last executing test programs: 4m18.413051179s ago: executing program 4 (id=2232): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 4m18.36274555s ago: executing program 4 (id=2235): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 4m18.023045685s ago: executing program 3 (id=2242): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32], 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000001240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYRESHEX=r1], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x96000100, &(0x7f0000000140)="5826f9440e6b0d0039643573b6d2bd9ee705066bb882695ad7bdb1a8041cc9c8da9c9412edf35577f8db23ae10fda1b4891fa69706ea0202265cbbee2cdef1c32467e3a1e673ea2a453dd3ca2634598e731e3a709d03ef4e92c5c00ccc687ea3e8464977abb4cca7f8b6e8e7542aae7927b64f299154e79e069cac95", 0x7c, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="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") r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002440)={&(0x7f0000002380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3e, 0x3e, 0x8, [@datasec={0x2, 0x4, 0x0, 0xf, 0x2, [{0x5, 0x10001, 0x1}, {0x3, 0x6000000, 0x1}, {0x1, 0x3, 0x1}, {0x2, 0xbd2, 0x6}], "8d1b"}]}, {0x0, [0x0, 0x61, 0x0, 0x30, 0x0, 0x30]}}, &(0x7f0000002400)=""/29, 0x60, 0x1d, 0x2, 0x61a}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002680)={r5, 0x20, &(0x7f0000002640)={&(0x7f0000002500)=""/249, 0xf9, 0x0, &(0x7f0000002600)=""/9, 0x9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000002700)={0xe, 0x11, &(0x7f0000001280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0x6}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001340)='GPL\x00', 0x2, 0x1000, &(0x7f0000001380)=""/4096, 0x41100, 0x1, '\x00', 0x0, @sk_skb=0x26, r6, 0x8, &(0x7f0000002480)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000024c0)={0x0, 0xb, 0x10, 0x2}, 0x10, r7, r5, 0x1, 0x0, &(0x7f00000026c0)=[{0x2, 0x4, 0x6, 0x1}], 0x10, 0x6}, 0x94) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="1e031c00008c71ef2885634a8270dbd111"], 0xffdd) 4m17.993210285s ago: executing program 1 (id=2243): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000001c0)=r1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r3, 0x58, &(0x7f0000000280)}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r5}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r3}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) close(r0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2c, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) 4m17.846258648s ago: executing program 4 (id=2246): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x41}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={r1, 0xe0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000e40)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000e80)=[0x0], &(0x7f0000000ec0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xea, &(0x7f0000001140)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000f40), &(0x7f0000000f80), 0x8, 0x7e, 0x8, 0x8, &(0x7f0000000fc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000e00)={'full', 0x20, 0x1, 0x20, 0x4}, 0x2f) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20425, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25a51440, 0x0, @perf_config_ext, 0x0, 0x0, 0xa8, 0x1}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2000000}, 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.kill\x00', 0x0, 0x0) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000700)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x81, '\x00', 0x0, r4, 0x5, 0x1, 0x4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r5, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000003c0)=r4}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r4, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000840)={0x4, 0x0}, 0x8) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1d0000005ee00000010100000200000000100000", @ANYRES32=r4, @ANYBLOB="070000000054f9000000000000f4ffffff000000", @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="00000000050000000400"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x3, 0x9, &(0x7f0000000500)=@raw=[@ldst={0x0, 0x2, 0x6, 0x3, 0xa, 0x57, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x5}], &(0x7f0000000580)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, @fallback=0x1, r4, 0x8, &(0x7f00000007c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000800)={0x0, 0x5, 0xb1, 0x8}, 0x10, r8, r1, 0x8, &(0x7f0000000900)=[r9, r0, r4], &(0x7f0000000c40)=[{0x5, 0x1, 0x10, 0x1}, {0x4, 0x2, 0xc, 0x8}, {0x1, 0x2, 0x7, 0x3}, {0x1, 0x5, 0x8, 0x8}, {0x3, 0x2, 0x10, 0xb}, {0x5, 0x2, 0xf, 0x9}, {0x4, 0x200004, 0x0, 0x3}, {0x1, 0x4, 0x7, 0x1}], 0x10, 0x7}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r5, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x28, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ldst={0x1, 0x0, 0x0, 0x2, 0xa, 0x10, 0xfffffffffffffffc}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000980)='GPL\x00', 0x8, 0x47, &(0x7f0000000200)=""/71, 0x41100, 0x3, '\x00', r10, 0x0, r4, 0x8, &(0x7f0000000ac0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xd, 0x60, 0x1}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000b40)=[{0x5, 0x5, 0x0, 0xb}], 0x10, 0x9}, 0x94) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x1) perf_event_open(&(0x7f0000000d80)={0x0, 0x80, 0x1, 0x4, 0x45, 0xd, 0x0, 0xec, 0xde018, 0x17, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000940), 0x17905eb8877b8ec7}, 0x8840, 0x2, 0x2, 0x1, 0x200, 0x0, 0xbe2, 0x0, 0x9, 0x0, 0xe0}, 0x0, 0x2, r2, 0xa) 4m17.752249449s ago: executing program 4 (id=2248): openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000340)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000258e9f4fe500a6b47b0000000000001000a200000004000007020000f8ffffffb703000008000000b7040000000000008500000103130000950000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x4004743c, 0x40b942b37d0000) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) close(0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000600)=0xd, 0x18) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(r4, &(0x7f0000000000), 0x2, 0x0) 4m17.750491749s ago: executing program 0 (id=2249): perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3832, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x348, 0x2, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 4m17.68023785s ago: executing program 3 (id=2250): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240), &(0x7f0000000380), 0xd, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba", 0x3}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 4m17.66650993s ago: executing program 0 (id=2251): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000b80)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x20, &(0x7f00000007c0)={&(0x7f0000000640)=""/134, 0x86, 0x0, &(0x7f0000000700)=""/166, 0xa6}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="1e00000000000000ab0000000800000002000600", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000009c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000008c0), &(0x7f0000000980)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x14, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="18200000", @ANYRES32, @ANYBLOB="00000000050000003db3f8ffffffffff95000000000000003c52477fb3c63754d62a090000008a560c000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000"], &(0x7f00000002c0)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, @fallback=0x38, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x401, 0x401}, 0x10, r5, 0xffffffffffffffff, 0x1, &(0x7f0000000a40)=[0x1, r6, r7, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a80)=[{0x0, 0x5, 0x9, 0x1}]}, 0x94) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='syzkaller\x00', 0x9, 0xea, &(0x7f0000000780)=""/234, 0x5bd4138b3c32f8be, 0x3e, '\x00', r4, 0x19, r8, 0x8, &(0x7f0000000180)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xa, 0xfffffff1, 0x9}, 0x10, 0xbe90, r1, 0x1, 0x0, &(0x7f0000000340)=[{0x0, 0x3, 0x10}], 0x10, 0x101}, 0x94) r10 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r9}, 0x8) close(r10) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r9, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r10, r9, 0x4, r9}, 0x10) 4m17.647508751s ago: executing program 3 (id=2252): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000000bf0000000000000000008500000020000000850000007d0000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000002380)=""/192}, 0x80) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) close(r1) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000680)="e0b9547ed387dbe9abc89b6f5bff", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="0a00000016000000b400000003"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r5, @ANYBLOB="00000000000000007900000000000000180000000000000000000000000000009500000000000000870a0000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 4m17.593155602s ago: executing program 4 (id=2253): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x23}]}, 0x0, 0xfffffffe, 0x4e, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 4m17.592863802s ago: executing program 3 (id=2254): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 4m17.560114802s ago: executing program 4 (id=2255): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000640)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x152, 0x152, 0x4, [@struct={0x7, 0x5, 0x0, 0x4, 0x0, 0x4, [{0xc, 0x1, 0x6}, {0x4, 0x4, 0x2}, {0x4, 0x2, 0x5}, {0xc, 0x1, 0x800}, {0x2, 0x3, 0x9}]}, @datasec={0xc, 0x4, 0x0, 0xf, 0x2, [{0x2, 0x4, 0x7fffffff}, {0x3, 0x2, 0xf}, {0x4, 0x0, 0x7f}, {0x3, 0xb160, 0xa6c}], "b7cb"}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x0, 0x5}, {0x0, 0x4}, {0x2, 0x1}, {0x5, 0x1}, {0xd, 0x2}]}, @const={0x10, 0x0, 0x0, 0xa, 0x2}, @enum64={0x7, 0x5, 0x0, 0x13, 0x0, 0x2, [{0x4, 0xfffffffd, 0xffff1507}, {0xf, 0x1, 0x8}, {0x8, 0x400, 0x401}, {0x4, 0xfffffffe, 0x9}, {0x1, 0xbf4, 0x5}]}, @struct={0x3, 0x1, 0x0, 0x4, 0x0, 0x9, [{0x2, 0x4, 0x1}]}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x39, 0x0, 0x27, 0x2}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x4d, 0x0, 0x9, 0x2}, @ptr={0xe, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f00000001c0)=""/248, 0x170, 0xf8, 0x1, 0x217, 0x10000}, 0x28) bpf$MAP_CREATE(0x8000000000000, &(0x7f0000000300)=ANY=[@ANYBLOB="1400000004000000040000000200020000000000", @ANYRES32, @ANYBLOB="63960dbd634fd100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x50) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x8000, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000980), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x1b, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x396e}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0xe, 0x1e, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x24b5, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7430}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_val={0x18, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}, @cb_func={0x18, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @ldst={0x1, 0x3, 0x2, 0x9, 0x1, 0x2, 0x1}]}, &(0x7f0000000540)='syzkaller\x00', 0x4, 0x2d, &(0x7f00000005c0)=""/45, 0x41100, 0x2, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x3, 0x4, 0x7, 0x81}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000840)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000880)=[{0x0, 0x3, 0xe, 0x2}], 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x15, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES64=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) 4m17.428117964s ago: executing program 3 (id=2256): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000003e40)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe7bc0476619f28d99cd0aa7b73340cc2160a1fe3c184b751c51160fbce841f8a97be6148ba532e6ea09c346dfebd31a08b32808b80200000000009dd27080e71113610e10d859e8327ef03fb6c86adac12233f9a1fb9c2aec61ce63a3462fd50117b89a9bb759b4eeb8cb000067d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c972780870014605c83d7d11c3c975d5aec84222fff0d7216fdb0d3a0ec4bfae563112f4b391aafe234870072858dc06e7c337642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d0a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8e12baf5c768a40538be5f76e9c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f77b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ff010000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a30280bc586e79a5dd8076c248e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5ffff000000000000c24411d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a01377cbd3f509e6e540c9ba9c2a589ac5d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d54aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be9b0220836729028b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa8e07e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5a45706bda78ab60200000000000000000000000000000000000000706f78f0a2ea9667fb5b951808545a46830970c2dfae01adbda7d29bf1f7abdaf52e0de6f9d7150808ed086642e64ebf98762b34338b80e41b704c3eefaf0bb5f7d895de17a10b0a0ea15ccc0d7a830b6eb3596b61675511d693ef5e3c44bbf71cabc5175d879e7499f8baae2a1a09cf38da73297764fbc0e723e1cc3abb12e3076982ed32c94a2ce3e6f37c47e983da4ca5c96187db5a2a2e1742bc93a65d7187126126b3a80f17dd2f7dbbe82d104ede9ba6925afc2ee6cb94f56f1363cad635abf8f983292c49c0ebf5005154c7b58a3a2a2e5a00d2f953a86d2fd92b8661264f781e3fb02d05a28f3f17b64d0258853d45cb5ebde10cd3d82eeed2f1ed925b7cf400304932c5ed0a362b235ce37e1f17700f7d1fecf8be8a2c5d25a9c60657560d05441387ff158a018d19a286c56d0886eb59d509ee89cc2df52881d005b2e5c27563ba54e4153c132d0366a9660000000000000009c1aaec93ec0f925921fb2e9eb202a29bef28224dbabe723de5c584bc398a8792e493048c87f60a51a391e959212181d4bf32ed89c96d421c8171698c49403558fd13c649f90b0911d57eeb298b590581eba1ce383b539ab80fd15445987b1bb4eb512545e1ab65fef310e10b1ee362b51c72f82edf2f502ddf52567775e34a56d1be892f1e62b08950d517fa6fb1b0ef2edf1b67f8644786116b037d4a36fdd30b000063e58c856ec44cbbc2d370553f832af9480215e09aaa3843fe360b1c293a14627f2cfbe278f31d0abc0f5aaa10926dbbfe8a4b131c13a73d4e6d065c2c0fed3ab8442520ce0e0ad7d2d177377ab197ace3ef8b1c24ceb0bdee84bd6e6317633938dd19dc42de7f8f860eca6d9c74525fcd3497526df4c13e3ba5f0d75365a4542ae9440d2fede416d618cdaaf7e038879c5d177b3876fda4121e15a00adb976064a93e8d000000000000903350932d3eef7fdada20c19807066e2c72d0d816eb9fa50be213bf6bbb6ccb9f2e8a153e6ced68f192ebed6e86af0f2cec7335fa8039fd6eb025440bc2a34d071f0a0e6774308a2c5986aa9200a1306ffa5a71ca69e89a6980612b35fc858f37c2c398515a910a35e22ab0573c10b85df4c2972a2fb8b9c080fbb41a753791df727fdeadc5cf218a6eda31312256191c620cce34d1e3bf40a4a207ab1575b399eb8155781bfc7cb5920b49c039935a888d77041814f60fbbcafa487ee96b368e8769da90b44190e569fe8b1d155d0765baaca5c5548b5a78bb43e5d9e47a1d5809bb178184b5672d08e29aecf1f572ac1e6cab7e820751beed5f79de29a67a579150bfb31232d296b9d2977ed027ca90af7088d6466f1501d96a32bfa3cf9ab0dcd626ac9341833e92685af6917ae05473ae4768341426e244159b3c3e002b6f8ee80cbe6e26c816ab92658d956d849cd3a21ebf4b143d338035cd91f087633aa668e0644b05dc5a7937cd5fb62bd08242a858aeeda8c0cbb4fc2478a8155b859e88493f322702277939832bd4a1d8109f98c5a187564c9eb80acc63ac57459593c81ce8998e38ea231b81ebaa6b242ebdf382d70232f1d8e516a8eaf39d09ea40198cf1b72eb5ce5327d3a3861470be47a9a9dbf569e6f6f474fd1448adfd70c4f4a4487edaf193a00a808389a110a4286905ba81309735f6ac5d2ba7ab2be01fa25c11dbb3170258e9d9fed944fd85c03336a49f7016517a1988bc84ee301e167d3cf88c46c4eba6e2bfd099acd2eec5c624679aa7ebab76061a9ca792bffe3d6df4dbe70b5cab6299a51e63826fd0bda4846d06e322ebd745e73da718ba0c93e7567df9ed7ea8d2fdbde44e65a4cd01748b784d392645d013d1424c6e7f141f67ef620df8a8bac03489bf70423fa9f2c79c41d5b6496ae17718b5044c5cadb43264b290ebfcd9d5236d0b14e280fd3fcbb2fa330dcc58f44ed0b12c9299e74ea56ffefb003034230e20886f502e6df00aa138e9c8761d107bdea8d57b64345f91e055c6f52356aec1ce68e612e94224407bcf7b1df9f2aec27d44b0b9a944d16236"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000f00}, 0x2c) 4m17.346326265s ago: executing program 0 (id=2257): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x82004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x38e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000000200000000000000001"], 0xfdef) 4m17.272884606s ago: executing program 3 (id=2258): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x1, 0xf, &(0x7f0000000140)=ANY=[@ANYRESDEC=r0, @ANYRES32=r0, @ANYBLOB="000000f100000000b702000014f70a00b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf9100000000b7020000170000008500000085000000b70000000000000095000000002c478c85afbb6e652b4e881c3708cf064f7de610759527281508936dc4e08a86e4b52150ed5099abf4ffb4aa4c0d97a2be25c7b72a31612b41e2fe08fc28c72c6f93a4c822b5ca1b128a480c90d311e34de15725aeeffce1a0ac2d6bc1acdb3730"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xbd6c9365abfa708, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000982f0468000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004000009"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000001939fbd146fe6bb61100006bef3451f259d6c1590b1362b84515ab18682d3d72220e151843070000000000000065b665e774967b426d729c0c43a8ca11cfb1acdf6a57ee985af18848d16e5e603858916ea602dae460df5d9f149a1d723ffc1ba8fa829559d71d1569cb6682eae68b926dcb38607cd3d3092af45fe94230201709444c2be48e05eb8d7e6f4ec23c49579ffeefe312fb1483009b39d072979f906f294deb7f64ef45076268c924da7d12", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000280)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x83, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0x64}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='f2fs_write_end\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400000008000000010000008000000075be9921264e032b5638026019ba7f0087e70000000000004b88e90c0d0b3627c28d5b241e2ee4f380a16baa4b", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000c00)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b706000014000000b7030000000d0000b400000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b5090000000000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018260000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000010e898cb0000005608000000000000850000000000000000000600000000009500000000000000f88e37158309e0dc8947a0fe6aadaeff6b385728aef5fe52b638b253861da7afa19d050000000000000058f82cff9036785b78c5c3dd041333d420935ce19f9f674db78a0436c22b5292c3661b8c3384fa21ba9101d9e17e80abf37ea7b931da7d62de0d4071c0523a4ec9465c6e0367658b0013b085f5e03a6e0dd7cfc29c7f25c306fd3e80cef7e71c7944d0655c5a13281a754d1aa71e12d0690a64ed316f434f3dc8e8034cff244ba16194bb66626e8ab9cff2fd420b17afe5cdf0e153a082454dd689d9e3907cf639609a4147f355861a92e338b5f0aa1850d02e484dc763428f4a07e2a79571ec877a"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) 4m17.262109586s ago: executing program 2 (id=2259): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) close(r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 4m17.189686317s ago: executing program 0 (id=2260): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r5}, &(0x7f0000000200), &(0x7f0000000240)=r2}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37fe0}, 0x0) 4m17.01292599s ago: executing program 1 (id=2261): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000001f000000000000020018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f00000013c0), 0xfffffdef) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87a}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fef2000e40000200875a65969ff57b00ff020000fffffffffffffff500000001"], 0xfdef) 4m16.984621231s ago: executing program 1 (id=2262): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240)="a5cb86e15acb438d67b53ea991cb206905a3df1247d6581a8346b681cec8ecdf57cbfe00ad1bd7a0ebe63942fc699acd2cf9e4d0ae68b307c9d253be198196dd45012badf3a073c2293cb4eec9ed7e0921c0d4e1", &(0x7f0000000380), 0xd, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba", 0x3}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) 4m16.959016561s ago: executing program 0 (id=2263): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3e80}, 0x20000000) 4m16.910046312s ago: executing program 0 (id=2264): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x5) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4000}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='mm_page_alloc\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000a50000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r8, &(0x7f0000003000), 0x201, 0x0) write$cgroup_pid(r1, &(0x7f0000000980), 0x20000992) 4m16.909401242s ago: executing program 2 (id=2265): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x8, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c27", 0x39}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631380fc00082ce0db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r9, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc0f44515e696195e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r11}, 0x10) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) 4m16.909134472s ago: executing program 1 (id=2266): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 4m16.810361383s ago: executing program 1 (id=2267): socketpair(0x10, 0x80000, 0xc, &(0x7f0000000540)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000400000000000000000000000001f6f000100"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058", @ANYRES64=r0, @ANYRES64=r1, @ANYRESOCT, @ANYRES64=r1, @ANYRESOCT=r0, @ANYRESOCT=r1], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000c000000050000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1, r2}, 0x38) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = getpid() perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x2, 0x80, 0x4, 0x0, 0xfffffffffffffffa, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3, 0x5}, 0x9, 0x0, 0xd6ef, 0x5, 0x3ff, 0x7, 0x4, 0x0, 0x0, 0x0, 0x7}, r5, 0x2, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x5, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000007000000000000000800000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850022000c000000b70000000000000085100000fdffffff185700000a000000000000000000000043780c00e1ffffff9500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000740)=[r2, r2, 0xffffffffffffffff, r4, 0xffffffffffffffff], &(0x7f0000000780)=[{0x4, 0x1, 0xf, 0xb}], 0x10, 0x456}, 0x94) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c6a6700020006aa"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000400"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x4004743d, 0x110e22fff6) close(r6) close(r7) 4m16.719057325s ago: executing program 2 (id=2268): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 4m16.652859996s ago: executing program 2 (id=2269): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x6, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x6, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xc0}]}}, 0x0, 0x26, 0x0, 0x0, 0x1ff}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x1ff, 0x2, 0x0, 0x904d, r0, 0xe7, '\x00', 0x0, r1, 0x1, 0x5, 0x5, 0xc, @value=r1}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@o_path={&(0x7f0000000100)='./file0\x00', r2, 0x4000, r1}, 0x18) 4m16.578585637s ago: executing program 2 (id=2270): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x40047438, 0x110e22fff6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r2, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000600)=[0x0], &(0x7f0000000780)=[0x0], 0x0, 0x80, &(0x7f00000007c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xc6, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0x12c4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r6, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 4m16.507711208s ago: executing program 1 (id=2271): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000001c0)=r1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r3, 0x58, &(0x7f0000000280)}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r5}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r3}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) close(r0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2c, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) 4m16.403355939s ago: executing program 2 (id=2272): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0xd63f96f2ef5a7788) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000040000000600000000"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000040)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x0, 0x35, 0xe8, &(0x7f0000000000)="62e745b589f5b1d6f8f4c40a1c89223363deca90ee8c58d3219cd8bc28de23c89547ffe6aa9d89995de14437bc5e44a38bccd457c8", &(0x7f0000000280)=""/232, 0xfffffff9, 0x0, 0xdf, 0xc6, &(0x7f0000000500)="10efc8bac54374d6e6c50c3ddec40cd33388b2cf76e27d6a166b22df5196fd434f2c8e805a43eb14fff12ac20627c1021d3a7a308168c859602e2fc7eff1c87679bb73bf2ffe1332f2a51a209e0c8faa0176138ec1a6a0421d80923763d52b0a428f7eaf3e3c5fe6b4155369a78d188349406dda68c92e3c36b59399dc42a3856dd5742d8a8a64cfcd390a0e885734f0533385ffd9324bd38b9445e610d836edca9d7b274c063af2d0d2e11bdc76c674348568fa211027f79d413352c2578bd4e23f542718d094238c36712e29a976132ec112c69b92e5942a5b920440eca5", &(0x7f0000000600)="a7e5817d26b6cae46d7972daba3b8abbfd5c35b9fc36879a7c39ae9ba82c9b77f1bfb3c6cdc3f4ca3664b2632b15633caf3bc091645b2b56f740b0855e93401fdf4ee95412c54f6ca69f73df200be780695c806ec79c87ff611346fd73780a230c4a96bc03a6e1164e58d993ecd27157825297c1bde73d5bf5a38112c476cd6b1be90e0c18f41d95af4d9de3ec3d983d3da18a45e24a0a7ce2648fe4c01c01f1e937042e85a17da8dbd6008ac6ff1a1b0584b7b366cab492915c6f5b11a89b48699aef3882c7", 0x0, 0x0, 0x7ff}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x0, 0x35, 0xe8, &(0x7f0000000000)="62e745b589f5b1d6f8f4c40a1c89223363deca90ee8c58d3219cd8bc28de23c89547ffe6aa9d89995de14437bc5e44a38bccd457c8", &(0x7f0000000280)=""/232, 0xfffffff9, 0x0, 0xdf, 0xc6, &(0x7f0000000500)="10efc8bac54374d6e6c50c3ddec40cd33388b2cf76e27d6a166b22df5196fd434f2c8e805a43eb14fff12ac20627c1021d3a7a308168c859602e2fc7eff1c87679bb73bf2ffe1332f2a51a209e0c8faa0176138ec1a6a0421d80923763d52b0a428f7eaf3e3c5fe6b4155369a78d188349406dda68c92e3c36b59399dc42a3856dd5742d8a8a64cfcd390a0e885734f0533385ffd9324bd38b9445e610d836edca9d7b274c063af2d0d2e11bdc76c674348568fa211027f79d413352c2578bd4e23f542718d094238c36712e29a976132ec112c69b92e5942a5b920440eca5", &(0x7f0000000600)="a7e5817d26b6cae46d7972daba3b8abbfd5c35b9fc36879a7c39ae9ba82c9b77f1bfb3c6cdc3f4ca3664b2632b15633caf3bc091645b2b56f740b0855e93401fdf4ee95412c54f6ca69f73df200be780695c806ec79c87ff611346fd73780a230c4a96bc03a6e1164e58d993ecd27157825297c1bde73d5bf5a38112c476cd6b1be90e0c18f41d95af4d9de3ec3d983d3da18a45e24a0a7ce2648fe4c01c01f1e937042e85a17da8dbd6008ac6ff1a1b0584b7b366cab492915c6f5b11a89b48699aef3882c7", 0x0, 0x0, 0x7ff}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="090000000700000000800000010000a600000000540451e2c7c9b490265e1bc201c95b9ae637e655c55ce6a13774eb3382e096591da7c6e85f1a0349a799f5f64e3788bd773d614f9eaccaaec05c52140f02a3dad69afdc573fab900cd98c0fcb188ca591a98b7ab45a0fc9ad6ffa552e77d3626b4b2b284949136a7b0bc328b434f336140166149aa2e891b4b5f09cbc3ff59190f39c548662121c1be796c079095bd92ddd73c6aca55cd2892b6df31", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r7}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r7}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRESHEX=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000), 0x4) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000), 0x4) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) 3m59.621852584s ago: executing program 32 (id=2264): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x5) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4000}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='mm_page_alloc\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000a50000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r8, &(0x7f0000003000), 0x201, 0x0) write$cgroup_pid(r1, &(0x7f0000000980), 0x20000992) 3m59.603651094s ago: executing program 33 (id=2271): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000001c0)=r1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r3, 0x58, &(0x7f0000000280)}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r5}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r3}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) close(r0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2c, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) 3m59.579201864s ago: executing program 34 (id=2272): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0xd63f96f2ef5a7788) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000040000000600000000"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000040)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x0, 0x35, 0xe8, &(0x7f0000000000)="62e745b589f5b1d6f8f4c40a1c89223363deca90ee8c58d3219cd8bc28de23c89547ffe6aa9d89995de14437bc5e44a38bccd457c8", &(0x7f0000000280)=""/232, 0xfffffff9, 0x0, 0xdf, 0xc6, &(0x7f0000000500)="10efc8bac54374d6e6c50c3ddec40cd33388b2cf76e27d6a166b22df5196fd434f2c8e805a43eb14fff12ac20627c1021d3a7a308168c859602e2fc7eff1c87679bb73bf2ffe1332f2a51a209e0c8faa0176138ec1a6a0421d80923763d52b0a428f7eaf3e3c5fe6b4155369a78d188349406dda68c92e3c36b59399dc42a3856dd5742d8a8a64cfcd390a0e885734f0533385ffd9324bd38b9445e610d836edca9d7b274c063af2d0d2e11bdc76c674348568fa211027f79d413352c2578bd4e23f542718d094238c36712e29a976132ec112c69b92e5942a5b920440eca5", &(0x7f0000000600)="a7e5817d26b6cae46d7972daba3b8abbfd5c35b9fc36879a7c39ae9ba82c9b77f1bfb3c6cdc3f4ca3664b2632b15633caf3bc091645b2b56f740b0855e93401fdf4ee95412c54f6ca69f73df200be780695c806ec79c87ff611346fd73780a230c4a96bc03a6e1164e58d993ecd27157825297c1bde73d5bf5a38112c476cd6b1be90e0c18f41d95af4d9de3ec3d983d3da18a45e24a0a7ce2648fe4c01c01f1e937042e85a17da8dbd6008ac6ff1a1b0584b7b366cab492915c6f5b11a89b48699aef3882c7", 0x0, 0x0, 0x7ff}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x0, 0x35, 0xe8, &(0x7f0000000000)="62e745b589f5b1d6f8f4c40a1c89223363deca90ee8c58d3219cd8bc28de23c89547ffe6aa9d89995de14437bc5e44a38bccd457c8", &(0x7f0000000280)=""/232, 0xfffffff9, 0x0, 0xdf, 0xc6, &(0x7f0000000500)="10efc8bac54374d6e6c50c3ddec40cd33388b2cf76e27d6a166b22df5196fd434f2c8e805a43eb14fff12ac20627c1021d3a7a308168c859602e2fc7eff1c87679bb73bf2ffe1332f2a51a209e0c8faa0176138ec1a6a0421d80923763d52b0a428f7eaf3e3c5fe6b4155369a78d188349406dda68c92e3c36b59399dc42a3856dd5742d8a8a64cfcd390a0e885734f0533385ffd9324bd38b9445e610d836edca9d7b274c063af2d0d2e11bdc76c674348568fa211027f79d413352c2578bd4e23f542718d094238c36712e29a976132ec112c69b92e5942a5b920440eca5", &(0x7f0000000600)="a7e5817d26b6cae46d7972daba3b8abbfd5c35b9fc36879a7c39ae9ba82c9b77f1bfb3c6cdc3f4ca3664b2632b15633caf3bc091645b2b56f740b0855e93401fdf4ee95412c54f6ca69f73df200be780695c806ec79c87ff611346fd73780a230c4a96bc03a6e1164e58d993ecd27157825297c1bde73d5bf5a38112c476cd6b1be90e0c18f41d95af4d9de3ec3d983d3da18a45e24a0a7ce2648fe4c01c01f1e937042e85a17da8dbd6008ac6ff1a1b0584b7b366cab492915c6f5b11a89b48699aef3882c7", 0x0, 0x0, 0x7ff}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="090000000700000000800000010000a600000000540451e2c7c9b490265e1bc201c95b9ae637e655c55ce6a13774eb3382e096591da7c6e85f1a0349a799f5f64e3788bd773d614f9eaccaaec05c52140f02a3dad69afdc573fab900cd98c0fcb188ca591a98b7ab45a0fc9ad6ffa552e77d3626b4b2b284949136a7b0bc328b434f336140166149aa2e891b4b5f09cbc3ff59190f39c548662121c1be796c079095bd92ddd73c6aca55cd2892b6df31", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r7}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r7}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRESHEX=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000), 0x4) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000), 0x4) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) 3m59.553352945s ago: executing program 35 (id=2258): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x1, 0xf, &(0x7f0000000140)=ANY=[@ANYRESDEC=r0, @ANYRES32=r0, @ANYBLOB="000000f100000000b702000014f70a00b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf9100000000b7020000170000008500000085000000b70000000000000095000000002c478c85afbb6e652b4e881c3708cf064f7de610759527281508936dc4e08a86e4b52150ed5099abf4ffb4aa4c0d97a2be25c7b72a31612b41e2fe08fc28c72c6f93a4c822b5ca1b128a480c90d311e34de15725aeeffce1a0ac2d6bc1acdb3730"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xbd6c9365abfa708, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000982f0468000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004000009"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000001939fbd146fe6bb61100006bef3451f259d6c1590b1362b84515ab18682d3d72220e151843070000000000000065b665e774967b426d729c0c43a8ca11cfb1acdf6a57ee985af18848d16e5e603858916ea602dae460df5d9f149a1d723ffc1ba8fa829559d71d1569cb6682eae68b926dcb38607cd3d3092af45fe94230201709444c2be48e05eb8d7e6f4ec23c49579ffeefe312fb1483009b39d072979f906f294deb7f64ef45076268c924da7d12", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000280)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x83, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0x64}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='f2fs_write_end\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400000008000000010000008000000075be9921264e032b5638026019ba7f0087e70000000000004b88e90c0d0b3627c28d5b241e2ee4f380a16baa4b", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000c00)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b706000014000000b7030000000d0000b400000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b5090000000000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018260000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000010e898cb0000005608000000000000850000000000000000000600000000009500000000000000f88e37158309e0dc8947a0fe6aadaeff6b385728aef5fe52b638b253861da7afa19d050000000000000058f82cff9036785b78c5c3dd041333d420935ce19f9f674db78a0436c22b5292c3661b8c3384fa21ba9101d9e17e80abf37ea7b931da7d62de0d4071c0523a4ec9465c6e0367658b0013b085f5e03a6e0dd7cfc29c7f25c306fd3e80cef7e71c7944d0655c5a13281a754d1aa71e12d0690a64ed316f434f3dc8e8034cff244ba16194bb66626e8ab9cff2fd420b17afe5cdf0e153a082454dd689d9e3907cf639609a4147f355861a92e338b5f0aa1850d02e484dc763428f4a07e2a79571ec877a"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) 3m59.489586186s ago: executing program 36 (id=2255): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000640)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x152, 0x152, 0x4, [@struct={0x7, 0x5, 0x0, 0x4, 0x0, 0x4, [{0xc, 0x1, 0x6}, {0x4, 0x4, 0x2}, {0x4, 0x2, 0x5}, {0xc, 0x1, 0x800}, {0x2, 0x3, 0x9}]}, @datasec={0xc, 0x4, 0x0, 0xf, 0x2, [{0x2, 0x4, 0x7fffffff}, {0x3, 0x2, 0xf}, {0x4, 0x0, 0x7f}, {0x3, 0xb160, 0xa6c}], "b7cb"}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x0, 0x5}, {0x0, 0x4}, {0x2, 0x1}, {0x5, 0x1}, {0xd, 0x2}]}, @const={0x10, 0x0, 0x0, 0xa, 0x2}, @enum64={0x7, 0x5, 0x0, 0x13, 0x0, 0x2, [{0x4, 0xfffffffd, 0xffff1507}, {0xf, 0x1, 0x8}, {0x8, 0x400, 0x401}, {0x4, 0xfffffffe, 0x9}, {0x1, 0xbf4, 0x5}]}, @struct={0x3, 0x1, 0x0, 0x4, 0x0, 0x9, [{0x2, 0x4, 0x1}]}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x39, 0x0, 0x27, 0x2}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x4d, 0x0, 0x9, 0x2}, @ptr={0xe, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f00000001c0)=""/248, 0x170, 0xf8, 0x1, 0x217, 0x10000}, 0x28) bpf$MAP_CREATE(0x8000000000000, &(0x7f0000000300)=ANY=[@ANYBLOB="1400000004000000040000000200020000000000", @ANYRES32, @ANYBLOB="63960dbd634fd100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x50) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x8000, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000980), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x1b, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x396e}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0xe, 0x1e, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x24b5, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7430}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_val={0x18, 0x9, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}, @cb_func={0x18, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @ldst={0x1, 0x3, 0x2, 0x9, 0x1, 0x2, 0x1}]}, &(0x7f0000000540)='syzkaller\x00', 0x4, 0x2d, &(0x7f00000005c0)=""/45, 0x41100, 0x2, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x3, 0x4, 0x7, 0x81}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000840)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000880)=[{0x0, 0x3, 0xe, 0x2}], 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x15, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES64=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) 11.16047087s ago: executing program 9 (id=4949): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110e22fff6) write$cgroup_type(r2, &(0x7f0000000280), 0xfffffeed) 9.143451851s ago: executing program 9 (id=4949): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110e22fff6) write$cgroup_type(r2, &(0x7f0000000280), 0xfffffeed) 7.289544209s ago: executing program 5 (id=5118): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000080000000000000071397d7f000000000000ff0000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r2, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001400)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001440), &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x5b, &(0x7f00000014c0)=[{}], 0x8, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0x75, 0x8, 0x8, &(0x7f0000001580)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000780)=ANY=[@ANYRESOCT, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xd4) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0xb9, 0x10001, 0x9, 0x1, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r6, &(0x7f0000000180), &(0x7f0000000680)=""/141}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r6, &(0x7f00000000c0), &(0x7f0000000280)=""/239}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x7ffffffff000) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x1ff) 7.287847929s ago: executing program 7 (id=5120): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x8000000000000, 0x0, 0x50) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x8000, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) 7.008383913s ago: executing program 9 (id=4949): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110e22fff6) write$cgroup_type(r2, &(0x7f0000000280), 0xfffffeed) 5.179042201s ago: executing program 5 (id=5123): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000001880)=ANY=[@ANYRESOCT=0x0], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x71c6}, 0x10, 0x0, r0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) close(0x3) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0x4, 0x6, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r3}, &(0x7f00000004c0), &(0x7f0000000500)='%pi6 \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x10) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={&(0x7f0000001280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@typedef={0x7, 0x0, 0x0, 0x8, 0x5}, @restrict={0x10, 0x0, 0x0, 0xb, 0x3}, @fwd={0x2}]}}, &(0x7f0000001300)=""/91, 0x3e, 0x5b, 0x1, 0x0, 0x10000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r7, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001400)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001440), &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x5b, &(0x7f00000014c0)=[{}], 0x8, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0x75, 0x8, 0x0, 0x0}}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 5.177767531s ago: executing program 7 (id=5125): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x40047438, 0x110e22fff6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r2, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000600)=[0x0], &(0x7f0000000780)=[0x0], 0x0, 0x80, &(0x7f00000007c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xc6, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0x12c4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r6, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, r6, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 5.057296353s ago: executing program 6 (id=5128): bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x3, 0x0, &(0x7f0000000100)="e0b954", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000000, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) 4.899328975s ago: executing program 5 (id=5129): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.io_queued\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c007e0300000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000feffffff00000000"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 4.883108086s ago: executing program 9 (id=4949): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110e22fff6) write$cgroup_type(r2, &(0x7f0000000280), 0xfffffeed) 2.946990125s ago: executing program 5 (id=5130): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0xfffffffffffffffe}, 0x0, 0x3, 0x0, 0x0, 0xe60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xfd85}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c13c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRESHEX=r4, @ANYRES32, @ANYBLOB="83746aa1998f6f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x18) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_freezer_state(r6, &(0x7f0000000140), 0x2, 0x0) r8 = openat$cgroup_procs(r6, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r7, &(0x7f0000000400)='FROZEN\x00', 0x7) write$cgroup_freezer_state(r7, &(0x7f0000000200)='THAWED\x00', 0x7) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ecff00000000000000000000000000000200000000000000"], 0x48) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r10, 0x0, 0x0) write$cgroup_pid(r11, &(0x7f0000000980), 0x20000992) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r10, 0x58, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x5, &(0x7f0000000840)=ANY=[@ANYBLOB="18400000fcffffff000000000000000018640000100000000000000008000000950000000000000045b98874c0c1a8fb069bf02bf82cd58278ec8faf9157c5eacc53e28419d674273a8772e382abe579bc3b5bf86fa28ac6d50f0b90dbed77edd6"], &(0x7f0000000300)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x1, '\x00', r12, @fallback=0x2b, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x6, 0x7}, 0x10, r13, r11, 0x0, &(0x7f0000000600)=[r10, r11, r10, r9, r10, r9, r10, 0xffffffffffffffff, r11]}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2a, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES32=r10], 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.944634515s ago: executing program 6 (id=5131): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x1, 0x0, 0x5, 0x8000000000000000, 0x0, 0x100d}, 0xffffffffffffffff, 0x2000000000000, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff0000", @ANYRES32=0x1, @ANYRES32=0x0], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000200), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x0, 0x1}, 0x18208, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 2.935796505s ago: executing program 7 (id=5132): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="760a0000000000006111980000000000180000000000000000000000000400009500000000000000e7e2f2390746015efcd5ac36b31741d4399ff6dc4cc5e0592c49"], &(0x7f0000000000)='GPL\x00'}, 0x80) 2.872446746s ago: executing program 7 (id=5134): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) (fail_nth: 51) 2.870813516s ago: executing program 8 (id=5135): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x8000000000000, 0x0, 0x50) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x8000, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) 2.472983192s ago: executing program 9 (id=4949): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110e22fff6) write$cgroup_type(r2, &(0x7f0000000280), 0xfffffeed) 416.365143ms ago: executing program 5 (id=5136): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001dc0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x10000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r4, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x0, 0x1a, &(0x7f0000000880)=[{}], 0x8, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x32, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xe, 0xa, &(0x7f0000000280)=@raw=[@ldst={0x0, 0x3, 0x6, 0x3, 0x0, 0x6, 0x9}, @exit, @alu={0x7, 0x0, 0x1b, 0x9, 0x7, 0x2, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5867, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000000)='GPL\x00', 0x200, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x1c, r4, 0x8, &(0x7f0000000600)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xf, 0x1, 0x400}, 0x10, r7, r3, 0x3, &(0x7f0000000ac0)=[r4, r4, r5, r5, r5, r6], &(0x7f0000000b00)=[{0x1, 0x4, 0x10, 0x1}, {0x5, 0x3, 0x7, 0xf}, {0x1, 0x5, 0x0, 0x5}], 0x10, 0x1}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x18) 415.464633ms ago: executing program 6 (id=5137): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x82004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x38e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea031100fe08000e40000200875a65969ff57b00ff020000000020000000000000000001"], 0xfdef) 415.293953ms ago: executing program 7 (id=5138): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000220000000000000071122100000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 414.446863ms ago: executing program 8 (id=5139): openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000340)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000258e9f4fe500a6b47b0000000000001000a200000004000007020000f8ffffffb703000008000000b7040000000000008500000103130000950000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x2) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r4, 0x4004743c, 0x40b942b37d0000) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) close(0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r5, &(0x7f0000000600)=0xd, 0x18) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0xf6ffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 320.740415ms ago: executing program 7 (id=5140): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800001000000000000fd6533b04b", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8912, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, 0x0, 0x129800, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x3}, 0x0, 0xc884, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0x0, r6, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 320.120755ms ago: executing program 8 (id=5141): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xe}, 0x8, 0xc8, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedbf790700117df37538e486dd6317ce22800000000000000000000000000004007fc5f603ff65ec5deb000071673fa79d93014b8e7781c2"], 0xfdef) 319.800335ms ago: executing program 6 (id=5142): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="b0ff04c66b0d698cb89e2fe086dd1f74ffff06000000fe80000080040000ac14140746647b7954c4c06b580febc28eb143d0f6c0bad62c67a04402ba4125c7024f63fdb0b6c8ee826b4dfe6042a2f057c66cad677d850ea9928bcfcb47e585e427746ed3b27c40060cbd030a6d675c9926af53cd3085b24f9b7a486775c4f284f8c5a572ca115bce90c0ee9d4e7a07f5f1518092cb1f156694036f6618a59196631e6303fd5307d1112601d3641c9492f7dc3503416836b14590c53b1fc1ac149b70cc1142d6bc57fc3a76839fa2f96878b520fedfb9f64d81584a2e85ab4f6ec718b02d78f2ebf04e6b3b94610a21616181629a03c3dc0bf05e0a71f887833b81db7a10bc53259cb80716f6804934a411d424c1db98d454be1adb2776fdbb92b299d3b80af6987a871b4549fdb4c8297ee31ad925c8b0fb1a9d2589b08ed52602cbc26b56df71201bc4ea8621c56f33d251c1d4589af2dcd78fbb4e34bde02cb3920a30cee9489ee72c3e19304c16c2110e1839712d484b80abe77786a7e2ba834874a4e16b93dd07297554a06c2ad2c906f8ebb1db8730df096709184728d48f0a806696bd0d4b12d0064b933d9675353dae77fe8419451f85da63be78b70ca2a84a77f572d9f289d4313e6f6039fe756ac13a5d08838315dff44cda433cc7bc6b77449f8c", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 300.786265ms ago: executing program 8 (id=5143): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='mlxsw_sp_acl_tcam_vregion_migrate\x00'}, 0x18) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x15, &(0x7f00000002c0)=[{}], 0x8, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x7d, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0xa, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{0xb, 0x9}, {0x6, 0x1}, {0x9, 0x6}, {0x10, 0x6}, {0x0, 0x3}]}, @type_tag={0xa, 0x0, 0x0, 0x12, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0xfffffffe}}]}, {0x0, [0x0, 0x0, 0x5f, 0x5f, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000580)=""/210, 0x7a, 0xd2, 0x0, 0x5, 0x10000}, 0x28) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={0xffffffffffffffff}, 0x4) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xc, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x3}, 0x50) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={0x0, 0xc54, 0x18}, 0xc) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x1b, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9c1e, 0x0, 0x0, 0x0, 0x5}, [@map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0x7a, &(0x7f0000000180)=""/122, 0x41000, 0x9, '\x00', r2, @fallback=0x7, r3, 0x8, &(0x7f00000006c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x6, 0x9, 0x3214}, 0x10, 0x0, r4, 0x2, &(0x7f0000000840)=[r5, r6], &(0x7f0000000880)=[{0x4, 0x5, 0x1, 0xb}, {0x4, 0x4, 0xc, 0x9}], 0x10, 0x4}, 0x94) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000980)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c80)={r4, 0xe0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000009c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0, 0x0], 0x0, 0xb0, &(0x7f0000000a80)=[{}], 0x8, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0x41, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000cc0)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0x3, '\x00', r9, r3, 0x0, 0x0, 0x5}, 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x1d, 0xf, &(0x7f0000000d40)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}], &(0x7f0000000dc0)='GPL\x00', 0x6, 0xd2, &(0x7f0000000e00)=""/210, 0x41100, 0x50, '\x00', r2, @lsm=0x1b, r3, 0x8, &(0x7f0000000f00)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000f40)={0x2, 0xb, 0x0, 0x3}, 0x10, 0x0, r7, 0x7, &(0x7f0000000f80)=[r1, 0x1], &(0x7f0000000fc0)=[{0x4, 0x2, 0x8, 0x4}, {0x4, 0x2, 0x3, 0x5}, {0x2, 0x3, 0x7, 0x9}, {0x2, 0x2, 0x10, 0x7}, {0x5, 0x2, 0x5, 0x3}, {0x3, 0x3, 0xe, 0x3}, {0x4, 0x4, 0x8, 0xb}], 0x10, 0x9}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001180)={{r5, 0xffffffffffffffff}, &(0x7f0000001100), &(0x7f0000001140)=r12}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002380)=@bpf_lsm={0x1d, 0xf, &(0x7f00000011c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r13}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x4, 0x0, 0x0, 0xa, 0xb, 0xfffffffffffffff4, 0xfffffffffffffffc}], &(0x7f0000001240)='syzkaller\x00', 0xffffffff, 0x1000, &(0x7f0000001280)=""/4096, 0x100, 0x1, '\x00', r9, 0x1b, r3, 0x8, &(0x7f0000002280)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000022c0)={0x1, 0xe, 0x8001, 0x3}, 0x10, r10, 0x0, 0x4, &(0x7f0000002300)=[r5], &(0x7f0000002340)=[{0x2, 0x5, 0x7, 0x5}, {0x1, 0x3, 0xc, 0x4}, {0x3, 0x2, 0xb}, {0x2, 0x1, 0x10, 0xb}], 0x10, 0xe}, 0x94) r14 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002480)=@generic={&(0x7f0000002440)='./file0\x00'}, 0x18) close(r14) close(r8) r15 = bpf$MAP_CREATE(0x0, &(0x7f00000024c0)=@bloom_filter={0x1e, 0x6, 0xeb, 0x10001, 0x10008, r5, 0x7fffffff, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x2, 0xf, @void, @value, @value=r0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002780)={r5, 0x58, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000028c0)={0x4, 0x28, &(0x7f0000002540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x8}, @alu={0x7, 0x0, 0x7, 0xa, 0x6, 0x30, 0x10}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r15}}, @alu={0x7, 0x1, 0x4, 0x7, 0x4, 0x10, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002680)='GPL\x00', 0x3, 0x35, &(0x7f00000026c0)=""/53, 0x40f00, 0x6, '\x00', r16, @fallback=0x26, r3, 0x8, &(0x7f00000027c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000002800)={0x1, 0x10, 0x7}, 0x10, 0xffffffffffffffff, r7, 0x1, &(0x7f0000002840)=[r15, r15, r6], &(0x7f0000002880)=[{0x1, 0x4, 0x5, 0x1}], 0x10, 0x4da5}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000002980)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000029c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xfff) r20 = openat$tun(0xffffffffffffff9c, &(0x7f0000002a00), 0x40180, 0x0) ioctl$TUNATTACHFILTER(r20, 0x401054d5, &(0x7f0000002a80)={0x1, &(0x7f0000002a40)=[{0x2, 0xcf, 0x60, 0x1000}]}) write$cgroup_int(r13, &(0x7f0000002ac0)=0x5, 0x12) sendmsg$tipc(r17, &(0x7f0000002e40)={&(0x7f0000002b00)=@name={0x1e, 0x2, 0x0, {{0x40, 0x3}, 0x1}}, 0x10, &(0x7f0000002dc0)=[{&(0x7f0000002b40)="9cac874508951667da1c4f943690b524e972175d4864f3a1625d7c48cf44de50bdd27b5976f0dc3e3aa6ccde5921aae4f151fd6cc6a4b2b5caa67acab8050392a3e3cc2fa68f9723694a6d12dcb3a6a60a3af068e5a2fb73784e777cce956c03f5db5b115216573505c2579fb97ca8cb9e1714f591531ddd8e29a0478a6bffcf2ef74cea56d64838df06ea70e68fe6a882297bea2b59ebcf07600c330a7df80565da11c821db5f5ebe46fb142b07b106efdc8f7e40fcdeccd7636bb15d7c345524be12272fe239413f033789639cc12ef9122bbad806", 0xd6}, {&(0x7f0000002c40)="8c98e6b1ab6041cef7c657a32ee29ae88dfc3c755144cde05946734752ee029b58b9d8c96329c371b71abce58956bd14f576bb6e638b985d3a8f2508f8792ed2b8d338003b4b93eddaa79f5272", 0x4d}, {&(0x7f0000002cc0)="95aea4aa69125fdc73f5c7ba227874df6556c8bbd92be5b026f571aa98bae7e7219117b2e06209fc", 0x28}, {&(0x7f0000002d00)="1b3680db4de9fb0435d31e619a333f07efce083d75ac95ddec923a77984f70247aeaf93832d555662ae67c27d77df2105f76e32d3503a270f185f35d19184571a696a24f48918f2b3512357432523530d1d4366beb9ec5d1aaf0cd26d217421559e75538d089044f5aaa9cbbe54a0543346875e332ac0fb57b5740b3bfdf03c9771d7aae051b857b1d90", 0x8a}], 0x4, &(0x7f0000002e00)="973a568deca0a4c9f606478657b002d318256cea5a20eab037108fefbf6530a6ae", 0x21, 0x4000010}, 0x40000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000003540)={r11, 0x58, &(0x7f00000034c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r18, &(0x7f0000003740)={&(0x7f0000002e80)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10, &(0x7f0000003440)=[{&(0x7f0000002ec0)="03203d68aacf884741c220f56471466366dcb20c1237fa9e78a94df4b9f4f9a7b0b6feb683f46320329d5bf79d7d3295ebf807d3b190886be2706a9af1f46421cae2f74913a9e614562933dfffb4ae87d5cb6e79d4eab8b4112cadd3b0cd5b76f5179640e548ec013eb90c9ab5a46cdedcb83faf22ba1bd2cc48afba631b936616f3c2022d28952bb01d5afb2728bdcb02753ad2f93f96965145030cd2f39a207a266eaa0cca5aa0c0565ab5f08c6c0a0438a8038a0cc393415cf400b1fc00833f8bbc8b139b3a01cb491967e6c5631740f6ae41c024ee", 0xd7}, {&(0x7f0000002fc0)="f9e21412fffeaf37a30c482b3c2f5aa990f84c2edbde17d4a105c075933446f512395556099e8f7e29050edce13fb0523e7ab73603a71bd00196ae1e17da36445e78ae3d3ba98d2a4e6927cf1c84f436be426a74625d3248143845a8fd5c9a606f13cbd57e6de07f", 0x68}, {&(0x7f0000003040)="50e3fabfbb99ff48959fce3329bf6b3fdb64088dcb099935c77088b2ba7b956f4695516ff813cf64c77f3bd8ff14459b706322821906f695b9d93ffc3d5272ef2aa9eada0abd5c4f410725a18e8c127252a38025e94f30508d52a4482a4db8c4099f0d7a7e7a06af43e51f14d83f87f07e70f0420f9eec451bc17e", 0x7b}, {&(0x7f00000030c0)="fa39bade97caad4892c582a7f051665ed4cd28f521560419a26b351f0db4fcdbf9470358564fba9aa5f1ca8e563e62f7830f11a35aaa09afab7ec84c6b03f1e3c29dfacb2120e799db305b9d8ff53f81fd1e3348cc99d03cefb2c7c6f3678001a7448c17b3fdb5edc019", 0x6a}, {&(0x7f0000003140)="29db5f527673f085d4e94b62baacca080426ddcff47353be21471ddf6b", 0x1d}, {&(0x7f0000003180)="c8edc66a1f8d1e9a51ab76928d9e6ca2ef71926a3bc723a5cbadc06d0a7b2bd76565c78ecc69e40efabcecccc35e6f2ff2d7b69739ff9196c0dd11a474c84ec5380411040277958c5a45a5af51b463d20799d8a0bb5866f9a958c94fe5ff14276fb6a322a27dbeb13927522bd40ab9db37aa1925cfdc7faea94faa5490b1fa9e3780288db5548dabe07967acad58e9bee413688bfc6354a53eb0ff40ca28012283efcfd539de9aa99c52c76d998beb097dad0c044e69b163b004be", 0xbb}, {&(0x7f0000003240)="d350a3acf56dcf608e0d7e14e74ad830dfdd1bb2ca949958341415b33722b515df06ea16c2c1cc3366ee1bf69701d3192e6755cde7a77eb3a34a2e65e19891958ae2dca52b9e4588a79ab333817235755d9239f1f2d44601ccceed90262dc891468873f107418853a259e92a266fab4525b801b3cfee5ee9eed944b8ff574125bca2780610fb40375b2bf62ff1dc79f2352f441de68d54e6725448f345ee45f08397fbc704177c1f61f4c5b2f2fe165588c7e2eb4c126837cf2ea94df6b7f2534692da4befb49633ff02c8b045400e6af1f7db89f217b75f3e68b59dd6b7eeb47d8a4c7026dadd9fe379", 0xea}, {&(0x7f0000003340)="4fce1dcd4a4dd0a794ded8eb1428175876b07eabffe1bd34fc82be5af4734ff003bbf96913ca0ea72f28aef858bbc7a7adcd7f203043798698bc8e798a182e55a358d5239303c50f09c4248ab5a9b69c89cb626f6cc94d50f6b9210e4d53de106061dd008ed4c068c89811a9c8824d0fb1cdd20453d2baee10088ecd669e2980d9f58e84ad0874994ccda006a00fd6ea409f63634e93600646624e6ec2c2901bb9030c2ec0c856d6046f94f57d73140f5d9b7dadfe1c0a87051a7380c400be86d28cb29273088e3140df9fc52da28620fc7a412ced2da97a187c4d45c9ea9619b9", 0xe1}], 0x8, &(0x7f0000003580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1000}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r21, @remote, @broadcast}}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@generic={0x86, 0xf, "c64fe3453d01f0f24a129d8a25"}, @cipso={0x86, 0x32, 0x0, [{0x0, 0x5, "016d03"}, {0x5, 0xe, "83fb1134b83b176f1fcc5af7"}, {0x0, 0x6, "ce260770"}, {0x2, 0x9, "d6519e606a84bf"}, {0x0, 0xa, "a43aca2d3829271e"}]}, @lsrr={0x83, 0xf, 0x25, [@multicast1, @multicast2, @broadcast]}, @rr={0x7, 0x17, 0x62, [@multicast2, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @multicast1]}, @noop, @ssrr={0x89, 0x3, 0x8}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @local, @dev={0xac, 0x14, 0x14, 0x29}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xe}}, @ip_ttl={{0x14, 0x0, 0x2, 0x17}}, @ip_retopts={{0x74, 0x0, 0x7, {[@ssrr={0x89, 0x23, 0x66, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0x17, 0xc, [@remote, @multicast2, @private=0xa010101, @multicast2, @multicast1]}, @timestamp_addr={0x44, 0x1c, 0x5d, 0x1, 0x1, [{@multicast1, 0x200}, {@multicast1, 0x9184}, {@empty, 0x236209f5}]}, @rr={0x7, 0x7, 0xaa, [@multicast1]}, @rr={0x7, 0x7, 0xf9, [@multicast2]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80}}], 0x198}, 0x10) openat$cgroup_pressure(r19, &(0x7f0000003780)='memory.pressure\x00', 0x2, 0x0) 263.688605ms ago: executing program 6 (id=5144): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x80000, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) close(r0) 167.005327ms ago: executing program 8 (id=5145): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xe}, 0x8, 0xc8, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedbf790700117df37538e486dd6317ce22800000000000000000000000000011007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) 133.014508ms ago: executing program 8 (id=5146): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x36}, 0x41fe) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="110000000475ac57b368f9de448174ac070000ff0900fffffffffb000000fc0002411b271df095bca4fa4032900697fa67e7", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="000000000200"/28], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 72.370249ms ago: executing program 5 (id=5147): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000fe"], 0x48) 2.98791ms ago: executing program 6 (id=5148): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x12, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@jmp={0x5, 0x1, 0xa, 0x0, 0x3, 0x4, 0xffffffffffffffff}, @generic={0x2, 0x6, 0xf, 0x80, 0xff}, @ldst={0x3, 0x1, 0x0, 0x0, 0x0, 0x80, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x26, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x0, 0xd, 0xffff, 0x354af028}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000480)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{}, &(0x7f0000000980), &(0x7f0000000b40)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4000000000000006111100000000000c6000000000000009500000000000000208a17289f5cb173e472a32f2a0be752ddd9f8aa995a9de13ed38485d9148811d7f61b0e6c66ba8ad8f8a70d3c217303026a9e4b3dbd5f883b6fd71eaf9431b47920125506b03f01c5c56b105eb0e95aaaffce270a78cc057c7b56fc652a91e42259c832d639ebb5a742f0fcb02588a9e9ef442b39beef7f637324998912bf85ea7129c802c9c298945a04b98c3b5c5776f581edc7113f0000000000000000be45309f0d32ea3c391323755d26fd7e7d28d7e2112a227f0e006b61d2ef11e2752fb864382c9dae7bcf1997b2083874096eda61d1547732903d64d3d0b908000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x20, '\x00', 0x0, @sock_ops}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x41420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000083000000000000afe7839a000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) ioctl$SIOCSIFHWADDR(r8, 0x8937, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) 0s ago: executing program 9 (id=4949): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110e22fff6) write$cgroup_type(r2, &(0x7f0000000280), 0xfffffeed) kernel console output (not intermixed with test programs): veth1_to_batadv: link becomes ready [ 222.985469][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.993896][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 223.031408][ T6947] device veth1_macvtap entered promiscuous mode [ 223.247447][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 223.262735][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.271825][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.280964][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.290546][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.376347][ T9] GPL: port 1(erspan0) entered disabled state [ 223.394738][ T9] GPL: port 1(erspan0) entered disabled state [ 223.452699][ T9] device erspan0 left promiscuous mode [ 223.509821][ T9] GPL: port 1(erspan0) entered disabled state [ 223.549273][ T9] device erspan0 left promiscuous mode [ 223.602545][ T9] GPL: port 1(erspan0) entered disabled state [ 224.333028][ T9] device bridge_slave_1 left promiscuous mode [ 224.339501][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.347675][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.360473][ T9] device veth1_macvtap left promiscuous mode [ 224.366702][ T9] device veth0_vlan left promiscuous mode [ 224.388773][ T9] device veth0_vlan left promiscuous mode [ 224.406582][ T9] device veth1_macvtap left promiscuous mode [ 224.438936][ T9] device veth0_vlan left promiscuous mode [ 226.736244][ T7055] device veth0_vlan left promiscuous mode [ 226.762398][ T7055] device veth0_vlan entered promiscuous mode [ 226.838808][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.846882][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.896924][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.390340][ T7146] syzkaller0: tun_chr_ioctl cmd 35111 [ 229.727016][ T24] audit: type=1400 audit(1750957902.120:153): avc: denied { create } for pid=7213 comm="syz.8.2367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 229.829356][ T7216] FAULT_INJECTION: forcing a failure. [ 229.829356][ T7216] name failslab, interval 1, probability 0, space 0, times 0 [ 229.864378][ T7216] CPU: 1 PID: 7216 Comm: syz.8.2368 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 229.875812][ T7216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 229.885992][ T7216] Call Trace: [ 229.889317][ T7216] __dump_stack+0x21/0x24 [ 229.893666][ T7216] dump_stack_lvl+0x169/0x1d8 [ 229.898357][ T7216] ? thaw_kernel_threads+0x220/0x220 [ 229.903658][ T7216] ? show_regs_print_info+0x18/0x18 [ 229.908879][ T7216] dump_stack+0x15/0x1c [ 229.913047][ T7216] should_fail+0x3c1/0x510 [ 229.917476][ T7216] ? anon_vma_clone+0xc0/0x500 [ 229.922249][ T7216] __should_failslab+0xa4/0xe0 [ 229.927036][ T7216] should_failslab+0x9/0x20 [ 229.931561][ T7216] kmem_cache_alloc+0x3d/0x2e0 [ 229.936343][ T7216] anon_vma_clone+0xc0/0x500 [ 229.940956][ T7216] anon_vma_fork+0x8c/0x510 [ 229.945593][ T7216] copy_mm+0x95e/0x1480 [ 229.949774][ T7216] ? copy_signal+0x600/0x600 [ 229.954400][ T7216] ? __init_rwsem+0xd5/0x1c0 [ 229.959090][ T7216] ? copy_signal+0x4cb/0x600 [ 229.963695][ T7216] copy_process+0x1187/0x32c0 [ 229.968396][ T7216] ? proc_fail_nth_read+0x210/0x210 [ 229.973611][ T7216] ? __pidfd_prepare+0x150/0x150 [ 229.978563][ T7216] ? rw_verify_area+0x1c0/0x360 [ 229.983435][ T7216] ? vfs_write+0xac8/0xd60 [ 229.987867][ T7216] ? __bpf_trace_kmem_free+0x6f/0x90 [ 229.993164][ T7216] kernel_clone+0x23f/0x940 [ 229.997678][ T7216] ? kernel_write+0x3c0/0x3c0 [ 230.002388][ T7216] ? create_io_thread+0x130/0x130 [ 230.007434][ T7216] ? mutex_lock+0x8c/0xe0 [ 230.011790][ T7216] __x64_sys_clone+0x176/0x1d0 [ 230.016576][ T7216] ? __ia32_sys_vfork+0xf0/0xf0 [ 230.021444][ T7216] ? ksys_write+0x1eb/0x240 [ 230.025969][ T7216] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 230.032079][ T7216] do_syscall_64+0x31/0x40 [ 230.036540][ T7216] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 230.042441][ T7216] RIP: 0033:0x7ff8a47ff929 [ 230.046869][ T7216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 230.066492][ T7216] RSP: 002b:00007ff8a2e67fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 230.074904][ T7216] RAX: ffffffffffffffda RBX: 00007ff8a4a26fa0 RCX: 00007ff8a47ff929 [ 230.082869][ T7216] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 230.090841][ T7216] RBP: 00007ff8a2e68090 R08: 0000000000000000 R09: 0000000000000000 [ 230.099313][ T7216] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 230.107309][ T7216] R13: 0000000000000000 R14: 00007ff8a4a26fa0 R15: 00007ffff55518a8 [ 231.281569][ T7297] device veth1_macvtap left promiscuous mode [ 231.307790][ T7297] device macsec0 entered promiscuous mode [ 231.444661][ T7304] FAULT_INJECTION: forcing a failure. [ 231.444661][ T7304] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 231.485485][ T7304] CPU: 0 PID: 7304 Comm: syz.7.2400 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 231.496973][ T7304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 231.507051][ T7304] Call Trace: [ 231.510372][ T7304] __dump_stack+0x21/0x24 [ 231.514715][ T7304] dump_stack_lvl+0x169/0x1d8 [ 231.519489][ T7304] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 231.525656][ T7304] ? show_regs_print_info+0x18/0x18 [ 231.530956][ T7304] ? dump_stack+0x9/0x1c [ 231.535209][ T7304] dump_stack+0x15/0x1c [ 231.539371][ T7304] should_fail+0x3c1/0x510 [ 231.543800][ T7304] should_fail_usercopy+0x1a/0x20 [ 231.548840][ T7304] _copy_from_user+0x20/0xd0 [ 231.553520][ T7304] generic_map_update_batch+0x450/0x740 [ 231.559076][ T7304] ? bpf_enable_instrumentation+0x50/0x50 [ 231.564806][ T7304] ? __fdget+0x1a1/0x230 [ 231.569059][ T7304] ? bpf_enable_instrumentation+0x50/0x50 [ 231.574785][ T7304] bpf_map_do_batch+0x463/0x5f0 [ 231.579642][ T7304] __se_sys_bpf+0x55a/0x680 [ 231.584148][ T7304] ? __x64_sys_bpf+0x90/0x90 [ 231.588775][ T7304] ? debug_smp_processor_id+0x17/0x20 [ 231.594158][ T7304] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 231.600228][ T7304] __x64_sys_bpf+0x7b/0x90 [ 231.604650][ T7304] do_syscall_64+0x31/0x40 [ 231.609075][ T7304] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 231.614971][ T7304] RIP: 0033:0x7f80071c4929 [ 231.619409][ T7304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 231.639272][ T7304] RSP: 002b:00007f800582d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 231.647713][ T7304] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 231.655692][ T7304] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 231.663772][ T7304] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 231.671762][ T7304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 231.679741][ T7304] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 [ 234.191184][ T7442] device syzkaller0 entered promiscuous mode [ 234.612916][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.113897][ T7471] device syzkaller0 entered promiscuous mode [ 235.210569][ T1459] syzkaller0: tun_net_xmit 48 [ 235.297801][ T7471] syzkaller0: tun_net_xmit 1280 [ 235.304241][ T7471] syzkaller0: create flow: hash 198664947 index 1 [ 235.349433][ T7470] syzkaller0: delete flow: hash 198664947 index 1 [ 235.869328][ T7486] device pim6reg1 entered promiscuous mode [ 236.906203][ T7504] device syzkaller0 entered promiscuous mode [ 236.942020][ T7514] device syzkaller0 entered promiscuous mode [ 237.246077][ T7537] device veth1_macvtap left promiscuous mode [ 237.319206][ T7537] device macsec0 entered promiscuous mode [ 238.702688][ T7592] device sit0 entered promiscuous mode [ 238.844323][ T7598] FAULT_INJECTION: forcing a failure. [ 238.844323][ T7598] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 238.877848][ T7598] CPU: 0 PID: 7598 Comm: syz.7.2509 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 238.889177][ T7598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 238.899244][ T7598] Call Trace: [ 238.902537][ T7598] __dump_stack+0x21/0x24 [ 238.906864][ T7598] dump_stack_lvl+0x169/0x1d8 [ 238.911536][ T7598] ? show_regs_print_info+0x18/0x18 [ 238.916785][ T7598] ? irq_exit_rcu+0x9/0x10 [ 238.921206][ T7598] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 238.927107][ T7598] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 238.933357][ T7598] dump_stack+0x15/0x1c [ 238.937515][ T7598] should_fail+0x3c1/0x510 [ 238.941929][ T7598] should_fail_usercopy+0x1a/0x20 [ 238.946943][ T7598] _copy_from_user+0x20/0xd0 [ 238.951531][ T7598] generic_map_update_batch+0x4a4/0x740 [ 238.957071][ T7598] ? bpf_enable_instrumentation+0x50/0x50 [ 238.962780][ T7598] ? __fdget+0x1a1/0x230 [ 238.967016][ T7598] ? bpf_enable_instrumentation+0x50/0x50 [ 238.972721][ T7598] bpf_map_do_batch+0x463/0x5f0 [ 238.977576][ T7598] __se_sys_bpf+0x55a/0x680 [ 238.982073][ T7598] ? __x64_sys_bpf+0x90/0x90 [ 238.986659][ T7598] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 238.992829][ T7598] __x64_sys_bpf+0x7b/0x90 [ 238.997249][ T7598] do_syscall_64+0x31/0x40 [ 239.001684][ T7598] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 239.007583][ T7598] RIP: 0033:0x7f80071c4929 [ 239.011997][ T7598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 239.031743][ T7598] RSP: 002b:00007f800582d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 239.040158][ T7598] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 239.048125][ T7598] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 239.056090][ T7598] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 239.064193][ T7598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 239.072163][ T7598] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 [ 243.168085][ T7789] device veth0_vlan left promiscuous mode [ 243.210718][ T7789] device veth0_vlan entered promiscuous mode [ 243.310011][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.343805][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.372881][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.521047][ T7857] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.530007][ T7857] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.597560][ T24] audit: type=1400 audit(1750957916.990:154): avc: denied { create } for pid=7856 comm="syz.5.2605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 244.899436][ T7890] FAULT_INJECTION: forcing a failure. [ 244.899436][ T7890] name failslab, interval 1, probability 0, space 0, times 0 [ 244.912497][ T7890] CPU: 1 PID: 7890 Comm: syz.7.2617 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 244.923925][ T7890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 244.933995][ T7890] Call Trace: [ 244.937305][ T7890] __dump_stack+0x21/0x24 [ 244.941850][ T7890] dump_stack_lvl+0x169/0x1d8 [ 244.946547][ T7890] ? show_regs_print_info+0x18/0x18 [ 244.951761][ T7890] dump_stack+0x15/0x1c [ 244.955926][ T7890] should_fail+0x3c1/0x510 [ 244.960378][ T7890] ? vm_area_dup+0x26/0x250 [ 244.964896][ T7890] __should_failslab+0xa4/0xe0 [ 244.969668][ T7890] should_failslab+0x9/0x20 [ 244.974174][ T7890] kmem_cache_alloc+0x3d/0x2e0 [ 244.978987][ T7890] ? __kasan_check_read+0x11/0x20 [ 244.984015][ T7890] vm_area_dup+0x26/0x250 [ 244.988344][ T7890] copy_mm+0x8b2/0x1480 [ 244.992509][ T7890] ? copy_signal+0x600/0x600 [ 244.997104][ T7890] ? __init_rwsem+0xd5/0x1c0 [ 245.001869][ T7890] ? copy_signal+0x4cb/0x600 [ 245.006468][ T7890] copy_process+0x1187/0x32c0 [ 245.011160][ T7890] ? proc_fail_nth_read+0x210/0x210 [ 245.016372][ T7890] ? __pidfd_prepare+0x150/0x150 [ 245.021314][ T7890] ? rw_verify_area+0x1c0/0x360 [ 245.026175][ T7890] ? vfs_write+0xac8/0xd60 [ 245.030601][ T7890] kernel_clone+0x23f/0x940 [ 245.035110][ T7890] ? kernel_write+0x3c0/0x3c0 [ 245.039818][ T7890] ? create_io_thread+0x130/0x130 [ 245.044846][ T7890] ? mutex_lock+0x8c/0xe0 [ 245.049185][ T7890] __x64_sys_clone+0x176/0x1d0 [ 245.053951][ T7890] ? __ia32_sys_vfork+0xf0/0xf0 [ 245.058802][ T7890] ? ksys_write+0x1eb/0x240 [ 245.063317][ T7890] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 245.069564][ T7890] do_syscall_64+0x31/0x40 [ 245.074016][ T7890] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 245.080001][ T7890] RIP: 0033:0x7f80071c4929 [ 245.084434][ T7890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.104162][ T7890] RSP: 002b:00007f800582cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 245.112606][ T7890] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 245.120601][ T7890] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 245.128605][ T7890] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 245.136603][ T7890] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 245.144597][ T7890] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 [ 247.855903][ T7969] FAULT_INJECTION: forcing a failure. [ 247.855903][ T7969] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 247.872447][ T7969] CPU: 0 PID: 7969 Comm: syz.9.2648 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 247.883756][ T7969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 247.893837][ T7969] Call Trace: [ 247.897136][ T7969] __dump_stack+0x21/0x24 [ 247.901461][ T7969] dump_stack_lvl+0x169/0x1d8 [ 247.906135][ T7969] ? show_regs_print_info+0x18/0x18 [ 247.911331][ T7969] dump_stack+0x15/0x1c [ 247.915478][ T7969] should_fail+0x3c1/0x510 [ 247.919889][ T7969] should_fail_usercopy+0x1a/0x20 [ 247.924906][ T7969] _copy_from_user+0x20/0xd0 [ 247.929516][ T7969] generic_map_update_batch+0x450/0x740 [ 247.935067][ T7969] ? bpf_enable_instrumentation+0x50/0x50 [ 247.940781][ T7969] ? __fdget+0x1a1/0x230 [ 247.945019][ T7969] ? bpf_enable_instrumentation+0x50/0x50 [ 247.950742][ T7969] bpf_map_do_batch+0x463/0x5f0 [ 247.955671][ T7969] __se_sys_bpf+0x55a/0x680 [ 247.960168][ T7969] ? __x64_sys_bpf+0x90/0x90 [ 247.964758][ T7969] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 247.970907][ T7969] __x64_sys_bpf+0x7b/0x90 [ 247.975487][ T7969] do_syscall_64+0x31/0x40 [ 247.979897][ T7969] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 247.985803][ T7969] RIP: 0033:0x7fc01857d929 [ 247.990213][ T7969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.010090][ T7969] RSP: 002b:00007fc016be6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 248.018775][ T7969] RAX: ffffffffffffffda RBX: 00007fc0187a4fa0 RCX: 00007fc01857d929 [ 248.026888][ T7969] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 248.034884][ T7969] RBP: 00007fc016be6090 R08: 0000000000000000 R09: 0000000000000000 [ 248.042864][ T7969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 248.050834][ T7969] R13: 0000000000000000 R14: 00007fc0187a4fa0 R15: 00007ffc2872e0c8 [ 251.325701][ T8158] device veth0_vlan left promiscuous mode [ 251.366188][ T8158] device veth0_vlan entered promiscuous mode [ 251.437322][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.466047][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.528061][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.048811][ T8244] FAULT_INJECTION: forcing a failure. [ 253.048811][ T8244] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 253.097804][ T8244] CPU: 0 PID: 8244 Comm: syz.5.2751 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 253.109131][ T8244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 253.119188][ T8244] Call Trace: [ 253.122513][ T8244] __dump_stack+0x21/0x24 [ 253.126847][ T8244] dump_stack_lvl+0x169/0x1d8 [ 253.131654][ T8244] ? show_regs_print_info+0x18/0x18 [ 253.136862][ T8244] ? 0xffffffffa0012f2c [ 253.141029][ T8244] ? __kernel_text_address+0xa0/0x100 [ 253.146408][ T8244] dump_stack+0x15/0x1c [ 253.150570][ T8244] should_fail+0x3c1/0x510 [ 253.154997][ T8244] should_fail_alloc_page+0x4f/0x60 [ 253.160205][ T8244] __alloc_pages_nodemask+0x109/0x5f0 [ 253.165598][ T8244] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 253.171166][ T8244] ? __kasan_slab_alloc+0xcf/0xf0 [ 253.176424][ T8244] ? anon_vma_clone+0xc0/0x500 [ 253.181208][ T8244] ? __kasan_slab_alloc+0xcf/0xf0 [ 253.186235][ T8244] ? __kasan_slab_alloc+0xbd/0xf0 [ 253.191258][ T8244] ? slab_post_alloc_hook+0x5d/0x2f0 [ 253.196542][ T8244] ? kmem_cache_alloc+0x165/0x2e0 [ 253.201565][ T8244] ? anon_vma_fork+0x200/0x510 [ 253.206510][ T8244] get_zeroed_page+0x19/0x40 [ 253.211102][ T8244] __pud_alloc+0x37/0x1a0 [ 253.215733][ T8244] copy_page_range+0x25b0/0x2870 [ 253.220761][ T8244] ? anon_vma_interval_tree_insert+0x363/0x380 [ 253.226925][ T8244] ? __kasan_check_write+0x14/0x20 [ 253.232038][ T8244] ? _raw_write_lock+0x8e/0xe0 [ 253.236805][ T8244] ? pfn_valid+0x1c0/0x1c0 [ 253.241240][ T8244] ? __kasan_check_write+0x14/0x20 [ 253.246353][ T8244] ? trace_raw_output_vm_unmapped_area+0x210/0x210 [ 253.252853][ T8244] ? _raw_write_unlock+0x2b/0x60 [ 253.257800][ T8244] copy_mm+0xc63/0x1480 [ 253.261962][ T8244] ? copy_signal+0x600/0x600 [ 253.266554][ T8244] ? __init_rwsem+0xd5/0x1c0 [ 253.271268][ T8244] ? copy_signal+0x4cb/0x600 [ 253.275904][ T8244] copy_process+0x1187/0x32c0 [ 253.280610][ T8244] ? proc_fail_nth_read+0x210/0x210 [ 253.285948][ T8244] ? __pidfd_prepare+0x150/0x150 [ 253.290899][ T8244] ? perf_event_task_tick+0xb60/0xb60 [ 253.296291][ T8244] ? vfs_write+0xac8/0xd60 [ 253.300712][ T8244] ? __kasan_slab_free+0x11/0x20 [ 253.305654][ T8244] kernel_clone+0x23f/0x940 [ 253.310167][ T8244] ? bpf_perf_event_read+0x146/0x1e0 [ 253.315458][ T8244] ? create_io_thread+0x130/0x130 [ 253.320491][ T8244] ? mutex_lock+0x8c/0xe0 [ 253.324835][ T8244] __x64_sys_clone+0x176/0x1d0 [ 253.329699][ T8244] ? __ia32_sys_vfork+0xf0/0xf0 [ 253.334559][ T8244] ? ksys_write+0x1eb/0x240 [ 253.339073][ T8244] ? __bpf_trace_sys_enter+0x62/0x70 [ 253.344369][ T8244] ? syscall_trace_enter+0x108/0x170 [ 253.349662][ T8244] do_syscall_64+0x31/0x40 [ 253.354118][ T8244] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 253.360125][ T8244] RIP: 0033:0x7fb9cb225929 [ 253.364633][ T8244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 253.384242][ T8244] RSP: 002b:00007fb9c988dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 253.392667][ T8244] RAX: ffffffffffffffda RBX: 00007fb9cb44cfa0 RCX: 00007fb9cb225929 [ 253.400788][ T8244] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 253.408768][ T8244] RBP: 00007fb9c988e090 R08: 0000000000000000 R09: 0000000000000000 [ 253.416747][ T8244] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 253.424815][ T8244] R13: 0000000000000000 R14: 00007fb9cb44cfa0 R15: 00007ffed777d518 [ 256.281641][ T8332] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 256.310238][ T8332] device syzkaller0 entered promiscuous mode [ 256.935398][ T24] audit: type=1400 audit(1750957929.330:155): avc: denied { create } for pid=8346 comm="syz.9.2786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 258.945532][ T24] audit: type=1400 audit(1750957931.340:156): avc: denied { read } for pid=8416 comm="syz.5.2812" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 258.974336][ T24] audit: type=1400 audit(1750957931.340:157): avc: denied { open } for pid=8416 comm="syz.5.2812" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 260.061569][ T8484] syz.9.2834[8484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.061660][ T8484] syz.9.2834[8484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.329575][ T8494] device veth0_vlan left promiscuous mode [ 260.388651][ T8494] device veth0_vlan entered promiscuous mode [ 260.461936][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.470484][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.490042][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.513051][ T8499] device pim6reg1 entered promiscuous mode [ 262.018712][ T8559] device syzkaller0 entered promiscuous mode [ 262.389488][ T8578] FAULT_INJECTION: forcing a failure. [ 262.389488][ T8578] name failslab, interval 1, probability 0, space 0, times 0 [ 262.438797][ T8578] CPU: 0 PID: 8578 Comm: syz.6.2868 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 262.450247][ T8578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 262.460326][ T8578] Call Trace: [ 262.463629][ T8578] __dump_stack+0x21/0x24 [ 262.467966][ T8578] dump_stack_lvl+0x169/0x1d8 [ 262.472762][ T8578] ? thaw_kernel_threads+0x220/0x220 [ 262.478111][ T8578] ? show_regs_print_info+0x18/0x18 [ 262.483328][ T8578] ? vma_interval_tree_augment_rotate+0x1f0/0x1f0 [ 262.489764][ T8578] dump_stack+0x15/0x1c [ 262.493938][ T8578] should_fail+0x3c1/0x510 [ 262.498375][ T8578] ? anon_vma_fork+0xf2/0x510 [ 262.503069][ T8578] __should_failslab+0xa4/0xe0 [ 262.507856][ T8578] should_failslab+0x9/0x20 [ 262.512376][ T8578] kmem_cache_alloc+0x3d/0x2e0 [ 262.517160][ T8578] anon_vma_fork+0xf2/0x510 [ 262.521680][ T8578] copy_mm+0x95e/0x1480 [ 262.525853][ T8578] ? copy_signal+0x600/0x600 [ 262.530458][ T8578] ? __init_rwsem+0xd5/0x1c0 [ 262.535286][ T8578] ? copy_signal+0x4cb/0x600 [ 262.540067][ T8578] copy_process+0x1187/0x32c0 [ 262.544772][ T8578] ? proc_fail_nth_read+0x210/0x210 [ 262.549989][ T8578] ? __pidfd_prepare+0x150/0x150 [ 262.554943][ T8578] ? rw_verify_area+0x1c0/0x360 [ 262.559808][ T8578] ? vfs_write+0xac8/0xd60 [ 262.564237][ T8578] ? __kasan_slab_free+0x11/0x20 [ 262.569192][ T8578] kernel_clone+0x23f/0x940 [ 262.573707][ T8578] ? kernel_write+0x3c0/0x3c0 [ 262.578396][ T8578] ? create_io_thread+0x130/0x130 [ 262.583442][ T8578] ? mutex_lock+0x8c/0xe0 [ 262.587791][ T8578] __x64_sys_clone+0x176/0x1d0 [ 262.592573][ T8578] ? __ia32_sys_vfork+0xf0/0xf0 [ 262.597445][ T8578] ? ksys_write+0x1eb/0x240 [ 262.601989][ T8578] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 262.608089][ T8578] do_syscall_64+0x31/0x40 [ 262.612536][ T8578] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 262.618447][ T8578] RIP: 0033:0x7fdf2fbce929 [ 262.622881][ T8578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 262.642509][ T8578] RSP: 002b:00007fdf2e236fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 262.650951][ T8578] RAX: ffffffffffffffda RBX: 00007fdf2fdf5fa0 RCX: 00007fdf2fbce929 [ 262.658941][ T8578] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 262.666935][ T8578] RBP: 00007fdf2e237090 R08: 0000000000000000 R09: 0000000000000000 [ 262.674924][ T8578] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 262.682927][ T8578] R13: 0000000000000000 R14: 00007fdf2fdf5fa0 R15: 00007fff42796528 [ 265.794897][ T8643] device syzkaller0 entered promiscuous mode [ 267.574035][ T8701] device veth1_macvtap left promiscuous mode [ 267.617816][ T8701] device macsec0 entered promiscuous mode [ 268.959822][ T8757] FAULT_INJECTION: forcing a failure. [ 268.959822][ T8757] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 268.980778][ T8757] CPU: 0 PID: 8757 Comm: syz.7.2924 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 268.992195][ T8757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 269.002260][ T8757] Call Trace: [ 269.005569][ T8757] __dump_stack+0x21/0x24 [ 269.009909][ T8757] dump_stack_lvl+0x169/0x1d8 [ 269.014597][ T8757] ? show_regs_print_info+0x18/0x18 [ 269.019806][ T8757] ? htab_lru_map_update_elem+0x55e/0x670 [ 269.025537][ T8757] dump_stack+0x15/0x1c [ 269.029698][ T8757] should_fail+0x3c1/0x510 [ 269.034118][ T8757] should_fail_usercopy+0x1a/0x20 [ 269.039151][ T8757] _copy_from_user+0x20/0xd0 [ 269.043755][ T8757] generic_map_update_batch+0x450/0x740 [ 269.049319][ T8757] ? irq_exit_rcu+0x9/0x10 [ 269.053840][ T8757] ? bpf_enable_instrumentation+0x50/0x50 [ 269.059563][ T8757] ? __fdget+0x1a1/0x230 [ 269.063814][ T8757] ? bpf_enable_instrumentation+0x50/0x50 [ 269.069534][ T8757] bpf_map_do_batch+0x463/0x5f0 [ 269.074389][ T8757] __se_sys_bpf+0x55a/0x680 [ 269.078894][ T8757] ? __x64_sys_bpf+0x90/0x90 [ 269.083498][ T8757] ? debug_smp_processor_id+0x17/0x20 [ 269.088877][ T8757] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 269.094950][ T8757] __x64_sys_bpf+0x7b/0x90 [ 269.099373][ T8757] do_syscall_64+0x31/0x40 [ 269.103798][ T8757] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 269.109694][ T8757] RIP: 0033:0x7f80071c4929 [ 269.114130][ T8757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 269.133750][ T8757] RSP: 002b:00007f800582d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 269.142179][ T8757] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 269.150159][ T8757] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 269.158254][ T8757] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 269.166247][ T8757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 269.174226][ T8757] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 [ 269.849597][ T8780] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.077118][ T24] audit: type=1400 audit(1750957944.470:158): avc: denied { create } for pid=8854 comm="syz.5.2954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 273.548286][ T95] udevd[95]: worker [6937] terminated by signal 33 (Unknown signal 33) [ 273.556665][ T95] udevd[95]: worker [6937] failed while handling '/devices/virtual/block/loop7' [ 273.624857][ T8924] device veth0_vlan left promiscuous mode [ 273.688600][ T8924] device veth0_vlan entered promiscuous mode [ 273.794795][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.828489][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.836137][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.359707][ T8945] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.721590][ T8958] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 274.987995][ T8971] syz.8.2998[8971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.988059][ T8971] syz.8.2998[8971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.650565][ T8996] FAULT_INJECTION: forcing a failure. [ 275.650565][ T8996] name failslab, interval 1, probability 0, space 0, times 0 [ 275.674684][ T8996] CPU: 0 PID: 8996 Comm: syz.7.3006 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 275.685983][ T8996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 275.696067][ T8996] Call Trace: [ 275.699408][ T8996] __dump_stack+0x21/0x24 [ 275.703764][ T8996] dump_stack_lvl+0x169/0x1d8 [ 275.708580][ T8996] ? thaw_kernel_threads+0x220/0x220 [ 275.713907][ T8996] ? show_regs_print_info+0x18/0x18 [ 275.719139][ T8996] dump_stack+0x15/0x1c [ 275.723319][ T8996] should_fail+0x3c1/0x510 [ 275.727779][ T8996] ? anon_vma_fork+0x200/0x510 [ 275.732578][ T8996] __should_failslab+0xa4/0xe0 [ 275.737356][ T8996] should_failslab+0x9/0x20 [ 275.741876][ T8996] kmem_cache_alloc+0x3d/0x2e0 [ 275.746671][ T8996] ? anon_vma_fork+0xf2/0x510 [ 275.751376][ T8996] anon_vma_fork+0x200/0x510 [ 275.756001][ T8996] copy_mm+0x95e/0x1480 [ 275.760176][ T8996] ? copy_signal+0x600/0x600 [ 275.764793][ T8996] ? __init_rwsem+0xd5/0x1c0 [ 275.769407][ T8996] ? copy_signal+0x4cb/0x600 [ 275.774017][ T8996] copy_process+0x1187/0x32c0 [ 275.778724][ T8996] ? proc_fail_nth_read+0x210/0x210 [ 275.783945][ T8996] ? __pidfd_prepare+0x150/0x150 [ 275.788897][ T8996] ? rw_verify_area+0x1c0/0x360 [ 275.793896][ T8996] ? vfs_write+0xac8/0xd60 [ 275.798335][ T8996] kernel_clone+0x23f/0x940 [ 275.802863][ T8996] ? kernel_write+0x3c0/0x3c0 [ 275.807563][ T8996] ? create_io_thread+0x130/0x130 [ 275.812612][ T8996] ? mutex_lock+0x8c/0xe0 [ 275.816957][ T8996] __x64_sys_clone+0x176/0x1d0 [ 275.821739][ T8996] ? __ia32_sys_vfork+0xf0/0xf0 [ 275.826610][ T8996] ? ksys_write+0x1eb/0x240 [ 275.831141][ T8996] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 275.837230][ T8996] do_syscall_64+0x31/0x40 [ 275.841663][ T8996] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 275.847582][ T8996] RIP: 0033:0x7f80071c4929 [ 275.852016][ T8996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 275.871644][ T8996] RSP: 002b:00007f800582cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 275.880083][ T8996] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 275.888092][ T8996] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 275.896180][ T8996] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 275.904172][ T8996] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 275.912168][ T8996] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 [ 278.934383][ T9063] device syzkaller0 entered promiscuous mode [ 280.617141][ T9122] FAULT_INJECTION: forcing a failure. [ 280.617141][ T9122] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 280.733912][ T9122] CPU: 0 PID: 9122 Comm: syz.5.3050 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 280.745263][ T9122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 280.755329][ T9122] Call Trace: [ 280.758625][ T9122] __dump_stack+0x21/0x24 [ 280.762954][ T9122] dump_stack_lvl+0x169/0x1d8 [ 280.767623][ T9122] ? show_regs_print_info+0x18/0x18 [ 280.772817][ T9122] ? htab_lru_map_update_elem+0x55e/0x670 [ 280.778528][ T9122] dump_stack+0x15/0x1c [ 280.782673][ T9122] should_fail+0x3c1/0x510 [ 280.787079][ T9122] should_fail_usercopy+0x1a/0x20 [ 280.792094][ T9122] _copy_from_user+0x20/0xd0 [ 280.796676][ T9122] generic_map_update_batch+0x4a4/0x740 [ 280.802219][ T9122] ? bpf_enable_instrumentation+0x50/0x50 [ 280.807933][ T9122] ? __fdget+0x1a1/0x230 [ 280.812167][ T9122] ? bpf_enable_instrumentation+0x50/0x50 [ 280.817874][ T9122] bpf_map_do_batch+0x463/0x5f0 [ 280.822723][ T9122] __se_sys_bpf+0x55a/0x680 [ 280.827216][ T9122] ? __x64_sys_bpf+0x90/0x90 [ 280.831809][ T9122] __x64_sys_bpf+0x7b/0x90 [ 280.836345][ T9122] do_syscall_64+0x31/0x40 [ 280.840784][ T9122] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 280.846669][ T9122] RIP: 0033:0x7fb9cb225929 [ 280.851069][ T9122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.870673][ T9122] RSP: 002b:00007fb9c988e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 280.879096][ T9122] RAX: ffffffffffffffda RBX: 00007fb9cb44cfa0 RCX: 00007fb9cb225929 [ 280.887064][ T9122] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 280.895032][ T9122] RBP: 00007fb9c988e090 R08: 0000000000000000 R09: 0000000000000000 [ 280.907181][ T9122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 280.915154][ T9122] R13: 0000000000000000 R14: 00007fb9cb44cfa0 R15: 00007ffed777d518 [ 281.118127][ T9131] device pim6reg1 entered promiscuous mode [ 281.245369][ T9137] device syzkaller0 entered promiscuous mode [ 282.587592][ T9191] device syzkaller0 entered promiscuous mode [ 284.400259][ T9271] device syzkaller0 entered promiscuous mode [ 287.039833][ T9366] device wg2 entered promiscuous mode [ 287.971419][ T9412] device syzkaller0 entered promiscuous mode [ 289.048648][ T9449] FAULT_INJECTION: forcing a failure. [ 289.048648][ T9449] name failslab, interval 1, probability 0, space 0, times 0 [ 289.192965][ T9449] CPU: 0 PID: 9449 Comm: syz.8.3162 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 289.204382][ T9449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 289.214467][ T9449] Call Trace: [ 289.217797][ T9449] __dump_stack+0x21/0x24 [ 289.222150][ T9449] dump_stack_lvl+0x169/0x1d8 [ 289.226855][ T9449] ? show_regs_print_info+0x18/0x18 [ 289.232090][ T9449] dump_stack+0x15/0x1c [ 289.236268][ T9449] should_fail+0x3c1/0x510 [ 289.240713][ T9449] ? vm_area_dup+0x26/0x250 [ 289.245351][ T9449] __should_failslab+0xa4/0xe0 [ 289.250152][ T9449] should_failslab+0x9/0x20 [ 289.254690][ T9449] kmem_cache_alloc+0x3d/0x2e0 [ 289.259490][ T9449] vm_area_dup+0x26/0x250 [ 289.263844][ T9449] copy_mm+0x8b2/0x1480 [ 289.268031][ T9449] ? copy_signal+0x600/0x600 [ 289.272665][ T9449] ? __init_rwsem+0xd5/0x1c0 [ 289.277285][ T9449] ? copy_signal+0x4cb/0x600 [ 289.281904][ T9449] copy_process+0x1187/0x32c0 [ 289.286606][ T9449] ? proc_fail_nth_read+0x210/0x210 [ 289.291839][ T9449] ? __pidfd_prepare+0x150/0x150 [ 289.296803][ T9449] ? rw_verify_area+0x1c0/0x360 [ 289.301671][ T9449] ? vfs_write+0xac8/0xd60 [ 289.306092][ T9449] kernel_clone+0x23f/0x940 [ 289.310593][ T9449] ? kernel_write+0x3c0/0x3c0 [ 289.315266][ T9449] ? create_io_thread+0x130/0x130 [ 289.320288][ T9449] ? mutex_lock+0x8c/0xe0 [ 289.324611][ T9449] __x64_sys_clone+0x176/0x1d0 [ 289.329396][ T9449] ? __ia32_sys_vfork+0xf0/0xf0 [ 289.334242][ T9449] ? ksys_write+0x1eb/0x240 [ 289.338754][ T9449] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 289.344817][ T9449] do_syscall_64+0x31/0x40 [ 289.349231][ T9449] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 289.355118][ T9449] RIP: 0033:0x7ff8a47ff929 [ 289.359528][ T9449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 289.379128][ T9449] RSP: 002b:00007ff8a2e67fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 289.387536][ T9449] RAX: ffffffffffffffda RBX: 00007ff8a4a26fa0 RCX: 00007ff8a47ff929 [ 289.395499][ T9449] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 289.403501][ T9449] RBP: 00007ff8a2e68090 R08: 0000000000000000 R09: 0000000000000000 [ 289.411467][ T9449] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 289.419595][ T9449] R13: 0000000000000000 R14: 00007ff8a4a26fa0 R15: 00007ffff55518a8 [ 289.501232][ T9454] device sit0 entered promiscuous mode [ 294.261523][ T9590] device syzkaller0 entered promiscuous mode [ 297.560458][ T9665] FAULT_INJECTION: forcing a failure. [ 297.560458][ T9665] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 297.641035][ T9665] CPU: 1 PID: 9665 Comm: syz.5.3232 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 297.652437][ T9665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 297.662761][ T9665] Call Trace: [ 297.666092][ T9665] __dump_stack+0x21/0x24 [ 297.670562][ T9665] dump_stack_lvl+0x169/0x1d8 [ 297.675290][ T9665] ? show_regs_print_info+0x18/0x18 [ 297.680548][ T9665] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 297.686390][ T9665] dump_stack+0x15/0x1c [ 297.690572][ T9665] should_fail+0x3c1/0x510 [ 297.695021][ T9665] should_fail_usercopy+0x1a/0x20 [ 297.700077][ T9665] _copy_from_user+0x20/0xd0 [ 297.704704][ T9665] generic_map_update_batch+0x450/0x740 [ 297.710283][ T9665] ? __irq_exit_rcu+0x40/0x150 [ 297.715077][ T9665] ? bpf_enable_instrumentation+0x50/0x50 [ 297.720953][ T9665] ? bpf_enable_instrumentation+0x50/0x50 [ 297.726696][ T9665] bpf_map_do_batch+0x463/0x5f0 [ 297.731575][ T9665] __se_sys_bpf+0x55a/0x680 [ 297.736120][ T9665] ? __x64_sys_bpf+0x90/0x90 [ 297.740768][ T9665] __x64_sys_bpf+0x7b/0x90 [ 297.745226][ T9665] do_syscall_64+0x31/0x40 [ 297.749685][ T9665] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 297.755608][ T9665] RIP: 0033:0x7fb9cb225929 [ 297.760041][ T9665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.779782][ T9665] RSP: 002b:00007fb9c988e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 297.788234][ T9665] RAX: ffffffffffffffda RBX: 00007fb9cb44cfa0 RCX: 00007fb9cb225929 [ 297.796237][ T9665] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 297.804244][ T9665] RBP: 00007fb9c988e090 R08: 0000000000000000 R09: 0000000000000000 [ 297.812246][ T9665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 297.820263][ T9665] R13: 0000000000000000 R14: 00007fb9cb44cfa0 R15: 00007ffed777d518 [ 299.821678][ T9730] device wg2 left promiscuous mode [ 299.997120][ T9737] syz.7.3256[9737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.997235][ T9737] syz.7.3256[9737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.629119][ T9808] device sit0 left promiscuous mode [ 302.796069][ T9811] device sit0 entered promiscuous mode [ 303.050340][ T9820] device pim6reg1 entered promiscuous mode [ 303.625068][ T9833] bridge0: port 3(veth0) entered blocking state [ 303.651402][ T9833] bridge0: port 3(veth0) entered disabled state [ 303.723077][ T9833] device veth0 entered promiscuous mode [ 303.738130][ T9833] bridge0: port 3(veth0) entered blocking state [ 303.744803][ T9833] bridge0: port 3(veth0) entered forwarding state [ 305.805770][ T9905] device syzkaller0 entered promiscuous mode [ 313.112855][T10140] FAULT_INJECTION: forcing a failure. [ 313.112855][T10140] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 313.258403][T10140] CPU: 1 PID: 10140 Comm: syz.7.3393 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 313.269886][T10140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 313.279967][T10140] Call Trace: [ 313.283288][T10140] __dump_stack+0x21/0x24 [ 313.287838][T10140] dump_stack_lvl+0x169/0x1d8 [ 313.292559][T10140] ? show_regs_print_info+0x18/0x18 [ 313.297775][T10140] dump_stack+0x15/0x1c [ 313.301953][T10140] should_fail+0x3c1/0x510 [ 313.306385][T10140] should_fail_usercopy+0x1a/0x20 [ 313.311436][T10140] _copy_from_user+0x20/0xd0 [ 313.316052][T10140] iovec_from_user+0x1bc/0x2f0 [ 313.320843][T10140] ? kstrtouint_from_user+0x1a0/0x200 [ 313.326260][T10140] __import_iovec+0x71/0x390 [ 313.330883][T10140] ? memset+0x35/0x40 [ 313.334890][T10140] import_iovec+0x7c/0xb0 [ 313.339254][T10140] ___sys_recvmsg+0x420/0x4f0 [ 313.343985][T10140] ? __sys_recvmsg+0x250/0x250 [ 313.348801][T10140] ? __fdget+0x1a1/0x230 [ 313.353078][T10140] __x64_sys_recvmsg+0x1dd/0x2a0 [ 313.358041][T10140] ? fput+0x1a/0x20 [ 313.361878][T10140] ? ___sys_recvmsg+0x4f0/0x4f0 [ 313.366761][T10140] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 313.372858][T10140] do_syscall_64+0x31/0x40 [ 313.377315][T10140] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 313.383236][T10140] RIP: 0033:0x7f80071c4929 [ 313.387686][T10140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 313.407318][T10140] RSP: 002b:00007f800582d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 313.415750][T10140] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 313.423733][T10140] RDX: 00000000000040fd RSI: 0000200000000b00 RDI: 0000000000000004 [ 313.431798][T10140] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 313.439779][T10140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 313.447763][T10140] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 [ 314.401604][T10179] device syzkaller0 entered promiscuous mode [ 321.680262][T10429] device veth0_vlan left promiscuous mode [ 321.735004][T10429] device veth0_vlan entered promiscuous mode [ 321.863673][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.909200][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.916511][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.304175][T10457] device veth0_vlan left promiscuous mode [ 322.371723][T10457] device veth0_vlan entered promiscuous mode [ 322.571927][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.593917][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.609289][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.155636][T10560] FAULT_INJECTION: forcing a failure. [ 324.155636][T10560] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 324.353993][T10560] CPU: 0 PID: 10560 Comm: syz.6.3531 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 324.365414][T10560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 324.375482][T10560] Call Trace: [ 324.378787][T10560] __dump_stack+0x21/0x24 [ 324.383128][T10560] dump_stack_lvl+0x169/0x1d8 [ 324.387819][T10560] ? show_regs_print_info+0x18/0x18 [ 324.393030][T10560] dump_stack+0x15/0x1c [ 324.397192][T10560] should_fail+0x3c1/0x510 [ 324.401623][T10560] should_fail_alloc_page+0x4f/0x60 [ 324.406832][T10560] __alloc_pages_nodemask+0x109/0x5f0 [ 324.412215][T10560] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 324.417778][T10560] ? __kasan_slab_alloc+0xcf/0xf0 [ 324.422828][T10560] ? anon_vma_clone+0xc0/0x500 [ 324.427609][T10560] ? __kasan_check_write+0x14/0x20 [ 324.432743][T10560] ? _raw_spin_lock+0x8e/0xe0 [ 324.437441][T10560] ? _raw_spin_trylock_bh+0x130/0x130 [ 324.442827][T10560] ? __kasan_slab_alloc+0xcf/0xf0 [ 324.447857][T10560] ? __kasan_slab_alloc+0xbd/0xf0 [ 324.452890][T10560] ? slab_post_alloc_hook+0x5d/0x2f0 [ 324.458179][T10560] ? kmem_cache_alloc+0x165/0x2e0 [ 324.463213][T10560] __pmd_alloc+0x41/0x360 [ 324.467544][T10560] ? __pud_alloc+0x17f/0x1a0 [ 324.472138][T10560] copy_page_range+0x2521/0x2870 [ 324.477086][T10560] ? anon_vma_interval_tree_insert+0x363/0x380 [ 324.483253][T10560] ? _raw_write_lock+0x8e/0xe0 [ 324.488018][T10560] ? pfn_valid+0x1c0/0x1c0 [ 324.492452][T10560] ? __kasan_check_write+0x14/0x20 [ 324.497567][T10560] ? trace_raw_output_vm_unmapped_area+0x210/0x210 [ 324.504068][T10560] ? _raw_write_unlock+0x2b/0x60 [ 324.509010][T10560] copy_mm+0xc63/0x1480 [ 324.513174][T10560] ? copy_signal+0x600/0x600 [ 324.517763][T10560] ? __init_rwsem+0xd5/0x1c0 [ 324.522352][T10560] ? copy_signal+0x4cb/0x600 [ 324.526949][T10560] copy_process+0x1187/0x32c0 [ 324.531632][T10560] ? proc_fail_nth_read+0x210/0x210 [ 324.536830][T10560] ? __pidfd_prepare+0x150/0x150 [ 324.541765][T10560] ? rw_verify_area+0x1c0/0x360 [ 324.546614][T10560] ? vfs_write+0xac8/0xd60 [ 324.551208][T10560] ? __kasan_slab_free+0x11/0x20 [ 324.556158][T10560] kernel_clone+0x23f/0x940 [ 324.560671][T10560] ? kernel_write+0x3c0/0x3c0 [ 324.565356][T10560] ? create_io_thread+0x130/0x130 [ 324.570388][T10560] ? mutex_lock+0x8c/0xe0 [ 324.574733][T10560] __x64_sys_clone+0x176/0x1d0 [ 324.579504][T10560] ? __ia32_sys_vfork+0xf0/0xf0 [ 324.584363][T10560] ? ksys_write+0x1eb/0x240 [ 324.588882][T10560] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 324.594953][T10560] do_syscall_64+0x31/0x40 [ 324.599377][T10560] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 324.605270][T10560] RIP: 0033:0x7fdf2fbce929 [ 324.609697][T10560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 324.629316][T10560] RSP: 002b:00007fdf2e236fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 324.637756][T10560] RAX: ffffffffffffffda RBX: 00007fdf2fdf5fa0 RCX: 00007fdf2fbce929 [ 324.645731][T10560] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 324.653714][T10560] RBP: 00007fdf2e237090 R08: 0000000000000000 R09: 0000000000000000 [ 324.661697][T10560] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 324.669815][T10560] R13: 0000000000000000 R14: 00007fdf2fdf5fa0 R15: 00007fff42796528 [ 326.425341][T10622] device veth0_vlan left promiscuous mode [ 326.547249][T10622] device veth0_vlan entered promiscuous mode [ 326.560348][T10627] FAULT_INJECTION: forcing a failure. [ 326.560348][T10627] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 326.705878][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 326.717819][T10627] CPU: 0 PID: 10627 Comm: syz.8.3553 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 326.729247][T10627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 326.739319][T10627] Call Trace: [ 326.742637][T10627] __dump_stack+0x21/0x24 [ 326.746986][T10627] dump_stack_lvl+0x169/0x1d8 [ 326.751693][T10627] ? show_regs_print_info+0x18/0x18 [ 326.756918][T10627] ? avc_has_perm+0x234/0x360 [ 326.761601][T10627] dump_stack+0x15/0x1c [ 326.765759][T10627] should_fail+0x3c1/0x510 [ 326.770173][T10627] should_fail_usercopy+0x1a/0x20 [ 326.775194][T10627] _copy_to_iter+0x1df/0xa40 [ 326.779787][T10627] ? __kasan_check_write+0x14/0x20 [ 326.784929][T10627] ? __check_object_size+0x2f4/0x3c0 [ 326.790220][T10627] simple_copy_to_iter+0x50/0x70 [ 326.795165][T10627] __skb_datagram_iter+0xdb/0x700 [ 326.800186][T10627] ? tipc_sk_anc_data_recv+0xa6/0x680 [ 326.805549][T10627] ? skb_copy_datagram_iter+0x150/0x150 [ 326.811098][T10627] skb_copy_datagram_iter+0x43/0x150 [ 326.816398][T10627] tipc_recvmsg+0x79b/0x13a0 [ 326.820991][T10627] ? tipc_send_packet+0xa0/0xa0 [ 326.825847][T10627] ? security_socket_recvmsg+0x87/0xb0 [ 326.831395][T10627] ? tipc_send_packet+0xa0/0xa0 [ 326.836285][T10627] ____sys_recvmsg+0x291/0x580 [ 326.841053][T10627] ? __sys_recvmsg_sock+0x50/0x50 [ 326.846077][T10627] ? import_iovec+0x7c/0xb0 [ 326.850576][T10627] ___sys_recvmsg+0x1af/0x4f0 [ 326.855337][T10627] ? __sys_recvmsg+0x250/0x250 [ 326.860104][T10627] ? __fdget+0x1a1/0x230 [ 326.864344][T10627] __x64_sys_recvmsg+0x1dd/0x2a0 [ 326.869275][T10627] ? fput+0x1a/0x20 [ 326.873082][T10627] ? ___sys_recvmsg+0x4f0/0x4f0 [ 326.877933][T10627] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 326.884013][T10627] do_syscall_64+0x31/0x40 [ 326.888428][T10627] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 326.894446][T10627] RIP: 0033:0x7ff8a47ff929 [ 326.898873][T10627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.918472][T10627] RSP: 002b:00007ff8a2e68038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 326.926877][T10627] RAX: ffffffffffffffda RBX: 00007ff8a4a26fa0 RCX: 00007ff8a47ff929 [ 326.934937][T10627] RDX: 00000000000040fd RSI: 0000200000000b00 RDI: 0000000000000004 [ 326.942903][T10627] RBP: 00007ff8a2e68090 R08: 0000000000000000 R09: 0000000000000000 [ 326.950954][T10627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.959132][T10627] R13: 0000000000000000 R14: 00007ff8a4a26fa0 R15: 00007ffff55518a8 [ 326.969807][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 326.977199][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 328.402367][T10671] device veth0_vlan left promiscuous mode [ 328.438840][T10671] device veth0_vlan entered promiscuous mode [ 328.516024][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.529758][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 328.566447][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.689006][T10753] device syzkaller0 entered promiscuous mode [ 331.801014][T10777] device sit0 entered promiscuous mode [ 333.590573][T10861] device veth0_vlan left promiscuous mode [ 333.650153][T10861] device veth0_vlan entered promiscuous mode [ 333.763453][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.778427][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.788146][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.760414][T10913] FAULT_INJECTION: forcing a failure. [ 334.760414][T10913] name failslab, interval 1, probability 0, space 0, times 0 [ 334.917541][T10913] CPU: 0 PID: 10913 Comm: syz.7.3658 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 334.928990][T10913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 334.939437][T10913] Call Trace: [ 334.942751][T10913] __dump_stack+0x21/0x24 [ 334.947103][T10913] dump_stack_lvl+0x169/0x1d8 [ 334.951811][T10913] ? show_regs_print_info+0x18/0x18 [ 334.957173][T10913] dump_stack+0x15/0x1c [ 334.961343][T10913] should_fail+0x3c1/0x510 [ 334.965779][T10913] ? vm_area_dup+0x26/0x250 [ 334.970287][T10913] __should_failslab+0xa4/0xe0 [ 334.975258][T10913] should_failslab+0x9/0x20 [ 334.979783][T10913] kmem_cache_alloc+0x3d/0x2e0 [ 334.984559][T10913] vm_area_dup+0x26/0x250 [ 334.988901][T10913] copy_mm+0x8b2/0x1480 [ 334.993067][T10913] ? copy_signal+0x600/0x600 [ 334.997671][T10913] ? __init_rwsem+0xd5/0x1c0 [ 335.002270][T10913] ? copy_signal+0x4cb/0x600 [ 335.006868][T10913] copy_process+0x1187/0x32c0 [ 335.011562][T10913] ? proc_fail_nth_read+0x210/0x210 [ 335.016777][T10913] ? __pidfd_prepare+0x150/0x150 [ 335.021923][T10913] ? rw_verify_area+0x1c0/0x360 [ 335.026795][T10913] ? vfs_write+0xac8/0xd60 [ 335.031225][T10913] ? __kasan_slab_free+0x11/0x20 [ 335.036175][T10913] kernel_clone+0x23f/0x940 [ 335.040688][T10913] ? kernel_write+0x3c0/0x3c0 [ 335.045374][T10913] ? create_io_thread+0x130/0x130 [ 335.050406][T10913] ? mutex_lock+0x8c/0xe0 [ 335.054766][T10913] __x64_sys_clone+0x176/0x1d0 [ 335.059541][T10913] ? __ia32_sys_vfork+0xf0/0xf0 [ 335.064405][T10913] ? ksys_write+0x1eb/0x240 [ 335.069018][T10913] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 335.075100][T10913] do_syscall_64+0x31/0x40 [ 335.079533][T10913] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 335.085436][T10913] RIP: 0033:0x7f80071c4929 [ 335.090012][T10913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.109637][T10913] RSP: 002b:00007f800582cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 335.118077][T10913] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 335.126069][T10913] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 335.134053][T10913] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 335.142036][T10913] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 335.150021][T10913] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 [ 335.659129][T10927] device veth0_vlan left promiscuous mode [ 335.708352][T10927] device veth0_vlan entered promiscuous mode [ 335.765018][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 335.778963][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 335.802806][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 336.468248][T10956] device veth0_vlan left promiscuous mode [ 336.479358][T10956] device veth0_vlan entered promiscuous mode [ 336.499605][T10956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 336.539954][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 336.557989][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 336.609693][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.215339][T10992] device syzkaller0 entered promiscuous mode [ 337.531091][T11005] Ÿë: port 1(ip6gretap0) entered blocking state [ 337.558805][T11005] Ÿë: port 1(ip6gretap0) entered disabled state [ 337.565764][T11005] device ip6gretap0 entered promiscuous mode [ 337.685887][ T24] audit: type=1400 audit(1750958010.080:159): avc: denied { create } for pid=11015 comm="syz.8.3698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 337.724752][T11022] FAULT_INJECTION: forcing a failure. [ 337.724752][T11022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.750652][T11022] CPU: 1 PID: 11022 Comm: syz.7.3703 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 337.762100][T11022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 337.772159][T11022] Call Trace: [ 337.775457][T11022] __dump_stack+0x21/0x24 [ 337.779789][T11022] dump_stack_lvl+0x169/0x1d8 [ 337.784480][T11022] ? show_regs_print_info+0x18/0x18 [ 337.789676][T11022] ? htab_lru_map_update_elem+0x55e/0x670 [ 337.795397][T11022] dump_stack+0x15/0x1c [ 337.799596][T11022] should_fail+0x3c1/0x510 [ 337.804013][T11022] should_fail_usercopy+0x1a/0x20 [ 337.809036][T11022] _copy_from_user+0x20/0xd0 [ 337.813627][T11022] generic_map_update_batch+0x4a4/0x740 [ 337.819170][T11022] ? bpf_enable_instrumentation+0x50/0x50 [ 337.824887][T11022] ? __fdget+0x1a1/0x230 [ 337.829125][T11022] ? bpf_enable_instrumentation+0x50/0x50 [ 337.834834][T11022] bpf_map_do_batch+0x463/0x5f0 [ 337.839683][T11022] __se_sys_bpf+0x55a/0x680 [ 337.844178][T11022] ? __x64_sys_bpf+0x90/0x90 [ 337.848774][T11022] __x64_sys_bpf+0x7b/0x90 [ 337.853187][T11022] do_syscall_64+0x31/0x40 [ 337.857606][T11022] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 337.863493][T11022] RIP: 0033:0x7f80071c4929 [ 337.867911][T11022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.887616][T11022] RSP: 002b:00007f800582d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 337.896047][T11022] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 337.904020][T11022] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 337.911994][T11022] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 337.919963][T11022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 337.927933][T11022] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 [ 338.084950][ T24] audit: type=1400 audit(1750958010.480:160): avc: denied { create } for pid=11041 comm="syz.8.3709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 339.086188][T11080] ÿ: renamed from bond_slave_0 [ 340.464843][T11135] device sit0 entered promiscuous mode [ 341.459693][T11183] FAULT_INJECTION: forcing a failure. [ 341.459693][T11183] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 341.500342][T11183] CPU: 1 PID: 11183 Comm: syz.6.3760 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 341.511939][T11183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 341.522158][T11183] Call Trace: [ 341.525478][T11183] __dump_stack+0x21/0x24 [ 341.529833][T11183] dump_stack_lvl+0x169/0x1d8 [ 341.534551][T11183] ? show_regs_print_info+0x18/0x18 [ 341.539783][T11183] dump_stack+0x15/0x1c [ 341.543975][T11183] should_fail+0x3c1/0x510 [ 341.548434][T11183] should_fail_alloc_page+0x4f/0x60 [ 341.553668][T11183] __alloc_pages_nodemask+0x109/0x5f0 [ 341.559554][T11183] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 341.565121][T11183] ? __kasan_slab_alloc+0xcf/0xf0 [ 341.570166][T11183] ? anon_vma_clone+0xc0/0x500 [ 341.575128][T11183] ? __kasan_check_write+0x14/0x20 [ 341.580262][T11183] ? _raw_spin_lock+0x8e/0xe0 [ 341.584959][T11183] ? _raw_spin_trylock_bh+0x130/0x130 [ 341.590350][T11183] ? __kasan_slab_alloc+0xcf/0xf0 [ 341.595384][T11183] ? __kasan_slab_alloc+0xbd/0xf0 [ 341.600427][T11183] ? slab_post_alloc_hook+0x5d/0x2f0 [ 341.605749][T11183] ? kmem_cache_alloc+0x165/0x2e0 [ 341.610804][T11183] __pmd_alloc+0x41/0x360 [ 341.615145][T11183] ? __pud_alloc+0x17f/0x1a0 [ 341.619756][T11183] copy_page_range+0x2521/0x2870 [ 341.624721][T11183] ? _raw_write_lock+0x8e/0xe0 [ 341.629510][T11183] ? pfn_valid+0x1c0/0x1c0 [ 341.633958][T11183] ? __kasan_check_write+0x14/0x20 [ 341.639094][T11183] ? trace_raw_output_vm_unmapped_area+0x210/0x210 [ 341.645714][T11183] ? _raw_write_unlock+0x2b/0x60 [ 341.650687][T11183] copy_mm+0xc63/0x1480 [ 341.654883][T11183] ? copy_signal+0x600/0x600 [ 341.659496][T11183] ? __init_rwsem+0xd5/0x1c0 [ 341.664101][T11183] ? copy_signal+0x4cb/0x600 [ 341.668703][T11183] copy_process+0x1187/0x32c0 [ 341.673406][T11183] ? proc_fail_nth_read+0x210/0x210 [ 341.678627][T11183] ? __pidfd_prepare+0x150/0x150 [ 341.683585][T11183] ? rw_verify_area+0x1c0/0x360 [ 341.688457][T11183] ? vfs_write+0xac8/0xd60 [ 341.692902][T11183] ? __kasan_slab_free+0x11/0x20 [ 341.697859][T11183] kernel_clone+0x23f/0x940 [ 341.702454][T11183] ? kernel_write+0x3c0/0x3c0 [ 341.707133][T11183] ? create_io_thread+0x130/0x130 [ 341.712182][T11183] ? mutex_lock+0x8c/0xe0 [ 341.716546][T11183] __x64_sys_clone+0x176/0x1d0 [ 341.721330][T11183] ? __ia32_sys_vfork+0xf0/0xf0 [ 341.726295][T11183] ? ksys_write+0x1eb/0x240 [ 341.730825][T11183] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 341.736916][T11183] do_syscall_64+0x31/0x40 [ 341.741374][T11183] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 341.747298][T11183] RIP: 0033:0x7fdf2fbce929 [ 341.751736][T11183] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.771374][T11183] RSP: 002b:00007fdf2e215fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 341.779810][T11183] RAX: ffffffffffffffda RBX: 00007fdf2fdf6080 RCX: 00007fdf2fbce929 [ 341.787806][T11183] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 341.795943][T11183] RBP: 00007fdf2e216090 R08: 0000000000000000 R09: 0000000000000000 [ 341.803938][T11183] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 341.811929][T11183] R13: 0000000000000000 R14: 00007fdf2fdf6080 R15: 00007fff42796528 [ 347.593444][ T24] audit: type=1400 audit(1750958019.990:161): avc: denied { create } for pid=11340 comm="syz.7.3817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 349.133166][T11376] device veth0_vlan left promiscuous mode [ 349.173521][T11384] FAULT_INJECTION: forcing a failure. [ 349.173521][T11384] name failslab, interval 1, probability 0, space 0, times 0 [ 349.202286][T11376] device veth0_vlan entered promiscuous mode [ 349.238956][T11384] CPU: 0 PID: 11384 Comm: syz.8.3828 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 349.250382][T11384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 349.260429][T11384] Call Trace: [ 349.263721][T11384] __dump_stack+0x21/0x24 [ 349.268194][T11384] dump_stack_lvl+0x169/0x1d8 [ 349.272880][T11384] ? show_regs_print_info+0x18/0x18 [ 349.278080][T11384] dump_stack+0x15/0x1c [ 349.282238][T11384] should_fail+0x3c1/0x510 [ 349.286661][T11384] ? vm_area_dup+0x26/0x250 [ 349.291163][T11384] __should_failslab+0xa4/0xe0 [ 349.295924][T11384] should_failslab+0x9/0x20 [ 349.300546][T11384] kmem_cache_alloc+0x3d/0x2e0 [ 349.305310][T11384] vm_area_dup+0x26/0x250 [ 349.309640][T11384] copy_mm+0x8b2/0x1480 [ 349.313801][T11384] ? copy_signal+0x600/0x600 [ 349.318448][T11384] ? __init_rwsem+0xd5/0x1c0 [ 349.323034][T11384] ? copy_signal+0x4cb/0x600 [ 349.327637][T11384] copy_process+0x1187/0x32c0 [ 349.332310][T11384] ? proc_fail_nth_read+0x210/0x210 [ 349.337608][T11384] ? __pidfd_prepare+0x150/0x150 [ 349.342546][T11384] ? rw_verify_area+0x1c0/0x360 [ 349.347390][T11384] ? vfs_write+0xac8/0xd60 [ 349.351792][T11384] kernel_clone+0x23f/0x940 [ 349.356289][T11384] ? kernel_write+0x3c0/0x3c0 [ 349.360948][T11384] ? create_io_thread+0x130/0x130 [ 349.365952][T11384] ? mutex_lock+0x8c/0xe0 [ 349.370268][T11384] __x64_sys_clone+0x176/0x1d0 [ 349.375018][T11384] ? __ia32_sys_vfork+0xf0/0xf0 [ 349.379980][T11384] ? ksys_write+0x1eb/0x240 [ 349.384519][T11384] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 349.390595][T11384] do_syscall_64+0x31/0x40 [ 349.395010][T11384] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 349.400893][T11384] RIP: 0033:0x7ff8a47ff929 [ 349.405303][T11384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 349.424918][T11384] RSP: 002b:00007ff8a2e67fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 349.433341][T11384] RAX: ffffffffffffffda RBX: 00007ff8a4a26fa0 RCX: 00007ff8a47ff929 [ 349.441314][T11384] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 349.449285][T11384] RBP: 00007ff8a2e68090 R08: 0000000000000000 R09: 0000000000000000 [ 349.457270][T11384] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 349.465233][T11384] R13: 0000000000000000 R14: 00007ff8a4a26fa0 R15: 00007ffff55518a8 [ 349.562141][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 349.578317][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 349.591950][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 349.668562][T11387] device sit0 left promiscuous mode [ 349.722485][T11386] device sit0 entered promiscuous mode [ 350.352647][T11440] FAULT_INJECTION: forcing a failure. [ 350.352647][T11440] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 350.470148][T11440] CPU: 1 PID: 11440 Comm: syz.8.3846 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 350.481600][T11440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 350.491786][T11440] Call Trace: [ 350.495221][T11440] __dump_stack+0x21/0x24 [ 350.499577][T11440] dump_stack_lvl+0x169/0x1d8 [ 350.504266][T11440] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 350.510088][T11440] ? show_regs_print_info+0x18/0x18 [ 350.515308][T11440] dump_stack+0x15/0x1c [ 350.519474][T11440] should_fail+0x3c1/0x510 [ 350.523902][T11440] should_fail_usercopy+0x1a/0x20 [ 350.528934][T11440] _copy_from_user+0x20/0xd0 [ 350.533537][T11440] generic_map_update_batch+0x4a4/0x740 [ 350.539094][T11440] ? bpf_enable_instrumentation+0x50/0x50 [ 350.544817][T11440] ? __fdget+0x1a1/0x230 [ 350.549067][T11440] ? bpf_enable_instrumentation+0x50/0x50 [ 350.554788][T11440] bpf_map_do_batch+0x463/0x5f0 [ 350.559647][T11440] __se_sys_bpf+0x55a/0x680 [ 350.564153][T11440] ? __x64_sys_bpf+0x90/0x90 [ 350.568762][T11440] __x64_sys_bpf+0x7b/0x90 [ 350.573188][T11440] do_syscall_64+0x31/0x40 [ 350.577623][T11440] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 350.583520][T11440] RIP: 0033:0x7ff8a47ff929 [ 350.587943][T11440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 350.607843][T11440] RSP: 002b:00007ff8a2e68038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 350.616279][T11440] RAX: ffffffffffffffda RBX: 00007ff8a4a26fa0 RCX: 00007ff8a47ff929 [ 350.624257][T11440] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 350.632244][T11440] RBP: 00007ff8a2e68090 R08: 0000000000000000 R09: 0000000000000000 [ 350.640224][T11440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 350.648205][T11440] R13: 0000000000000000 R14: 00007ff8a4a26fa0 R15: 00007ffff55518a8 [ 351.505415][T11479] device veth0_vlan left promiscuous mode [ 351.652807][T11479] device veth0_vlan entered promiscuous mode [ 351.768466][T11479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.824281][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.855165][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.892277][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.553394][T11585] device syzkaller0 entered promiscuous mode [ 354.088067][T11604] bridge0: port 3(veth0) entered disabled state [ 354.094399][T11604] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.416284][T11635] device sit0 left promiscuous mode [ 354.639141][T11638] device sit0 left promiscuous mode [ 355.715267][T11679] device sit0 left promiscuous mode [ 356.011050][T11695] device syzkaller0 entered promiscuous mode [ 356.806049][T11733] device pim6reg1 entered promiscuous mode [ 357.775378][T11791] device sit0 entered promiscuous mode [ 358.414221][T11835] device veth0_vlan left promiscuous mode [ 358.467449][T11835] device veth0_vlan entered promiscuous mode [ 358.565151][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 358.588698][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 358.649230][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 360.962217][T11945] FAULT_INJECTION: forcing a failure. [ 360.962217][T11945] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 361.045290][T11945] CPU: 1 PID: 11945 Comm: syz.9.4035 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 361.056703][T11945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 361.066778][T11945] Call Trace: [ 361.070089][T11945] __dump_stack+0x21/0x24 [ 361.074427][T11945] dump_stack_lvl+0x169/0x1d8 [ 361.079119][T11945] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 361.085280][T11945] ? show_regs_print_info+0x18/0x18 [ 361.090486][T11945] ? dump_stack+0x9/0x1c [ 361.094739][T11945] dump_stack+0x15/0x1c [ 361.098904][T11945] should_fail+0x3c1/0x510 [ 361.103341][T11945] should_fail_usercopy+0x1a/0x20 [ 361.108373][T11945] _copy_from_user+0x20/0xd0 [ 361.112975][T11945] generic_map_update_batch+0x4a4/0x740 [ 361.118530][T11945] ? bpf_enable_instrumentation+0x50/0x50 [ 361.124384][T11945] ? __fdget+0x1a1/0x230 [ 361.128646][T11945] ? bpf_enable_instrumentation+0x50/0x50 [ 361.134387][T11945] bpf_map_do_batch+0x463/0x5f0 [ 361.139255][T11945] __se_sys_bpf+0x55a/0x680 [ 361.144137][T11945] ? __x64_sys_bpf+0x90/0x90 [ 361.148763][T11945] ? debug_smp_processor_id+0x17/0x20 [ 361.154152][T11945] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 361.160235][T11945] __x64_sys_bpf+0x7b/0x90 [ 361.164691][T11945] do_syscall_64+0x31/0x40 [ 361.169167][T11945] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 361.175069][T11945] RIP: 0033:0x7fc01857d929 [ 361.179493][T11945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 361.199110][T11945] RSP: 002b:00007fc016be6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 361.207532][T11945] RAX: ffffffffffffffda RBX: 00007fc0187a4fa0 RCX: 00007fc01857d929 [ 361.215531][T11945] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 361.223508][T11945] RBP: 00007fc016be6090 R08: 0000000000000000 R09: 0000000000000000 [ 361.231479][T11945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 361.239447][T11945] R13: 0000000000000000 R14: 00007fc0187a4fa0 R15: 00007ffc2872e0c8 [ 361.492863][T11983] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 361.638257][T11986] device sit0 left promiscuous mode [ 361.889264][T11992] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.898655][T11992] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.015482][T11991] device sit0 entered promiscuous mode [ 362.061529][T11993] device bridge_slave_1 left promiscuous mode [ 362.078334][T11993] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.119305][T11993] device bridge_slave_0 left promiscuous mode [ 362.147897][T11993] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.901977][T12044] device pim6reg1 entered promiscuous mode [ 363.536299][T12079] device sit0 entered promiscuous mode [ 363.913936][T12102] device syzkaller0 entered promiscuous mode [ 365.466136][T12166] device sit0 left promiscuous mode [ 365.564339][T12165] device sit0 entered promiscuous mode [ 365.683467][T12164] device sit0 entered promiscuous mode [ 366.094737][T12183] device pim6reg1 entered promiscuous mode [ 366.293251][T12195] device syzkaller0 entered promiscuous mode [ 368.838497][T12303] device sit0 left promiscuous mode [ 369.030970][T12306] device sit0 entered promiscuous mode [ 369.046328][T12305] device sit0 left promiscuous mode [ 369.940230][T12348] device sit0 entered promiscuous mode [ 370.208983][ T24] audit: type=1400 audit(1750958042.600:162): avc: denied { ioctl } for pid=12351 comm="syz.7.4184" path="mnt:[4026533069]" dev="nsfs" ino=4026533069 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 371.192550][T12415] device sit0 entered promiscuous mode [ 372.822764][T12468] device sit0 left promiscuous mode [ 373.028687][T12474] device sit0 entered promiscuous mode [ 373.387677][T12488] FAULT_INJECTION: forcing a failure. [ 373.387677][T12488] name failslab, interval 1, probability 0, space 0, times 0 [ 373.534342][T12488] CPU: 1 PID: 12488 Comm: syz.8.4230 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 373.545879][T12488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 373.555970][T12488] Call Trace: [ 373.559289][T12488] __dump_stack+0x21/0x24 [ 373.563657][T12488] dump_stack_lvl+0x169/0x1d8 [ 373.568360][T12488] ? thaw_kernel_threads+0x220/0x220 [ 373.573811][T12488] ? show_regs_print_info+0x18/0x18 [ 373.579306][T12488] dump_stack+0x15/0x1c [ 373.583486][T12488] should_fail+0x3c1/0x510 [ 373.587929][T12488] ? anon_vma_fork+0x200/0x510 [ 373.592719][T12488] __should_failslab+0xa4/0xe0 [ 373.597507][T12488] should_failslab+0x9/0x20 [ 373.602036][T12488] kmem_cache_alloc+0x3d/0x2e0 [ 373.606836][T12488] ? anon_vma_fork+0xf2/0x510 [ 373.611539][T12488] anon_vma_fork+0x200/0x510 [ 373.616169][T12488] copy_mm+0x95e/0x1480 [ 373.620350][T12488] ? copy_signal+0x600/0x600 [ 373.624964][T12488] ? __init_rwsem+0xd5/0x1c0 [ 373.629581][T12488] ? copy_signal+0x4cb/0x600 [ 373.634192][T12488] copy_process+0x1187/0x32c0 [ 373.638895][T12488] ? proc_fail_nth_read+0x210/0x210 [ 373.644118][T12488] ? __pidfd_prepare+0x150/0x150 [ 373.649084][T12488] ? rw_verify_area+0x1c0/0x360 [ 373.653959][T12488] ? vfs_write+0xac8/0xd60 [ 373.658393][T12488] ? __kasan_slab_free+0x11/0x20 [ 373.663349][T12488] kernel_clone+0x23f/0x940 [ 373.667871][T12488] ? kernel_write+0x3c0/0x3c0 [ 373.672574][T12488] ? create_io_thread+0x130/0x130 [ 373.677668][T12488] ? mutex_lock+0x8c/0xe0 [ 373.682025][T12488] __x64_sys_clone+0x176/0x1d0 [ 373.686805][T12488] ? __ia32_sys_vfork+0xf0/0xf0 [ 373.691676][T12488] ? ksys_write+0x1eb/0x240 [ 373.696194][T12488] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 373.702292][T12488] do_syscall_64+0x31/0x40 [ 373.706727][T12488] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 373.712643][T12488] RIP: 0033:0x7ff8a47ff929 [ 373.717078][T12488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 373.736704][T12488] RSP: 002b:00007ff8a2e67fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 373.745139][T12488] RAX: ffffffffffffffda RBX: 00007ff8a4a26fa0 RCX: 00007ff8a47ff929 [ 373.753134][T12488] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 373.761261][T12488] RBP: 00007ff8a2e68090 R08: 0000000000000000 R09: 0000000000000000 [ 373.769243][T12488] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 373.777309][T12488] R13: 0000000000000000 R14: 00007ff8a4a26fa0 R15: 00007ffff55518a8 [ 374.251829][T12505] device sit0 left promiscuous mode [ 374.444640][T12513] device sit0 entered promiscuous mode [ 375.567291][T12560] device sit0 left promiscuous mode [ 375.646169][T12578] device sit0 entered promiscuous mode [ 376.248738][T12619] device sit0 left promiscuous mode [ 376.436098][T12631] device sit0 entered promiscuous mode [ 376.462230][T12642] device sit0 left promiscuous mode [ 377.051588][T12669] device sit0 left promiscuous mode [ 377.215634][T12676] device veth1_macvtap left promiscuous mode [ 377.217890][T12688] FAULT_INJECTION: forcing a failure. [ 377.217890][T12688] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 377.222232][T12676] device macsec0 entered promiscuous mode [ 377.246651][T12680] device veth1_macvtap entered promiscuous mode [ 377.254927][T12677] device sit0 entered promiscuous mode [ 377.256588][T12688] CPU: 1 PID: 12688 Comm: syz.6.4308 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 377.271939][T12688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 377.282023][T12688] Call Trace: [ 377.285366][T12688] __dump_stack+0x21/0x24 [ 377.289726][T12688] dump_stack_lvl+0x169/0x1d8 [ 377.294567][T12688] ? show_regs_print_info+0x18/0x18 [ 377.299798][T12688] ? htab_lru_map_update_elem+0x55e/0x670 [ 377.305638][T12688] dump_stack+0x15/0x1c [ 377.309841][T12688] should_fail+0x3c1/0x510 [ 377.314305][T12688] should_fail_usercopy+0x1a/0x20 [ 377.319373][T12688] _copy_from_user+0x20/0xd0 [ 377.324001][T12688] generic_map_update_batch+0x450/0x740 [ 377.329601][T12688] ? bpf_enable_instrumentation+0x50/0x50 [ 377.335362][T12688] ? __fdget+0x1a1/0x230 [ 377.339638][T12688] ? bpf_enable_instrumentation+0x50/0x50 [ 377.345396][T12688] bpf_map_do_batch+0x463/0x5f0 [ 377.350416][T12688] __se_sys_bpf+0x55a/0x680 [ 377.354963][T12688] ? __x64_sys_bpf+0x90/0x90 [ 377.359590][T12688] ? debug_smp_processor_id+0x17/0x20 [ 377.365000][T12688] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 377.371221][T12688] __x64_sys_bpf+0x7b/0x90 [ 377.375749][T12688] do_syscall_64+0x31/0x40 [ 377.380191][T12688] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 377.386233][T12688] RIP: 0033:0x7fdf2fbce929 [ 377.390678][T12688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 377.410310][T12688] RSP: 002b:00007fdf2e237038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 377.418775][T12688] RAX: ffffffffffffffda RBX: 00007fdf2fdf5fa0 RCX: 00007fdf2fbce929 [ 377.426760][T12688] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 377.434743][T12688] RBP: 00007fdf2e237090 R08: 0000000000000000 R09: 0000000000000000 [ 377.442722][T12688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 377.450700][T12688] R13: 0000000000000000 R14: 00007fdf2fdf5fa0 R15: 00007fff42796528 [ 378.374972][T12727] device sit0 entered promiscuous mode [ 379.130630][T12755] syz.7.4333[12755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.130682][T12755] syz.7.4333[12755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.316189][T12759] device sit0 left promiscuous mode [ 379.541491][T12766] device sit0 entered promiscuous mode [ 379.577790][T12771] device sit0 left promiscuous mode [ 380.931160][T12815] device veth0_vlan left promiscuous mode [ 380.953226][T12815] device veth0_vlan entered promiscuous mode [ 380.989686][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 381.010294][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 381.036607][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 381.387750][T12857] device sit0 left promiscuous mode [ 381.517645][T12855] device sit0 entered promiscuous mode [ 381.886360][T12862] syz.6.4374[12862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.886401][T12861] syz.6.4374[12861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.886420][T12862] syz.6.4374[12862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.252899][ T24] audit: type=1400 audit(1750958054.650:163): avc: denied { create } for pid=12891 comm="syz.8.4386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 382.761248][T12908] FAULT_INJECTION: forcing a failure. [ 382.761248][T12908] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 382.869101][T12908] CPU: 0 PID: 12908 Comm: syz.7.4391 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 382.880657][T12908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 382.890723][T12908] Call Trace: [ 382.894033][T12908] __dump_stack+0x21/0x24 [ 382.898464][T12908] dump_stack_lvl+0x169/0x1d8 [ 382.903158][T12908] ? show_regs_print_info+0x18/0x18 [ 382.908471][T12908] ? irq_exit_rcu+0x9/0x10 [ 382.912903][T12908] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 382.918725][T12908] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 382.924902][T12908] dump_stack+0x15/0x1c [ 382.929087][T12908] should_fail+0x3c1/0x510 [ 382.933546][T12908] should_fail_usercopy+0x1a/0x20 [ 382.938944][T12908] _copy_from_user+0x20/0xd0 [ 382.943551][T12908] generic_map_update_batch+0x4a4/0x740 [ 382.949119][T12908] ? __irq_exit_rcu+0x40/0x150 [ 382.953905][T12908] ? bpf_enable_instrumentation+0x50/0x50 [ 382.959761][T12908] ? __fdget+0x1a1/0x230 [ 382.964027][T12908] ? bpf_enable_instrumentation+0x50/0x50 [ 382.969788][T12908] bpf_map_do_batch+0x463/0x5f0 [ 382.974657][T12908] __se_sys_bpf+0x55a/0x680 [ 382.979174][T12908] ? __x64_sys_bpf+0x90/0x90 [ 382.983782][T12908] ? debug_smp_processor_id+0x17/0x20 [ 382.989170][T12908] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 382.995250][T12908] __x64_sys_bpf+0x7b/0x90 [ 382.999770][T12908] do_syscall_64+0x31/0x40 [ 383.004203][T12908] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 383.010118][T12908] RIP: 0033:0x7f80071c4929 [ 383.014552][T12908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 383.034175][T12908] RSP: 002b:00007f800582d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 383.042611][T12908] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 383.050594][T12908] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 383.058709][T12908] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 383.066698][T12908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 383.074687][T12908] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 [ 383.286671][T12918] device sit0 left promiscuous mode [ 383.439996][T12928] device sit0 entered promiscuous mode [ 384.931327][T13005] device sit0 left promiscuous mode [ 384.994856][T13004] device sit0 entered promiscuous mode [ 385.402462][T13025] device veth0_vlan left promiscuous mode [ 385.424806][T13025] device veth0_vlan entered promiscuous mode [ 385.463030][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 385.478373][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 385.517719][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.211848][T13089] device sit0 entered promiscuous mode [ 388.698491][T13102] device sit0 left promiscuous mode [ 388.765976][T13097] device sit0 entered promiscuous mode [ 388.973702][T13106] device sit0 left promiscuous mode [ 389.221301][T13110] device sit0 entered promiscuous mode [ 389.270742][T13115] device sit0 left promiscuous mode [ 389.329277][T13123] syz.7.4459[13123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.329384][T13123] syz.7.4459[13123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.459800][T13119] device sit0 entered promiscuous mode [ 390.819840][T13154] device sit0 left promiscuous mode [ 390.917087][T13155] device sit0 left promiscuous mode [ 391.016212][T13158] device sit0 entered promiscuous mode [ 391.028842][T13159] device sit0 entered promiscuous mode [ 392.377833][T13188] device sit0 left promiscuous mode [ 392.653174][T13201] syz.9.4482[13201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.653230][T13201] syz.9.4482[13201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.616597][T13228] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.636974][T13228] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.837808][T13232] device bridge_slave_1 left promiscuous mode [ 393.863686][T13232] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.910449][T13232] device bridge_slave_0 left promiscuous mode [ 393.931591][T13232] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.023246][T13234] device sit0 left promiscuous mode [ 394.179289][T13243] device sit0 entered promiscuous mode [ 394.203540][T13252] device sit0 left promiscuous mode [ 394.387303][T13255] device sit0 entered promiscuous mode [ 394.561723][T13270] device sit0 left promiscuous mode [ 394.737511][T13274] device sit0 entered promiscuous mode [ 395.259681][T13290] device bridge_slave_1 left promiscuous mode [ 395.267059][T13290] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.392470][T13290] device bridge_slave_0 left promiscuous mode [ 395.443576][T13290] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.024859][T13343] device veth0_vlan left promiscuous mode [ 397.082290][T13343] device veth0_vlan entered promiscuous mode [ 397.182584][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 397.200817][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 397.239282][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 397.934072][T13382] device veth0_vlan left promiscuous mode [ 397.969756][T13382] device veth0_vlan entered promiscuous mode [ 398.055864][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 398.071814][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 398.119994][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 399.412409][T13448] device sit0 left promiscuous mode [ 399.479577][T13445] device sit0 entered promiscuous mode [ 400.401663][T13476] syz.5.4576[13476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.401729][T13476] syz.5.4576[13476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.407863][T13495] device sit0 left promiscuous mode [ 401.486649][T13499] syz.6.4593[13499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.487663][T13499] syz.6.4593[13499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.504795][T13494] device sit0 entered promiscuous mode [ 401.787831][T13504] device sit0 left promiscuous mode [ 401.923462][T13511] device sit0 entered promiscuous mode [ 402.509844][T13542] FAULT_INJECTION: forcing a failure. [ 402.509844][T13542] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 402.603686][T13542] CPU: 0 PID: 13542 Comm: syz.7.4596 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 402.615181][T13542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 402.625423][T13542] Call Trace: [ 402.628780][T13542] __dump_stack+0x21/0x24 [ 402.633168][T13542] dump_stack_lvl+0x169/0x1d8 [ 402.637893][T13542] ? show_regs_print_info+0x18/0x18 [ 402.643274][T13542] ? finish_task_switch+0x12e/0x5a0 [ 402.648546][T13542] ? switch_mm_irqs_off+0x763/0x9a0 [ 402.653803][T13542] dump_stack+0x15/0x1c [ 402.658011][T13542] should_fail+0x3c1/0x510 [ 402.662496][T13542] should_fail_usercopy+0x1a/0x20 [ 402.667599][T13542] _copy_to_user+0x20/0x90 [ 402.672084][T13542] vti6_ioctl+0x50c/0xe10 [ 402.676480][T13542] ? vti6_tnl_xmit+0x15c0/0x15c0 [ 402.681492][T13542] ? full_name_hash+0xbd/0xf0 [ 402.686279][T13542] dev_ifsioc+0x69b/0xa50 [ 402.690684][T13542] ? dev_ioctl+0xb80/0xb80 [ 402.695154][T13542] dev_ioctl+0x5ea/0xb80 [ 402.699457][T13542] sock_ioctl+0x6a0/0x710 [ 402.704029][T13542] ? sock_poll+0x360/0x360 [ 402.708516][T13542] ? __fget_files+0x2c4/0x320 [ 402.713266][T13542] ? security_file_ioctl+0x84/0xa0 [ 402.718430][T13542] ? sock_poll+0x360/0x360 [ 402.722898][T13542] __se_sys_ioctl+0x121/0x1a0 [ 402.727733][T13542] __x64_sys_ioctl+0x7b/0x90 [ 402.732392][T13542] do_syscall_64+0x31/0x40 [ 402.736877][T13542] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 402.742968][T13542] RIP: 0033:0x7f80071c4929 [ 402.747518][T13542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.767335][T13542] RSP: 002b:00007f800582d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 402.775786][T13542] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 402.783777][T13542] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 402.791758][T13542] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 402.799750][T13542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.807746][T13542] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 [ 403.330884][T13557] device sit0 entered promiscuous mode [ 403.700274][T13568] device sit0 left promiscuous mode [ 403.769995][T13565] device sit0 entered promiscuous mode [ 403.848199][T13578] syz.5.4606[13578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.848262][T13578] syz.5.4606[13578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.318099][T13606] syz.7.4618[13606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.360887][T13606] syz.7.4618[13606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.561664][T13617] device sit0 left promiscuous mode [ 404.808222][T13620] device sit0 entered promiscuous mode [ 405.658281][T13651] syz.6.4631[13651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.658349][T13651] syz.6.4631[13651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.297346][T13665] device sit0 left promiscuous mode [ 406.418927][T13658] device sit0 entered promiscuous mode [ 406.580715][T13674] device sit0 left promiscuous mode [ 407.846764][T13713] device sit0 left promiscuous mode [ 408.035662][T13720] FAULT_INJECTION: forcing a failure. [ 408.035662][T13720] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 408.128373][T13722] syz.7.4656[13722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.128433][T13722] syz.7.4656[13722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.170065][T13720] CPU: 0 PID: 13720 Comm: syz.9.4655 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 408.192841][T13720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 408.203218][T13720] Call Trace: [ 408.206543][T13720] __dump_stack+0x21/0x24 [ 408.210903][T13720] dump_stack_lvl+0x169/0x1d8 [ 408.215607][T13720] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 408.221464][T13720] ? show_regs_print_info+0x18/0x18 [ 408.226687][T13720] dump_stack+0x15/0x1c [ 408.230963][T13720] should_fail+0x3c1/0x510 [ 408.235407][T13720] should_fail_usercopy+0x1a/0x20 [ 408.240447][T13720] _copy_from_user+0x20/0xd0 [ 408.245153][T13720] generic_map_update_batch+0x4a4/0x740 [ 408.250718][T13720] ? bpf_enable_instrumentation+0x50/0x50 [ 408.256554][T13720] ? __fdget+0x1a1/0x230 [ 408.260824][T13720] ? bpf_enable_instrumentation+0x50/0x50 [ 408.266691][T13720] bpf_map_do_batch+0x463/0x5f0 [ 408.271570][T13720] __se_sys_bpf+0x55a/0x680 [ 408.276083][T13720] ? __x64_sys_bpf+0x90/0x90 [ 408.280698][T13720] ? debug_smp_processor_id+0x17/0x20 [ 408.286172][T13720] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 408.292465][T13720] __x64_sys_bpf+0x7b/0x90 [ 408.296906][T13720] do_syscall_64+0x31/0x40 [ 408.301639][T13720] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 408.307790][T13720] RIP: 0033:0x7fc01857d929 [ 408.312228][T13720] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.331987][T13720] RSP: 002b:00007fc016be6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 408.340550][T13720] RAX: ffffffffffffffda RBX: 00007fc0187a4fa0 RCX: 00007fc01857d929 [ 408.348541][T13720] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 408.356528][T13720] RBP: 00007fc016be6090 R08: 0000000000000000 R09: 0000000000000000 [ 408.364531][T13720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 408.372529][T13720] R13: 0000000000000000 R14: 00007fc0187a4fa0 R15: 00007ffc2872e0c8 [ 408.651731][T13744] device sit0 entered promiscuous mode [ 408.972585][T13760] syz.5.4670[13760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.972657][T13760] syz.5.4670[13760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.330282][T13788] FAULT_INJECTION: forcing a failure. [ 409.330282][T13788] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 409.367246][T13788] CPU: 1 PID: 13788 Comm: syz.6.4677 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 409.378664][T13788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 409.388744][T13788] Call Trace: [ 409.392053][T13788] __dump_stack+0x21/0x24 [ 409.396402][T13788] dump_stack_lvl+0x169/0x1d8 [ 409.401098][T13788] ? show_regs_print_info+0x18/0x18 [ 409.406323][T13788] ? netdev_refcnt_read+0x1d0/0x1d0 [ 409.411659][T13788] ? dev_ifsioc+0x69b/0xa50 [ 409.416200][T13788] dump_stack+0x15/0x1c [ 409.420370][T13788] should_fail+0x3c1/0x510 [ 409.424888][T13788] should_fail_usercopy+0x1a/0x20 [ 409.429932][T13788] _copy_to_user+0x20/0x90 [ 409.434365][T13788] sock_ioctl+0x6d7/0x710 [ 409.438706][T13788] ? sock_poll+0x360/0x360 [ 409.443126][T13788] ? __fget_files+0x2c4/0x320 [ 409.447817][T13788] ? security_file_ioctl+0x84/0xa0 [ 409.452933][T13788] ? sock_poll+0x360/0x360 [ 409.457361][T13788] __se_sys_ioctl+0x121/0x1a0 [ 409.462049][T13788] __x64_sys_ioctl+0x7b/0x90 [ 409.466651][T13788] do_syscall_64+0x31/0x40 [ 409.471093][T13788] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 409.476991][T13788] RIP: 0033:0x7fdf2fbce929 [ 409.481404][T13788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 409.501012][T13788] RSP: 002b:00007fdf2e237038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 409.509443][T13788] RAX: ffffffffffffffda RBX: 00007fdf2fdf5fa0 RCX: 00007fdf2fbce929 [ 409.517417][T13788] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 409.525384][T13788] RBP: 00007fdf2e237090 R08: 0000000000000000 R09: 0000000000000000 [ 409.533352][T13788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 409.541325][T13788] R13: 0000000000000000 R14: 00007fdf2fdf5fa0 R15: 00007fff42796528 [ 409.573864][T13791] syz.8.4682[13791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.573917][T13791] syz.8.4682[13791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.143032][ T24] audit: type=1400 audit(1750958082.540:164): avc: denied { create } for pid=13842 comm="syz.5.4703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 411.014531][T13881] device sit0 left promiscuous mode [ 411.199648][T13890] device sit0 entered promiscuous mode [ 411.250724][T13899] device sit0 left promiscuous mode [ 411.761509][T13931] device sit0 entered promiscuous mode [ 412.023339][T13945] FAULT_INJECTION: forcing a failure. [ 412.023339][T13945] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 412.088792][T13945] CPU: 1 PID: 13945 Comm: syz.7.4739 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 412.100273][T13945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 412.110363][T13945] Call Trace: [ 412.113680][T13945] __dump_stack+0x21/0x24 [ 412.118030][T13945] dump_stack_lvl+0x169/0x1d8 [ 412.122724][T13945] ? show_regs_print_info+0x18/0x18 [ 412.127932][T13945] ? htab_lru_map_update_elem+0x55e/0x670 [ 412.133664][T13945] dump_stack+0x15/0x1c [ 412.137832][T13945] should_fail+0x3c1/0x510 [ 412.142269][T13945] should_fail_usercopy+0x1a/0x20 [ 412.147320][T13945] _copy_from_user+0x20/0xd0 [ 412.151927][T13945] generic_map_update_batch+0x450/0x740 [ 412.157491][T13945] ? bpf_enable_instrumentation+0x50/0x50 [ 412.163223][T13945] ? __fdget+0x1a1/0x230 [ 412.167486][T13945] ? bpf_enable_instrumentation+0x50/0x50 [ 412.173214][T13945] bpf_map_do_batch+0x463/0x5f0 [ 412.178081][T13945] __se_sys_bpf+0x55a/0x680 [ 412.182591][T13945] ? __x64_sys_bpf+0x90/0x90 [ 412.187198][T13945] ? debug_smp_processor_id+0x17/0x20 [ 412.192581][T13945] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 412.198668][T13945] __x64_sys_bpf+0x7b/0x90 [ 412.203098][T13945] do_syscall_64+0x31/0x40 [ 412.207530][T13945] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 412.213434][T13945] RIP: 0033:0x7f80071c4929 [ 412.217865][T13945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.237503][T13945] RSP: 002b:00007f800582d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 412.245956][T13945] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 412.253955][T13945] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 412.262115][T13945] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 412.270107][T13945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 412.278103][T13945] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 [ 412.490810][T13953] FAULT_INJECTION: forcing a failure. [ 412.490810][T13953] name failslab, interval 1, probability 0, space 0, times 0 [ 412.531783][T13953] CPU: 1 PID: 13953 Comm: syz.8.4743 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 412.543345][T13953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 412.553439][T13953] Call Trace: [ 412.556795][T13953] __dump_stack+0x21/0x24 [ 412.561335][T13953] dump_stack_lvl+0x169/0x1d8 [ 412.566031][T13953] ? show_regs_print_info+0x18/0x18 [ 412.571275][T13953] dump_stack+0x15/0x1c [ 412.575444][T13953] should_fail+0x3c1/0x510 [ 412.579874][T13953] ? vm_area_dup+0x26/0x250 [ 412.584391][T13953] __should_failslab+0xa4/0xe0 [ 412.589167][T13953] should_failslab+0x9/0x20 [ 412.593675][T13953] kmem_cache_alloc+0x3d/0x2e0 [ 412.598452][T13953] vm_area_dup+0x26/0x250 [ 412.602807][T13953] copy_mm+0x8b2/0x1480 [ 412.607035][T13953] ? copy_signal+0x600/0x600 [ 412.611629][T13953] ? __init_rwsem+0xd5/0x1c0 [ 412.616230][T13953] ? copy_signal+0x4cb/0x600 [ 412.620812][T13953] copy_process+0x1187/0x32c0 [ 412.625509][T13953] ? proc_fail_nth_read+0x210/0x210 [ 412.630705][T13953] ? __pidfd_prepare+0x150/0x150 [ 412.635735][T13953] ? rw_verify_area+0x1c0/0x360 [ 412.640580][T13953] ? vfs_write+0xac8/0xd60 [ 412.645029][T13953] kernel_clone+0x23f/0x940 [ 412.649525][T13953] ? kernel_write+0x3c0/0x3c0 [ 412.654196][T13953] ? create_io_thread+0x130/0x130 [ 412.659221][T13953] ? mutex_lock+0x8c/0xe0 [ 412.663549][T13953] __x64_sys_clone+0x176/0x1d0 [ 412.668392][T13953] ? __ia32_sys_vfork+0xf0/0xf0 [ 412.673239][T13953] ? ksys_write+0x1eb/0x240 [ 412.677739][T13953] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 412.683803][T13953] do_syscall_64+0x31/0x40 [ 412.688222][T13953] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 412.694259][T13953] RIP: 0033:0x7ff8a47ff929 [ 412.698822][T13953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.718472][T13953] RSP: 002b:00007ff8a2e67fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 412.726885][T13953] RAX: ffffffffffffffda RBX: 00007ff8a4a26fa0 RCX: 00007ff8a47ff929 [ 412.734857][T13953] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 412.742831][T13953] RBP: 00007ff8a2e68090 R08: 0000000000000000 R09: 0000000000000000 [ 412.750895][T13953] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 412.758864][T13953] R13: 0000000000000000 R14: 00007ff8a4a26fa0 R15: 00007ffff55518a8 [ 412.896182][T13966] syz.5.4748[13966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.896265][T13966] syz.5.4748[13966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.155059][T13978] device sit0 entered promiscuous mode [ 413.833581][T13989] device sit0 left promiscuous mode [ 414.625037][T14004] syz.6.4760[14004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.625106][T14004] syz.6.4760[14004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.848936][T14013] device sit0 entered promiscuous mode [ 415.282785][T14043] syz.8.4776[14043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.282853][T14043] syz.8.4776[14043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.023037][T14071] device sit0 left promiscuous mode [ 416.196839][T14079] device sit0 left promiscuous mode [ 416.299662][T14074] device sit0 entered promiscuous mode [ 416.382344][T14085] syz.7.4789[14085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.382409][T14085] syz.7.4789[14085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.900390][T14111] syz.6.4800[14111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.027998][T14111] syz.6.4800[14111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.040925][T14109] device sit0 entered promiscuous mode [ 419.315406][T14176] FAULT_INJECTION: forcing a failure. [ 419.315406][T14176] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 419.347017][T14176] CPU: 0 PID: 14176 Comm: syz.5.4819 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 419.358571][T14176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 419.368650][T14176] Call Trace: [ 419.371978][T14176] __dump_stack+0x21/0x24 [ 419.376325][T14176] dump_stack_lvl+0x169/0x1d8 [ 419.381017][T14176] ? show_regs_print_info+0x18/0x18 [ 419.386227][T14176] dump_stack+0x15/0x1c [ 419.390395][T14176] should_fail+0x3c1/0x510 [ 419.394915][T14176] should_fail_alloc_page+0x4f/0x60 [ 419.400115][T14176] __alloc_pages_nodemask+0x109/0x5f0 [ 419.405499][T14176] ? arch_stack_walk+0xee/0x140 [ 419.410350][T14176] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 419.415893][T14176] ? stack_trace_snprint+0xf0/0xf0 [ 419.421000][T14176] ? _raw_spin_lock+0x8e/0xe0 [ 419.425672][T14176] ? __kasan_check_write+0x14/0x20 [ 419.430779][T14176] pte_alloc_one+0x1f/0xc0 [ 419.435192][T14176] __pte_alloc+0x24/0x1d0 [ 419.439514][T14176] copy_page_range+0x23ad/0x2870 [ 419.444465][T14176] ? pfn_valid+0x1c0/0x1c0 [ 419.448879][T14176] ? trace_raw_output_vm_unmapped_area+0x210/0x210 [ 419.455375][T14176] ? _raw_write_unlock+0x2b/0x60 [ 419.460307][T14176] copy_mm+0xc63/0x1480 [ 419.464460][T14176] ? copy_signal+0x600/0x600 [ 419.469042][T14176] ? __init_rwsem+0xd5/0x1c0 [ 419.473623][T14176] ? copy_signal+0x4cb/0x600 [ 419.478206][T14176] copy_process+0x1187/0x32c0 [ 419.482883][T14176] ? proc_fail_nth_read+0x210/0x210 [ 419.488078][T14176] ? __pidfd_prepare+0x150/0x150 [ 419.493006][T14176] ? rw_verify_area+0x1c0/0x360 [ 419.497849][T14176] ? vfs_write+0xac8/0xd60 [ 419.502260][T14176] kernel_clone+0x23f/0x940 [ 419.506758][T14176] ? kernel_write+0x3c0/0x3c0 [ 419.511429][T14176] ? _raw_spin_unlock_irq+0x4e/0x70 [ 419.516618][T14176] ? create_io_thread+0x130/0x130 [ 419.521633][T14176] ? mutex_lock+0x8c/0xe0 [ 419.525957][T14176] __x64_sys_clone+0x176/0x1d0 [ 419.530713][T14176] ? __ia32_sys_vfork+0xf0/0xf0 [ 419.535556][T14176] ? ksys_write+0x1eb/0x240 [ 419.540060][T14176] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 419.546118][T14176] do_syscall_64+0x31/0x40 [ 419.550534][T14176] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 419.556423][T14176] RIP: 0033:0x7fb9cb225929 [ 419.560834][T14176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 419.580434][T14176] RSP: 002b:00007fb9c988dfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 419.588852][T14176] RAX: ffffffffffffffda RBX: 00007fb9cb44cfa0 RCX: 00007fb9cb225929 [ 419.596825][T14176] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 419.604799][T14176] RBP: 00007fb9c988e090 R08: 0000000000000000 R09: 0000000000000000 [ 419.612773][T14176] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 419.620751][T14176] R13: 0000000000000000 R14: 00007fb9cb44cfa0 R15: 00007ffed777d518 [ 419.926642][T14191] device sit0 left promiscuous mode [ 419.999709][T14191] device sit0 entered promiscuous mode [ 420.834328][T14218] device sit0 left promiscuous mode [ 420.877328][T14219] device sit0 left promiscuous mode [ 420.902877][T14218] device sit0 entered promiscuous mode [ 420.943251][T14219] device sit0 entered promiscuous mode [ 422.613293][T14289] device sit0 left promiscuous mode [ 422.742679][T14292] device sit0 entered promiscuous mode [ 424.068255][T14332] device wg2 entered promiscuous mode [ 424.302165][T14342] device veth1_macvtap left promiscuous mode [ 424.327340][T14342] device macsec0 left promiscuous mode [ 424.404957][ T24] audit: type=1400 audit(1750958096.800:165): avc: denied { create } for pid=14340 comm="syz.5.4882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 425.127708][T14358] device sit0 left promiscuous mode [ 425.157495][T14366] FAULT_INJECTION: forcing a failure. [ 425.157495][T14366] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 425.260185][T14366] CPU: 1 PID: 14366 Comm: syz.9.4891 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 425.271597][T14366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 425.281659][T14366] Call Trace: [ 425.284963][T14366] __dump_stack+0x21/0x24 [ 425.289313][T14366] dump_stack_lvl+0x169/0x1d8 [ 425.294011][T14366] ? show_regs_print_info+0x18/0x18 [ 425.299231][T14366] dump_stack+0x15/0x1c [ 425.303397][T14366] should_fail+0x3c1/0x510 [ 425.307827][T14366] should_fail_alloc_page+0x4f/0x60 [ 425.313044][T14366] __alloc_pages_nodemask+0x109/0x5f0 [ 425.318430][T14366] ? sched_clock+0x3a/0x40 [ 425.322858][T14366] ? sched_clock_cpu+0x1b/0x3d0 [ 425.327710][T14366] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 425.333257][T14366] ? irq_exit_rcu+0x9/0x10 [ 425.337665][T14366] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 425.343656][T14366] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 425.349826][T14366] pte_alloc_one+0x1f/0xc0 [ 425.354384][T14366] __pte_alloc+0x24/0x1d0 [ 425.358706][T14366] copy_page_range+0x23ad/0x2870 [ 425.363651][T14366] ? pfn_valid+0x1c0/0x1c0 [ 425.368061][T14366] ? trace_raw_output_vm_unmapped_area+0x210/0x210 [ 425.374554][T14366] ? _raw_write_unlock+0x2b/0x60 [ 425.379482][T14366] copy_mm+0xc63/0x1480 [ 425.383636][T14366] ? copy_signal+0x600/0x600 [ 425.388218][T14366] ? __init_rwsem+0xd5/0x1c0 [ 425.392797][T14366] ? copy_signal+0x4cb/0x600 [ 425.397396][T14366] copy_process+0x1187/0x32c0 [ 425.402082][T14366] ? proc_fail_nth_read+0x210/0x210 [ 425.407286][T14366] ? __pidfd_prepare+0x150/0x150 [ 425.412228][T14366] ? rw_verify_area+0x1c0/0x360 [ 425.417077][T14366] ? vfs_write+0xac8/0xd60 [ 425.421489][T14366] ? __kasan_slab_free+0x11/0x20 [ 425.426417][T14366] kernel_clone+0x23f/0x940 [ 425.430911][T14366] ? kernel_write+0x3c0/0x3c0 [ 425.435577][T14366] ? create_io_thread+0x130/0x130 [ 425.440592][T14366] ? mutex_lock+0x8c/0xe0 [ 425.444949][T14366] __x64_sys_clone+0x176/0x1d0 [ 425.449712][T14366] ? __ia32_sys_vfork+0xf0/0xf0 [ 425.454553][T14366] ? ksys_write+0x1eb/0x240 [ 425.459074][T14366] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 425.465146][T14366] do_syscall_64+0x31/0x40 [ 425.469560][T14366] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 425.475452][T14366] RIP: 0033:0x7fc01857d929 [ 425.479863][T14366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 425.499469][T14366] RSP: 002b:00007fc016be5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 425.507886][T14366] RAX: ffffffffffffffda RBX: 00007fc0187a4fa0 RCX: 00007fc01857d929 [ 425.515853][T14366] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 425.523814][T14366] RBP: 00007fc016be6090 R08: 0000000000000000 R09: 0000000000000000 [ 425.531780][T14366] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 425.539850][T14366] R13: 0000000000000000 R14: 00007fc0187a4fa0 R15: 00007ffc2872e0c8 [ 425.565189][T14367] device sit0 entered promiscuous mode [ 426.051460][T14406] device sit0 left promiscuous mode [ 426.200682][T14408] device sit0 entered promiscuous mode [ 426.639291][T14440] device sit0 left promiscuous mode [ 426.807388][T14446] device sit0 entered promiscuous mode [ 427.796970][T14476] device sit0 left promiscuous mode [ 427.875526][T14476] device sit0 entered promiscuous mode [ 428.457311][T14499] device veth1_macvtap entered promiscuous mode [ 428.558273][ T757] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 429.514339][T14529] syz.8.4947[14529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.514404][T14529] syz.8.4947[14529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.138718][ T296] device veth0 left promiscuous mode [ 430.161727][ T296] bridge0: port 3(veth0) entered disabled state [ 430.188364][ T296] device bridge_slave_1 left promiscuous mode [ 430.198610][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.206259][ T296] device bridge_slave_0 left promiscuous mode [ 430.213213][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.222473][ T296] device veth1_macvtap left promiscuous mode [ 430.483034][T14578] device sit0 left promiscuous mode [ 430.674933][T14580] device sit0 entered promiscuous mode [ 432.134859][T14625] FAULT_INJECTION: forcing a failure. [ 432.134859][T14625] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 432.158097][T14625] CPU: 0 PID: 14625 Comm: syz.7.4980 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 432.169532][T14625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 432.179699][T14625] Call Trace: [ 432.183036][T14625] __dump_stack+0x21/0x24 [ 432.187371][T14625] dump_stack_lvl+0x169/0x1d8 [ 432.192073][T14625] ? show_regs_print_info+0x18/0x18 [ 432.197279][T14625] ? debug_smp_processor_id+0x17/0x20 [ 432.202655][T14625] dump_stack+0x15/0x1c [ 432.206829][T14625] should_fail+0x3c1/0x510 [ 432.211252][T14625] should_fail_alloc_page+0x4f/0x60 [ 432.216452][T14625] __alloc_pages_nodemask+0x109/0x5f0 [ 432.221825][T14625] ? arch_stack_walk+0xee/0x140 [ 432.226685][T14625] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 432.232245][T14625] ? __kasan_check_write+0x14/0x20 [ 432.237362][T14625] ? _raw_spin_lock+0x8e/0xe0 [ 432.242043][T14625] ? __kasan_check_write+0x14/0x20 [ 432.247172][T14625] pte_alloc_one+0x1f/0xc0 [ 432.251599][T14625] __pte_alloc+0x24/0x1d0 [ 432.255930][T14625] copy_page_range+0x23ad/0x2870 [ 432.260880][T14625] ? pfn_valid+0x1c0/0x1c0 [ 432.265301][T14625] ? trace_raw_output_vm_unmapped_area+0x210/0x210 [ 432.271806][T14625] ? _raw_write_unlock+0x2b/0x60 [ 432.276750][T14625] copy_mm+0xc63/0x1480 [ 432.280911][T14625] ? copy_signal+0x600/0x600 [ 432.285501][T14625] ? __init_rwsem+0xd5/0x1c0 [ 432.290193][T14625] ? copy_signal+0x4cb/0x600 [ 432.294784][T14625] copy_process+0x1187/0x32c0 [ 432.299464][T14625] ? proc_fail_nth_read+0x210/0x210 [ 432.304667][T14625] ? __pidfd_prepare+0x150/0x150 [ 432.309605][T14625] ? rw_verify_area+0x1c0/0x360 [ 432.314458][T14625] ? vfs_write+0xac8/0xd60 [ 432.318869][T14625] kernel_clone+0x23f/0x940 [ 432.323382][T14625] ? kernel_write+0x3c0/0x3c0 [ 432.328079][T14625] ? create_io_thread+0x130/0x130 [ 432.333102][T14625] ? mutex_lock+0x8c/0xe0 [ 432.337427][T14625] __x64_sys_clone+0x176/0x1d0 [ 432.342189][T14625] ? __ia32_sys_vfork+0xf0/0xf0 [ 432.347032][T14625] ? ksys_write+0x1eb/0x240 [ 432.351541][T14625] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 432.357604][T14625] do_syscall_64+0x31/0x40 [ 432.362021][T14625] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 432.367914][T14625] RIP: 0033:0x7f80071c4929 [ 432.372331][T14625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 432.392169][T14625] RSP: 002b:00007f800582cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 432.400590][T14625] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 432.408571][T14625] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 432.416690][T14625] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 432.424671][T14625] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 432.432649][T14625] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 [ 437.248310][T14755] FAULT_INJECTION: forcing a failure. [ 437.248310][T14755] name failslab, interval 1, probability 0, space 0, times 0 [ 437.327941][T14755] CPU: 1 PID: 14755 Comm: syz.8.5029 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 437.339565][T14755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 437.349627][T14755] Call Trace: [ 437.352937][T14755] __dump_stack+0x21/0x24 [ 437.357276][T14755] dump_stack_lvl+0x169/0x1d8 [ 437.361958][T14755] ? show_regs_print_info+0x18/0x18 [ 437.367162][T14755] dump_stack+0x15/0x1c [ 437.371320][T14755] should_fail+0x3c1/0x510 [ 437.375747][T14755] ? security_file_alloc+0x33/0x120 [ 437.380955][T14755] __should_failslab+0xa4/0xe0 [ 437.385727][T14755] should_failslab+0x9/0x20 [ 437.390232][T14755] kmem_cache_alloc+0x3d/0x2e0 [ 437.395001][T14755] ? __alloc_file+0x28/0x320 [ 437.399603][T14755] security_file_alloc+0x33/0x120 [ 437.404630][T14755] __alloc_file+0xb5/0x320 [ 437.409050][T14755] alloc_empty_file+0x97/0x180 [ 437.413947][T14755] path_openat+0xf2/0x3160 [ 437.418376][T14755] ? __kasan_slab_alloc+0xcf/0xf0 [ 437.423402][T14755] ? __kasan_slab_alloc+0xbd/0xf0 [ 437.428433][T14755] ? kmem_cache_alloc+0x165/0x2e0 [ 437.433456][T14755] ? getname_flags+0xb9/0x500 [ 437.438232][T14755] ? getname+0x19/0x20 [ 437.442298][T14755] ? __x64_sys_openat+0x136/0x160 [ 437.447319][T14755] ? do_syscall_64+0x31/0x40 [ 437.451911][T14755] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 437.457977][T14755] ? do_filp_open+0x3e0/0x3e0 [ 437.462781][T14755] do_filp_open+0x1b3/0x3e0 [ 437.467285][T14755] ? vfs_tmpfile+0x2c0/0x2c0 [ 437.471878][T14755] ? get_unused_fd_flags+0x92/0xa0 [ 437.476996][T14755] do_sys_openat2+0x14c/0x6d0 [ 437.481675][T14755] ? __kasan_check_write+0x14/0x20 [ 437.486790][T14755] ? fput_many+0x15a/0x1a0 [ 437.491211][T14755] ? do_sys_open+0xe0/0xe0 [ 437.495641][T14755] ? fput+0x1a/0x20 [ 437.499449][T14755] ? ksys_write+0x1eb/0x240 [ 437.504400][T14755] ? __ia32_sys_read+0x90/0x90 [ 437.509180][T14755] ? fpu__clear_all+0x20/0x20 [ 437.513876][T14755] __x64_sys_openat+0x136/0x160 [ 437.518743][T14755] do_syscall_64+0x31/0x40 [ 437.523175][T14755] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 437.529117][T14755] RIP: 0033:0x7ff8a47ff929 [ 437.533548][T14755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 437.553376][T14755] RSP: 002b:00007ff8a2e68038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 437.561797][T14755] RAX: ffffffffffffffda RBX: 00007ff8a4a26fa0 RCX: 00007ff8a47ff929 [ 437.569958][T14755] RDX: 0000000000000000 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 437.578114][T14755] RBP: 00007ff8a2e68090 R08: 0000000000000000 R09: 0000000000000000 [ 437.586091][T14755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 437.594084][T14755] R13: 0000000000000000 R14: 00007ff8a4a26fa0 R15: 00007ffff55518a8 [ 438.943882][T14796] FAULT_INJECTION: forcing a failure. [ 438.943882][T14796] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 438.977958][T14796] CPU: 0 PID: 14796 Comm: syz.5.5044 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 438.989404][T14796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 438.999462][T14796] Call Trace: [ 439.002758][T14796] __dump_stack+0x21/0x24 [ 439.007089][T14796] dump_stack_lvl+0x169/0x1d8 [ 439.011900][T14796] ? show_regs_print_info+0x18/0x18 [ 439.017110][T14796] dump_stack+0x15/0x1c [ 439.021289][T14796] should_fail+0x3c1/0x510 [ 439.025700][T14796] should_fail_usercopy+0x1a/0x20 [ 439.030716][T14796] _copy_from_user+0x20/0xd0 [ 439.035321][T14796] generic_map_update_batch+0x450/0x740 [ 439.040869][T14796] ? __irq_exit_rcu+0x40/0x150 [ 439.045827][T14796] ? bpf_enable_instrumentation+0x50/0x50 [ 439.051562][T14796] ? bpf_enable_instrumentation+0x50/0x50 [ 439.057305][T14796] bpf_map_do_batch+0x463/0x5f0 [ 439.062157][T14796] __se_sys_bpf+0x55a/0x680 [ 439.066656][T14796] ? __x64_sys_bpf+0x90/0x90 [ 439.071272][T14796] ? debug_smp_processor_id+0x17/0x20 [ 439.076657][T14796] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 439.082721][T14796] __x64_sys_bpf+0x7b/0x90 [ 439.087133][T14796] do_syscall_64+0x31/0x40 [ 439.091554][T14796] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 439.097475][T14796] RIP: 0033:0x7fb9cb225929 [ 439.101903][T14796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 439.121532][T14796] RSP: 002b:00007fb9c988e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 439.129956][T14796] RAX: ffffffffffffffda RBX: 00007fb9cb44cfa0 RCX: 00007fb9cb225929 [ 439.137927][T14796] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 439.145909][T14796] RBP: 00007fb9c988e090 R08: 0000000000000000 R09: 0000000000000000 [ 439.153874][T14796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 439.161837][T14796] R13: 0000000000000000 R14: 00007fb9cb44cfa0 R15: 00007ffed777d518 [ 440.883709][T14834] FAULT_INJECTION: forcing a failure. [ 440.883709][T14834] name failslab, interval 1, probability 0, space 0, times 0 [ 440.907698][T14834] CPU: 0 PID: 14834 Comm: syz.6.5062 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 440.919114][T14834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 440.929187][T14834] Call Trace: [ 440.932510][T14834] __dump_stack+0x21/0x24 [ 440.936864][T14834] dump_stack_lvl+0x169/0x1d8 [ 440.941558][T14834] ? thaw_kernel_threads+0x220/0x220 [ 440.946871][T14834] ? show_regs_print_info+0x18/0x18 [ 440.952076][T14834] ? slab_post_alloc_hook+0x7d/0x2f0 [ 440.957365][T14834] ? vma_interval_tree_augment_rotate+0x1f0/0x1f0 [ 440.963871][T14834] dump_stack+0x15/0x1c [ 440.968032][T14834] should_fail+0x3c1/0x510 [ 440.972454][T14834] ? anon_vma_fork+0xf2/0x510 [ 440.977147][T14834] __should_failslab+0xa4/0xe0 [ 440.981933][T14834] should_failslab+0x9/0x20 [ 440.986451][T14834] kmem_cache_alloc+0x3d/0x2e0 [ 440.991239][T14834] anon_vma_fork+0xf2/0x510 [ 440.995744][T14834] copy_mm+0x95e/0x1480 [ 440.999910][T14834] ? copy_signal+0x600/0x600 [ 441.004501][T14834] ? __init_rwsem+0xd5/0x1c0 [ 441.009089][T14834] ? copy_signal+0x4cb/0x600 [ 441.013687][T14834] copy_process+0x1187/0x32c0 [ 441.018367][T14834] ? proc_fail_nth_read+0x210/0x210 [ 441.023666][T14834] ? __pidfd_prepare+0x150/0x150 [ 441.028629][T14834] ? rw_verify_area+0x1c0/0x360 [ 441.033479][T14834] ? vfs_write+0xac8/0xd60 [ 441.037916][T14834] ? __kasan_slab_free+0x11/0x20 [ 441.043042][T14834] kernel_clone+0x23f/0x940 [ 441.047546][T14834] ? kernel_write+0x3c0/0x3c0 [ 441.052241][T14834] ? create_io_thread+0x130/0x130 [ 441.057263][T14834] ? mutex_lock+0x8c/0xe0 [ 441.061600][T14834] __x64_sys_clone+0x176/0x1d0 [ 441.066364][T14834] ? __ia32_sys_vfork+0xf0/0xf0 [ 441.071210][T14834] ? ksys_write+0x1eb/0x240 [ 441.075720][T14834] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 441.081789][T14834] do_syscall_64+0x31/0x40 [ 441.086210][T14834] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 441.092101][T14834] RIP: 0033:0x7fdf2fbce929 [ 441.096517][T14834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.116271][T14834] RSP: 002b:00007fdf2e236fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 441.124682][T14834] RAX: ffffffffffffffda RBX: 00007fdf2fdf5fa0 RCX: 00007fdf2fbce929 [ 441.132652][T14834] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 441.140625][T14834] RBP: 00007fdf2e237090 R08: 0000000000000000 R09: 0000000000000000 [ 441.148604][T14834] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 441.156572][T14834] R13: 0000000000000000 R14: 00007fdf2fdf5fa0 R15: 00007fff42796528 [ 444.589037][T14905] syz.5.5084[14905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.589113][T14905] syz.5.5084[14905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.174387][T14914] FAULT_INJECTION: forcing a failure. [ 446.174387][T14914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 446.217752][T14914] CPU: 0 PID: 14914 Comm: syz.6.5088 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 446.229206][T14914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 446.239266][T14914] Call Trace: [ 446.242566][T14914] __dump_stack+0x21/0x24 [ 446.246893][T14914] dump_stack_lvl+0x169/0x1d8 [ 446.251574][T14914] ? thaw_kernel_threads+0x220/0x220 [ 446.256857][T14914] ? vsnprintf+0x1871/0x1960 [ 446.261446][T14914] ? show_regs_print_info+0x18/0x18 [ 446.266652][T14914] dump_stack+0x15/0x1c [ 446.270802][T14914] should_fail+0x3c1/0x510 [ 446.275391][T14914] should_fail_usercopy+0x1a/0x20 [ 446.280429][T14914] _copy_to_user+0x20/0x90 [ 446.284854][T14914] simple_read_from_buffer+0xe9/0x160 [ 446.290226][T14914] proc_fail_nth_read+0x19a/0x210 [ 446.295252][T14914] ? proc_fault_inject_write+0x2f0/0x2f0 [ 446.300881][T14914] ? rw_verify_area+0x1c0/0x360 [ 446.305741][T14914] ? proc_fault_inject_write+0x2f0/0x2f0 [ 446.311370][T14914] vfs_read+0x1fe/0xa10 [ 446.315613][T14914] ? kernel_read+0x70/0x70 [ 446.320029][T14914] ? __kasan_check_write+0x14/0x20 [ 446.325227][T14914] ? mutex_lock+0x8c/0xe0 [ 446.329556][T14914] ? mutex_trylock+0xa0/0xa0 [ 446.334396][T14914] ? __fget_files+0x2c4/0x320 [ 446.339079][T14914] ? __fdget_pos+0x2d2/0x380 [ 446.343659][T14914] ? ksys_read+0x71/0x240 [ 446.347991][T14914] ksys_read+0x140/0x240 [ 446.352231][T14914] ? vfs_write+0xd60/0xd60 [ 446.356662][T14914] ? fpu__clear_all+0x20/0x20 [ 446.361332][T14914] __x64_sys_read+0x7b/0x90 [ 446.365825][T14914] do_syscall_64+0x31/0x40 [ 446.370236][T14914] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 446.376117][T14914] RIP: 0033:0x7fdf2fbcd33c [ 446.380537][T14914] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 446.400250][T14914] RSP: 002b:00007fdf2e237030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 446.408818][T14914] RAX: ffffffffffffffda RBX: 00007fdf2fdf5fa0 RCX: 00007fdf2fbcd33c [ 446.416798][T14914] RDX: 000000000000000f RSI: 00007fdf2e2370a0 RDI: 0000000000000003 [ 446.424771][T14914] RBP: 00007fdf2e237090 R08: 0000000000000000 R09: 0000000000000000 [ 446.432741][T14914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 446.440716][T14914] R13: 0000000000000000 R14: 00007fdf2fdf5fa0 R15: 00007fff42796528 [ 446.469996][T14918] device veth0_vlan left promiscuous mode [ 446.485423][T14918] device veth0_vlan entered promiscuous mode [ 446.504208][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 446.518171][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 446.535635][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 446.556649][T14922] device macsec0 left promiscuous mode [ 446.563622][T14928] device veth1_macvtap entered promiscuous mode [ 446.595336][T14928] device macsec0 entered promiscuous mode [ 446.641148][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 448.529062][T14957] device wg2 left promiscuous mode [ 456.993977][T15051] FAULT_INJECTION: forcing a failure. [ 456.993977][T15051] name failslab, interval 1, probability 0, space 0, times 0 [ 457.037758][T15051] CPU: 0 PID: 15051 Comm: syz.7.5134 Tainted: G W 5.10.238-syzkaller-00008-g59e9a7228857 #0 [ 457.049219][T15051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 457.059300][T15051] Call Trace: [ 457.062618][T15051] __dump_stack+0x21/0x24 [ 457.066978][T15051] dump_stack_lvl+0x169/0x1d8 [ 457.071686][T15051] ? thaw_kernel_threads+0x220/0x220 [ 457.077007][T15051] ? show_regs_print_info+0x18/0x18 [ 457.082249][T15051] dump_stack+0x15/0x1c [ 457.086420][T15051] should_fail+0x3c1/0x510 [ 457.090863][T15051] ? anon_vma_clone+0xc0/0x500 [ 457.095656][T15051] __should_failslab+0xa4/0xe0 [ 457.100637][T15051] should_failslab+0x9/0x20 [ 457.105148][T15051] kmem_cache_alloc+0x3d/0x2e0 [ 457.109920][T15051] anon_vma_clone+0xc0/0x500 [ 457.114531][T15051] ? vm_area_dup+0x26/0x250 [ 457.119055][T15051] anon_vma_fork+0x8c/0x510 [ 457.123596][T15051] copy_mm+0x95e/0x1480 [ 457.127781][T15051] ? copy_signal+0x600/0x600 [ 457.132391][T15051] ? __init_rwsem+0xd5/0x1c0 [ 457.136998][T15051] ? copy_signal+0x4cb/0x600 [ 457.141630][T15051] copy_process+0x1187/0x32c0 [ 457.146332][T15051] ? proc_fail_nth_read+0x210/0x210 [ 457.151556][T15051] ? __pidfd_prepare+0x150/0x150 [ 457.156584][T15051] ? rw_verify_area+0x1c0/0x360 [ 457.161466][T15051] ? vfs_write+0xac8/0xd60 [ 457.165904][T15051] ? __kasan_slab_free+0x11/0x20 [ 457.170857][T15051] kernel_clone+0x23f/0x940 [ 457.175376][T15051] ? kernel_write+0x3c0/0x3c0 [ 457.180073][T15051] ? create_io_thread+0x130/0x130 [ 457.185115][T15051] ? mutex_lock+0x8c/0xe0 [ 457.189466][T15051] __x64_sys_clone+0x176/0x1d0 [ 457.194244][T15051] ? __ia32_sys_vfork+0xf0/0xf0 [ 457.199108][T15051] ? ksys_write+0x1eb/0x240 [ 457.203641][T15051] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 457.209726][T15051] do_syscall_64+0x31/0x40 [ 457.214169][T15051] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 457.220084][T15051] RIP: 0033:0x7f80071c4929 [ 457.224514][T15051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 457.244150][T15051] RSP: 002b:00007f800582cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 457.252590][T15051] RAX: ffffffffffffffda RBX: 00007f80073ebfa0 RCX: 00007f80071c4929 [ 457.260588][T15051] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 457.268593][T15051] RBP: 00007f800582d090 R08: 0000000000000000 R09: 0000000000000000 [ 457.276591][T15051] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 457.284593][T15051] R13: 0000000000000000 R14: 00007f80073ebfa0 R15: 00007ffccad19b78 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=9 req=4949 state=3 status=67 (errno 32: Broken pipe) [ 460.011085][ T24] audit: type=1400 audit(1750958132.410:166): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[14439]" dev="pipefs" ino=14439 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 460.768138][ T757] device ip6gretap0 left promiscuous mode [ 460.773910][ T757] Ÿë: port 1(ip6gretap0) entered disabled state [ 461.719319][ T757] device bridge_slave_1 left promiscuous mode [ 461.725850][ T757] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.733834][ T757] device bridge_slave_0 left promiscuous mode [ 461.740054][ T757] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.749775][ T757] device veth1_macvtap left promiscuous mode [ 461.755793][ T757] device veth0_vlan left promiscuous mode [ 461.762438][ T757] device veth1_macvtap left promiscuous mode [ 461.768517][ T757] device veth0_vlan left promiscuous mode [ 461.774472][ T757] device veth0_vlan left promiscuous mode