loop+0x15/0x70 [ 700.201497][T21203] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 700.207390][T21203] RIP: 0033:0x7f5db518e969 [ 700.211802][T21203] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 700.231409][T21203] RSP: 002b:00007f5db5f35038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 700.239815][T21203] RAX: 0000000000000000 RBX: 00007f5db53b5fa0 RCX: 00007f5db518e969 [ 700.247786][T21203] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 700.255750][T21203] RBP: 00007f5db5f35090 R08: 0000000000000000 R09: 0000000000000000 [ 700.263713][T21203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 700.271677][T21203] R13: 0000000000000000 R14: 00007f5db53b5fa0 R15: 00007fff2caaa0d8 [ 700.279647][T21203] [ 700.284024][T21203] CFI failure at __traceiter_tlb_flush+0x80/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0x205553a5) [ 700.295549][T21203] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 700.301606][T21203] CPU: 0 PID: 21203 Comm: syz.8.6437 Tainted: G W 6.1.134-syzkaller-00014-g3cd01bb5bd37 #0 [ 700.313045][T21203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 700.323087][T21203] RIP: 0010:__traceiter_tlb_flush+0x80/0xd0 [ 700.328980][T21203] Code: 89 f8 48 c1 e8 03 42 80 3c 28 00 74 05 e8 38 60 07 00 49 8b 7c 24 08 44 89 f6 48 8b 55 d0 41 ba 5b ac aa df 44 03 53 fc 74 02 <0f> 0b ff d3 49 83 c7 18 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 [ 700.348657][T21203] RSP: 0018:ffffc90001f778e8 EFLAGS: 00010093 [ 700.354711][T21203] RAX: 1ffff110237c39f6 RBX: ffffffff81710320 RCX: ffff888134651440 [ 700.362670][T21203] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffc900024b7000 [ 700.370638][T21203] RBP: ffffc90001f77918 R08: 0000000000000004 R09: 0000000000000003 [ 700.378594][T21203] R10: 0000000084eb1367 R11: 1ffff920003eeed0 R12: ffff88811be1cfa8 [ 700.386557][T21203] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88811be1cfa8 [ 700.394513][T21203] FS: 00007f5db5f356c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 700.403435][T21203] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 700.410016][T21203] CR2: 00005555629024a8 CR3: 00000001104ef000 CR4: 00000000003506b0 [ 700.417981][T21203] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 700.425960][T21203] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 700.433924][T21203] Call Trace: [ 700.437192][T21203] [ 700.440119][T21203] switch_mm_irqs_off+0x61f/0x980 [ 700.445152][T21203] __schedule+0x9eb/0x14e0 [ 700.449562][T21203] ? plist_add+0x3e8/0x470 [ 700.453974][T21203] ? release_firmware_map_entry+0x194/0x194 [ 700.459858][T21203] ? __cfi___futex_queue+0x10/0x10 [ 700.464960][T21203] ? futex_wait_setup+0x1b0/0x240 [ 700.469970][T21203] schedule+0xbd/0x170 [ 700.474029][T21203] futex_wait_queue+0xf5/0x230 [ 700.478786][T21203] futex_wait+0x1a3/0x750 [ 700.483117][T21203] ? __cfi_futex_wait+0x10/0x10 [ 700.487967][T21203] ? __cfi_futex_wake+0x10/0x10 [ 700.492826][T21203] ? __cfi_call_rcu+0x10/0x10 [ 700.497510][T21203] ? security_file_free+0xd8/0xf0 [ 700.502524][T21203] do_futex+0x2dc/0x420 [ 700.506681][T21203] ? percpu_counter_add_batch+0x13c/0x160 [ 700.512391][T21203] ? __cfi_do_futex+0x10/0x10 [ 700.517064][T21203] __se_sys_futex+0x273/0x2e0 [ 700.521735][T21203] ? __x64_sys_futex+0x100/0x100 [ 700.526673][T21203] ? __cfi_mem_cgroup_handle_over_high+0x10/0x10 [ 700.533004][T21203] ? filp_close+0x111/0x160 [ 700.537523][T21203] __x64_sys_futex+0xe5/0x100 [ 700.542218][T21203] x64_sys_call+0x7ec/0x9a0 [ 700.546726][T21203] do_syscall_64+0x4c/0xa0 [ 700.551145][T21203] ? clear_bhb_loop+0x15/0x70 [ 700.555829][T21203] ? clear_bhb_loop+0x15/0x70 [ 700.560515][T21203] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 700.566414][T21203] RIP: 0033:0x7f5db518e969 [ 700.570828][T21203] Code: Unable to access opcode bytes at 0x7f5db518e93f. [ 700.577827][T21203] RSP: 002b:00007f5db5f350e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 700.586224][T21203] RAX: ffffffffffffffda RBX: 00007f5db53b5fa8 RCX: 00007f5db518e969 [ 700.594274][T21203] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f5db53b5fa8 [ 700.602230][T21203] RBP: 00007f5db53b5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 700.610190][T21203] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5db53b5fac [ 700.618170][T21203] R13: 0000000000000000 R14: 00007fff2caa9ff0 R15: 00007fff2caaa0d8 [ 700.626138][T21203] [ 700.629154][T21203] Modules linked in: [ 700.633043][T21203] ---[ end trace 0000000000000000 ]--- [ 700.638479][T21203] RIP: 0010:__traceiter_tlb_flush+0x80/0xd0 [ 700.644362][T21203] Code: 89 f8 48 c1 e8 03 42 80 3c 28 00 74 05 e8 38 60 07 00 49 8b 7c 24 08 44 89 f6 48 8b 55 d0 41 ba 5b ac aa df 44 03 53 fc 74 02 <0f> 0b ff d3 49 83 c7 18 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 [ 700.663951][T21203] RSP: 0018:ffffc90001f778e8 EFLAGS: 00010093 [ 700.670011][T21203] RAX: 1ffff110237c39f6 RBX: ffffffff81710320 RCX: ffff888134651440 [ 700.677972][T21203] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffc900024b7000 [ 700.685936][T21203] RBP: ffffc90001f77918 R08: 0000000000000004 R09: 0000000000000003 [ 700.693901][T21203] R10: 0000000084eb1367 R11: 1ffff920003eeed0 R12: ffff88811be1cfa8 [ 700.701861][T21203] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88811be1cfa8 [ 700.709817][T21203] FS: 00007f5db5f356c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 700.718733][T21203] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 700.725299][T21203] CR2: 00005555629024a8 CR3: 00000001104ef000 CR4: 00000000003506b0 [ 700.733258][T21203] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 700.741215][T21203] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 700.749186][T21203] Kernel panic - not syncing: Fatal exception [ 701.901888][T21203] Shutting down cpus with NMI [ 701.906846][T21203] Kernel Offset: disabled [ 701.911179][T21203] Rebooting in 86400 seconds..