last executing test programs: 11m16.290485689s ago: executing program 1 (id=460): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000010000000000000000000000711211000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETVNETBE(r0, 0x800454df, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], 0x0, 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000852f8c9e231f6c4227ad371c6ea45a715d539f5a823757fc8d277bd3560a7fd31c7d99a8aa4f5bd200e909c6996646f1de1f267f9427018fb6ffbe3c80236dc2f32ae0ba7b5af94c128f767bcca5a9ccaec371aab1479e644b398914b94115bb64c0caa32500"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x800, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d00000085"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r4}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r2, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcf, &(0x7f0000000540)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000580), &(0x7f0000000680), 0x8, 0xd4, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x1b, 0xf2, 0x6, 0x63c, 0x13000, 0xffffffffffffffff, 0x40, '\x00', r8, r6, 0x2, 0x4, 0x0, 0x0, @void, @value, @value=r5}, 0x50) recvmsg$unix(r7, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) write$cgroup_devices(r6, &(0x7f00000005c0)=ANY=[], 0xfffffeff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) 11m15.411047035s ago: executing program 1 (id=469): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000000), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) 11m15.296357917s ago: executing program 1 (id=472): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000ae000000b703000007000000850000000e000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2565], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 11m15.238863832s ago: executing program 1 (id=473): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x61]}}, &(0x7f0000000a00)=""/201, 0x1c, 0xc9, 0x0, 0x0, 0x10000, @value=r0}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0xa, 0x4, 0xf, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x0, 0x4}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000980), 0x400442, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x10, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) 11m14.664870679s ago: executing program 1 (id=478): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x87}}, @call={0x85, 0x0, 0x0, 0x9e}]}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000600000000000000000000040300000002000000000000120000000004000000000000120200000000005f"], 0x0, 0x42}, 0x28) 11m14.561854889s ago: executing program 1 (id=479): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1, 0x8000000}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00'}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x9, 0x6, 0x8, 0x8}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES64=r0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="180000020000000000050000000000000011c5c3", @ANYRESDEC=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0x2000ce, r0}, 0x38) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x632}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x189603e4342c0e17, @perf_bp={0x0}, 0x4001, 0x0, 0x0, 0xa2ed0d70c7c787cf}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd"], 0xfdef) (async) close(r5) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x66) 10m59.550042408s ago: executing program 32 (id=479): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1, 0x8000000}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00'}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x9, 0x6, 0x8, 0x8}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES64=r0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="180000020000000000050000000000000011c5c3", @ANYRESDEC=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0x2000ce, r0}, 0x38) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x632}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x189603e4342c0e17, @perf_bp={0x0}, 0x4001, 0x0, 0x0, 0xa2ed0d70c7c787cf}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd"], 0xfdef) (async) close(r5) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x66) 14.226770218s ago: executing program 3 (id=5595): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r2], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000a18120000", @ANYRES32=r4, @ANYBLOB="00000000000000006100001300000000180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x22}]}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3}, 0x57) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000280)='syzkaller\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) 12.275137171s ago: executing program 4 (id=5723): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000040000000300000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x30, 0x30, 0x3d, 0x5f]}}, &(0x7f00000017c0)=""/4096, 0x2a, 0x1000, 0x1}, 0x28) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xb, 0x1c, &(0x7f0000000540)=ANY=[@ANYBLOB="1808000000000000000000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000300008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe000000006609000003000000dbaaf0ff50000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffff670000000800000018290000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000005e9200000000000056080000010000008500000007000000b7000000000000009500000000000000871d8df332836548e2834a8e583eea395cd69f87a5de76d16fdf4c224b294055ca274c40a65eb91668e6811c5d08e68a62856273746711f42b7a3bec789ed648c4aa4ac4549f9b40c85eb9f960606c049d716d6ee32c9c3bdaf465f77e86c1772221e9f3543fcb532ab790c3ba34d914cc62963ed8882d1f63704ee701da984906166a3707f2056cc7e9c61e357c4ea521584cdea01634f7539becb63a633040e2305a8c13df3403604ef2ad6cf8fa5615c40a794eb184d00b515fd44a2ebe69f9a4e9881905"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0xd, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 11.948568393s ago: executing program 3 (id=5595): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r2], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000a18120000", @ANYRES32=r4, @ANYBLOB="00000000000000006100001300000000180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x22}]}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3}, 0x57) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000280)='syzkaller\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) 10.068856418s ago: executing program 4 (id=5729): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000040000"], 0x0, 0x80000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="7a0a00ff0000040071107400000000009500000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ef6, 0x1, @perf_bp={0x0, 0x9}, 0xe40, 0x0, 0x0, 0x7, 0x5, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000c50000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x1c, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x800}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x524}, @alu={0x4, 0x0, 0x4, 0x7, 0x1c, 0x4, 0xfffffffffffffffc}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='GPL\x00', 0x7, 0xd4, &(0x7f0000000cc0)=""/212, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x10, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000007c0)=[{0x4, 0x4, 0x2, 0xc}], 0x10, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7f50000000000f8ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0xf, &(0x7f0000000b80)=ANY=[@ANYBLOB], &(0x7f00000002c0)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000840)={0x1, 0xa, 0x0, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880), 0x0, 0x10, 0x10000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="1e00000000010000fd000000df3e000081400200", @ANYRES32=0x1, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200000002000000030000000d00"/28], 0x50) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000008c0)=ANY=[@ANYBLOB="0d00000002000000040000000240000000000000", @ANYRES32=r7, @ANYBLOB="1e00"/20, @ANYRES32, @ANYRES32, @ANYBLOB="00008d00110001000000000000010000000000e3ff000000000000"], 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffdef) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f0000000240)=ANY=[@ANYBLOB='1', @ANYRESDEC, @ANYBLOB='E'], 0x31) write$cgroup_pid(r8, &(0x7f0000000980), 0x20000992) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 9.143918129s ago: executing program 4 (id=5739): mkdir(0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x7, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000240)=ANY=[], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff37) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x8, 0x0, 0x0, 0x2, 0x0, 0x4000000400000200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={0x0, 0x8}, 0x11053c, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0xbe6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1e0000000200000040000000f9ffffff00020000", @ANYRES32=r0, @ANYBLOB="ff0100"/20, @ANYRES32, @ANYBLOB="0402000003000000011b000002000000000000000000000000323f151840e0513b2ad098f23ae88a7448852b043fcc582dff4cfcf6973bc3484d7a5910df7b68b3c2552926c197e3c291e1e031f803b26cf0636e46d83e28e77f261ad25acc5907d91f8ac640eb99f233d3dd92ae4dd9c736ed974dc9084e8895810c8663feaf9f7ee17761aa49a135bf2772efaee4867f6fae2b0162f620a2071494385cd8622370847b097b59c6805a38988d422491c9a675e6724b5e5b7925775aad5bba823423e01b223516cf0524282967e85dc3cb38969114cf4aed82c4aedcc8b7e4bec035f206cd4bdc8b4827f8ab390e6100"/262], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRESDEC=r3], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r4}, 0x10) socketpair(0x15, 0x4, 0x0, &(0x7f0000000080)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r0, @ANYBLOB="06000000000000000000000000020000001b133162c050d764c7c8348dbf72000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000000000000400"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 9.106467383s ago: executing program 3 (id=5595): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r2], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000a18120000", @ANYRES32=r4, @ANYBLOB="00000000000000006100001300000000180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x22}]}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3}, 0x57) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000280)='syzkaller\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) 6.939455596s ago: executing program 0 (id=5740): write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffdef) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000020b703000000050000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x18) close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 6.938082546s ago: executing program 5 (id=5741): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0xa, 0x2, 0x3a, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)='%pS \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0xffffffff}, 0x118920, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x6}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r4}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r5}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x5}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 6.884645452s ago: executing program 4 (id=5743): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000004be45e204d6b31f60007010000f8ffffffb702000008000000b71300000000a5de"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x2b, 0x2, 0x0, &(0x7f00000002c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c30000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x85) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x232843, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d080", 0xfdef}], 0x1, 0x0, 0x0, 0x800300}, 0x20000801) recvmsg(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 6.820443378s ago: executing program 0 (id=5745): r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x1}, 0x0, 0xc8, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x8010}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) (async, rerun: 32) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) close(r5) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd63"], 0xfdef) 6.656353614s ago: executing program 0 (id=5746): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000040000000300000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x30, 0x30, 0x3d, 0x5f]}}, &(0x7f00000017c0)=""/4096, 0x2a, 0x1000, 0x1}, 0x28) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xb, 0x1c, &(0x7f0000000540)=ANY=[@ANYBLOB="1808000000000000000000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000800400008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe000000006609000003000000dbaaf0ff50000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffff670000000800000018290000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0xd, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6.208373018s ago: executing program 0 (id=5747): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000017000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x4, 0x0, &(0x7f00000002c0)="00000002", 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x5, 0x7, 0x8, 0x5, 0x80}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r3, 0x2000012, 0x100e, 0x2, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 6.195949859s ago: executing program 3 (id=5595): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r2], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000a18120000", @ANYRES32=r4, @ANYBLOB="00000000000000006100001300000000180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x22}]}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3}, 0x57) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000280)='syzkaller\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) 4.06344765s ago: executing program 0 (id=5748): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x2, [@type_tag={0x7, 0x0, 0x0, 0x12, 0x4}, @struct={0x6, 0x6, 0x0, 0x4, 0x1, 0x1, [{0x3, 0x2, 0x7f}, {0xe, 0x5, 0x6}, {0x7, 0x4, 0x2}, {0x0, 0x3, 0x4}, {0x8, 0x1}, {0x2, 0x0, 0xd9}]}, @fwd={0xd}]}}, &(0x7f0000001d40)=""/4096, 0x86, 0x1000, 0x0, 0x48}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x13, 0x13, &(0x7f0000000680)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffa}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @generic={0x1, 0x6, 0x9, 0x3, 0x100}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x1000}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xb8}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @generic={0xf, 0xf, 0x7, 0x401, 0x9bd}], &(0x7f0000000340)='syzkaller\x00', 0x8423054e, 0x5d, &(0x7f0000000540)=""/93, 0x40f00, 0x4a, '\x00', 0x0, @fallback=0x1e, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x3, 0x0, 0x6da}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000880)=[{0x2, 0x1, 0x6}, {0x2, 0x2, 0x2, 0x9}, {0x0, 0x3, 0x0, 0x4}], 0x10, 0x5}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000", @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r4, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000400)}, 0x20) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x25, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffc}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740), &(0x7f00000007c0), 0xffffd6c0, r5, 0x0, 0x20}, 0x38) recvmsg(0xffffffffffffffff, 0x0, 0x40) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 4.06243471s ago: executing program 5 (id=5749): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x81, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x2}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, 0xffffffffffffffff, 0x0, 0x200000}, 0x38) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, 0x0, &(0x7f0000000740), 0x80000002, r1}, 0x38) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x3, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000965afe1b94", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.idle_time\x00', 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='fib6_table_lookup\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x17, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4f5, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @map_fd={0x18, 0xb, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xff2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x1000, 0xc, &(0x7f0000000280)=""/12, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x2, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000580)=[r4, r5, r6, r11], &(0x7f00000005c0)=[{0x5, 0x5, 0xe, 0x9}, {0x0, 0x3, 0x5, 0xc}, {0x0, 0x2, 0xb, 0x4}], 0x10, 0x2df7}, 0x94) 4.0604569s ago: executing program 4 (id=5751): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r0}, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x9d1c, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x4}, r3, 0xafffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x401}, 0x0, 0xc8, 0x0, 0x7, 0x0, 0x0, 0x770a}, 0x0, 0x8000000000000000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB='\x00\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400"/20], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x14, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0xfffffffa, 0xa9, &(0x7f00000002c0)=""/169, 0x41100, 0x52, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x1, 0x5, 0x9}, 0x10, 0x143ac, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000011c0)={0x5, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x7, 0x3, &(0x7f0000001080)=@raw=[@map_fd={0x18, 0x5}, @alu={0x7, 0x1, 0xa, 0x7, 0xa, 0xfffffffffffffffe, 0xfffffffffffffffc}], &(0x7f00000010c0)='syzkaller\x00', 0x702, 0x0, 0x0, 0x40f00, 0x40, '\x00', r6, @fallback=0xe, 0xffffffffffffffff, 0x8, &(0x7f0000001140)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001180)={0x2, 0x4, 0x5, 0x8000}, 0x10, r8, r2, 0x0, 0x0, 0x0, 0x10, 0xda9}, 0x94) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781c2"], 0xfdef) syz_open_procfs$namespace(r3, &(0x7f0000001040)='ns/time_for_children\x00') mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r10 = gettid() syz_open_procfs$namespace(r10, &(0x7f0000001000)='ns/cgroup\x00') r11 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 3.709116144s ago: executing program 2 (id=5752): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r2], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="180800000000477e0000000000000000851000000600000018120000", @ANYRES32=r4, @ANYBLOB="00000000000000406100001300000000180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x22}]}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3}, 0x57) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000280)='syzkaller\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) 3.674640938s ago: executing program 5 (id=5753): mkdir(0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x7, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000240)=ANY=[], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff37) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x8, 0x0, 0x0, 0x2, 0x0, 0x4000000400000200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={0x0, 0x8}, 0x11053c, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0xbe6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r3 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1e0000000200000040000000f9ffffff00020000", @ANYRES32=r0, @ANYBLOB="ff0100"/20, @ANYRES32, @ANYBLOB="0402000003000000011b000002000000000000000000000000323f151840e0513b2ad098f23ae88a7448852b043fcc582dff4cfcf6973bc3484d7a5910df7b68b3c2552926c197e3c291e1e031f803b26cf0636e46d83e28e77f261ad25acc5907d91f8ac640eb99f233d3dd92ae4dd9c736ed974dc9084e8895810c8663feaf9f7ee17761aa49a135bf2772efaee4867f6fae2b0162f620a2071494385cd8622370847b097b59c6805a38988d422491c9a675e6724b5e5b7925775aad5bba823423e01b223516cf0524282967e85dc3cb38969114cf4aed82c4aedcc8b7e4bec035f206cd4bdc8b4827f8ab390e6100"/262], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRESDEC=r3], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r4}, 0x10) socketpair(0x15, 0x4, 0x0, &(0x7f0000000080)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r0, @ANYBLOB="06000000000000000000000000020000001b133162c050d764c7c8348dbf72000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000000000000400"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 3.477376967s ago: executing program 5 (id=5754): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x9}, 0x0, 0x2000000000000, 0x1c638, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r3, 0x0, 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d0000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f00000001c0)=0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1, &(0x7f0000000300)=@raw=[@exit], &(0x7f0000000340)='GPL\x00', 0x2, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80), 0x10, 0x2}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000004e6f0c156dfbb5e001e800"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) socketpair(0x11, 0x8000a, 0x300, 0x0) (async) socketpair(0x11, 0x8000a, 0x300, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x9, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r7}, 0x38) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r7}, 0x38) (async) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r7}, 0x38) gettid() 3.460728279s ago: executing program 2 (id=5755): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000001000000000000010000ffff21000001000000000000000105000000100000000000000000000003000000000100000002"], 0x0, 0x53, 0x0, 0x0, 0x3b00}, 0x28) 3.34493494s ago: executing program 2 (id=5756): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000280000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000001200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r4, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, 0x0, @perf_bp={0x0, 0x8}, 0x101002, 0x7, 0x8, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={0xffffffffffffffff}, 0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 3.307248504s ago: executing program 3 (id=5595): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r2], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000a18120000", @ANYRES32=r4, @ANYBLOB="00000000000000006100001300000000180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x22}]}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3}, 0x57) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000280)='syzkaller\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) 1.087790403s ago: executing program 0 (id=5757): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r2}, 0x10) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) write$cgroup_int(r4, &(0x7f0000000280)=0x72, 0x12) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000cc0)={r7}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r8}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 1.086996013s ago: executing program 5 (id=5758): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000f40)='neigh_create\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000003180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12000, 0x2, 0x0, 0x0, 0x0, 0x10, 0x1000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1341, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) 1.085487513s ago: executing program 2 (id=5759): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[], &(0x7f0000001000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r3}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[], 0x50) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r6}, 0x18) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{}, &(0x7f0000000a00), &(0x7f0000000a40)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{}, &(0x7f0000000880), &(0x7f00000008c0)=r7}, 0x20) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x4, 0x0, 0x0, 0xc, 0x2}]}}, &(0x7f00000010c0)=""/217, 0x26, 0xd9, 0x1}, 0x28) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3, 0x2000}, 0x50) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000600), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.084194863s ago: executing program 4 (id=5760): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r0}, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x9d1c, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x4}, r3, 0xafffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x401}, 0x0, 0xc8, 0x0, 0x7, 0x0, 0x0, 0x770a}, 0x0, 0x8000000000000000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB='\x00\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400"/20], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x14, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0xfffffffa, 0xa9, &(0x7f00000002c0)=""/169, 0x41100, 0x52, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x1, 0x5, 0x9}, 0x10, 0x143ac, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000011c0)={0x5, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x7, 0x3, &(0x7f0000001080)=@raw=[@map_fd={0x18, 0x5}, @alu={0x7, 0x1, 0xa, 0x7, 0xa, 0xfffffffffffffffe, 0xfffffffffffffffc}], &(0x7f00000010c0)='syzkaller\x00', 0x702, 0x0, 0x0, 0x40f00, 0x40, '\x00', r6, @fallback=0xe, 0xffffffffffffffff, 0x8, &(0x7f0000001140)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001180)={0x2, 0x4, 0x5, 0x8000}, 0x10, r8, r2, 0x0, 0x0, 0x0, 0x10, 0xda9}, 0x94) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781c2"], 0xfdef) syz_open_procfs$namespace(r3, &(0x7f0000001040)='ns/time_for_children\x00') mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r10 = gettid() syz_open_procfs$namespace(r10, &(0x7f0000001000)='ns/cgroup\x00') r11 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 870.991734ms ago: executing program 2 (id=5761): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x81, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x2}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, 0xffffffffffffffff, 0x0, 0x200000}, 0x38) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, 0x0, &(0x7f0000000740), 0x80000002, r1}, 0x38) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x3, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000965afe1b94", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.idle_time\x00', 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='fib6_table_lookup\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x17, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4f5, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @map_fd={0x18, 0xb, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xff2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x1000, 0xc, &(0x7f0000000280)=""/12, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x2, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000580)=[r4, r5, r6, r11], &(0x7f00000005c0)=[{0x5, 0x5, 0xe, 0x9}, {0x0, 0x3, 0x5, 0xc}, {0x0, 0x2, 0xb, 0x4}], 0x10, 0x2df7}, 0x94) 826.677448ms ago: executing program 5 (id=5762): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3fe, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000", @ANYRES32], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x46}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000340)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) syz_open_procfs$namespace(0x0, &(0x7f0000001380)='ns/mnt\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100ff0000000007010000f8ffffffb702000008000000b7030000000000008500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 549.221006ms ago: executing program 2 (id=5763): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), 0x9, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffb, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0xa, 0x300, &(0x7f0000000000)) 0s ago: executing program 3 (id=5595): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0xb2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r2], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000a18120000", @ANYRES32=r4, @ANYBLOB="00000000000000006100001300000000180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x22}]}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3}, 0x57) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xc}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000280)='syzkaller\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) kernel console output (not intermixed with test programs): ode [ 268.321397][ T6131] device pim6reg1 entered promiscuous mode [ 269.898175][ T6162] device pim6reg1 entered promiscuous mode [ 270.285261][ T6182] device pim6reg1 entered promiscuous mode [ 271.342703][ T6210] device wg2 entered promiscuous mode [ 271.815517][ T6214] device wg2 left promiscuous mode [ 271.882569][ T6214] device wg2 entered promiscuous mode [ 272.106917][ T6231] device pim6reg1 entered promiscuous mode [ 272.997278][ T6247] device syzkaller0 entered promiscuous mode [ 273.053536][ T6245] FAULT_INJECTION: forcing a failure. [ 273.053536][ T6245] name failslab, interval 1, probability 0, space 0, times 0 [ 273.087201][ T6245] CPU: 1 PID: 6245 Comm: syz.2.2013 Not tainted syzkaller #0 [ 273.094695][ T6245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 273.104960][ T6245] Call Trace: [ 273.108341][ T6245] [ 273.111281][ T6245] __dump_stack+0x21/0x24 [ 273.115651][ T6245] dump_stack_lvl+0xee/0x150 [ 273.120456][ T6245] ? __cfi_dump_stack_lvl+0x8/0x8 [ 273.125514][ T6245] ? _raw_spin_lock_bh+0x81/0xe0 [ 273.130534][ T6245] ? kasan_check_range+0x7f/0x290 [ 273.135601][ T6245] dump_stack+0x15/0x24 [ 273.139786][ T6245] should_fail_ex+0x3d4/0x520 [ 273.144609][ T6245] __should_failslab+0xac/0xf0 [ 273.149485][ T6245] should_failslab+0x9/0x20 [ 273.154014][ T6245] kmem_cache_alloc_node+0x42/0x340 [ 273.159356][ T6245] ? __alloc_skb+0xea/0x4b0 [ 273.163903][ T6245] ? br_get_link_af_size_filtered+0xe0/0x180 [ 273.169919][ T6245] __alloc_skb+0xea/0x4b0 [ 273.174272][ T6245] rtmsg_ifinfo_build_skb+0x7c/0x190 [ 273.179593][ T6245] rtmsg_ifinfo+0x7a/0x130 [ 273.184038][ T6245] dev_close_many+0x279/0x4d0 [ 273.188755][ T6245] ? __kernel_text_address+0xd/0x30 [ 273.194268][ T6245] ? __cfi_dev_close_many+0x10/0x10 [ 273.199508][ T6245] ? __kasan_check_read+0x11/0x20 [ 273.204560][ T6245] unregister_netdevice_many+0x439/0x1820 [ 273.210391][ T6245] ? __stack_depot_save+0x36/0x480 [ 273.215539][ T6245] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 273.221577][ T6245] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 273.227756][ T6245] ? ref_tracker_alloc+0x2a5/0x430 [ 273.232894][ T6245] ? __kasan_check_write+0x14/0x20 [ 273.238119][ T6245] ? queue_delayed_work_on+0x101/0x150 [ 273.243717][ T6245] ? linkwatch_fire_event+0x1d2/0x240 [ 273.249131][ T6245] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 273.254995][ T6245] ? exit_to_user_mode_loop+0x9b/0xb0 [ 273.260404][ T6245] ? __kasan_check_read+0x11/0x20 [ 273.265476][ T6245] unregister_netdevice_queue+0x31c/0x360 [ 273.271250][ T6245] ? linkwatch_schedule_work+0x161/0x190 [ 273.276911][ T6245] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 273.283163][ T6245] ? linkwatch_fire_event+0x1ed/0x240 [ 273.288659][ T6245] __tun_detach+0xca6/0x1460 [ 273.293365][ T6245] tun_chr_close+0x92/0x140 [ 273.297940][ T6245] ? __cfi_tun_chr_close+0x10/0x10 [ 273.303094][ T6245] __fput+0x1fc/0x8f0 [ 273.307119][ T6245] ____fput+0x15/0x20 [ 273.311145][ T6245] task_work_run+0x1db/0x240 [ 273.315757][ T6245] ? __cfi_task_work_run+0x10/0x10 [ 273.320924][ T6245] ? filp_close+0x111/0x160 [ 273.325470][ T6245] exit_to_user_mode_loop+0x9b/0xb0 [ 273.330690][ T6245] exit_to_user_mode_prepare+0x5a/0xa0 [ 273.336187][ T6245] syscall_exit_to_user_mode+0x1a/0x30 [ 273.341690][ T6245] do_syscall_64+0x58/0xa0 [ 273.346146][ T6245] ? clear_bhb_loop+0x30/0x80 [ 273.350940][ T6245] ? clear_bhb_loop+0x30/0x80 [ 273.355743][ T6245] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 273.361668][ T6245] RIP: 0033:0x7fa63078eec9 [ 273.366115][ T6245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 273.385945][ T6245] RSP: 002b:00007fa63156d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 273.394471][ T6245] RAX: 0000000000000000 RBX: 00007fa6309e5fa0 RCX: 00007fa63078eec9 [ 273.402473][ T6245] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 273.410483][ T6245] RBP: 00007fa63156d090 R08: 0000000000000000 R09: 0000000000000000 [ 273.418478][ T6245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 273.426485][ T6245] R13: 00007fa6309e6038 R14: 00007fa6309e5fa0 R15: 00007ffce97ca438 [ 273.434573][ T6245] [ 273.890660][ T6266] device syzkaller0 entered promiscuous mode [ 274.220626][ T6286] device pim6reg1 entered promiscuous mode [ 274.754253][ T6297] device sit0 left promiscuous mode [ 274.854410][ T6301] device sit0 entered promiscuous mode [ 276.332747][ T6329] device pim6reg1 entered promiscuous mode [ 277.549608][ T6352] device wg2 left promiscuous mode [ 277.635422][ T6352] device wg2 entered promiscuous mode [ 277.647864][ T6364] device pim6reg1 entered promiscuous mode [ 277.798749][ T6366] device wg2 left promiscuous mode [ 278.064325][ T6360] device wg2 entered promiscuous mode [ 278.111543][ T6374] device wg2 left promiscuous mode [ 278.329968][ T6362] device wg2 entered promiscuous mode [ 278.639855][ T6383] device wg2 left promiscuous mode [ 278.791917][ T6390] device syzkaller0 entered promiscuous mode [ 279.072603][ T6397] device pim6reg1 entered promiscuous mode [ 280.248461][ T6413] device pim6reg1 entered promiscuous mode [ 280.617546][ T6417] device wg2 entered promiscuous mode [ 282.194256][ T6445] device pim6reg1 entered promiscuous mode [ 283.343746][ T6482] device pim6reg1 entered promiscuous mode [ 284.377174][ T6503] device wg2 left promiscuous mode [ 284.444819][ T6503] device wg2 entered promiscuous mode [ 285.240059][ T6543] device pim6reg1 entered promiscuous mode [ 286.438656][ T6584] bridge0: port 3(veth1_macvtap) entered blocking state [ 286.446076][ T6584] bridge0: port 3(veth1_macvtap) entered disabled state [ 286.830973][ T6601] device syzkaller0 entered promiscuous mode [ 287.140545][ T6608] device pim6reg1 entered promiscuous mode [ 288.053190][ T6624] device wg2 left promiscuous mode [ 288.096802][ T6624] device wg2 entered promiscuous mode [ 288.703511][ T6657] device syzkaller0 entered promiscuous mode [ 288.719754][ T6656] device pim6reg1 entered promiscuous mode [ 288.920488][ T6664] device wg2 left promiscuous mode [ 288.984832][ T6664] device wg2 entered promiscuous mode [ 289.280913][ T6674] device sit0 left promiscuous mode [ 289.344258][ T6675] device sit0 entered promiscuous mode [ 290.530723][ T6703] device wg2 left promiscuous mode [ 290.821665][ T6714] device pim6reg1 entered promiscuous mode [ 292.560865][ T6754] device wg2 left promiscuous mode [ 292.815383][ T6753] device wg2 entered promiscuous mode [ 292.937091][ T6765] device pim6reg1 entered promiscuous mode [ 294.760688][ T6802] device wg2 left promiscuous mode [ 294.839643][ T6801] device wg2 entered promiscuous mode [ 296.104728][ T6836] device wg2 left promiscuous mode [ 296.338238][ T6834] device wg2 entered promiscuous mode [ 297.170768][ T6867] device veth1_macvtap left promiscuous mode [ 298.148659][ T6879] device wg2 entered promiscuous mode [ 299.705934][ T6910] device sit0 left promiscuous mode [ 299.823249][ T6912] device sit0 entered promiscuous mode [ 300.847981][ T6919] device wg2 left promiscuous mode [ 300.889083][ T6919] device wg2 entered promiscuous mode [ 302.219316][ T6934] device pim6reg1 entered promiscuous mode [ 305.005846][ T7022] device wg2 left promiscuous mode [ 305.165601][ T7022] device wg2 entered promiscuous mode [ 305.197417][ T7037] device sit0 left promiscuous mode [ 305.260256][ T7041] device sit0 entered promiscuous mode [ 305.719775][ T7043] device sit0 left promiscuous mode [ 306.033822][ T7044] device sit0 entered promiscuous mode [ 307.115015][ T7077] device wg2 left promiscuous mode [ 307.203671][ T7072] device wg2 entered promiscuous mode [ 308.835792][ T7121] device wg2 left promiscuous mode [ 308.948114][ T7121] device wg2 entered promiscuous mode [ 309.318177][ T7141] device wg2 left promiscuous mode [ 309.370203][ T7141] device pim6reg1 entered promiscuous mode [ 309.407788][ T7141] device wg2 entered promiscuous mode [ 309.626111][ T7151] device sit0 left promiscuous mode [ 309.713713][ T7156] device sit0 entered promiscuous mode [ 309.864898][ T7159] device pim6reg1 entered promiscuous mode [ 310.854945][ T7178] device wg2 left promiscuous mode [ 310.994553][ T7177] device wg2 entered promiscuous mode [ 312.177312][ T7201] device pim6reg1 entered promiscuous mode [ 313.607729][ T7239] device pim6reg1 entered promiscuous mode [ 313.912915][ T7249] device sit0 left promiscuous mode [ 314.785314][ T7280] device pim6reg1 entered promiscuous mode [ 315.433136][ T7292] device pim6reg1 entered promiscuous mode [ 316.237947][ T7314] device pim6reg1 entered promiscuous mode [ 316.377326][ T7321] device sit0 entered promiscuous mode [ 316.704451][ T7326] device pim6reg1 entered promiscuous mode [ 317.283494][ T7345] device pim6reg1 entered promiscuous mode [ 317.743819][ T7348] .€: renamed from bond_slave_1 [ 317.934273][ T7360] device pim6reg1 entered promiscuous mode [ 318.148781][ T7357] device wg2 left promiscuous mode [ 318.216078][ T7369] device wg2 entered promiscuous mode [ 318.717680][ T7387] device veth0_vlan left promiscuous mode [ 318.829373][ T7387] device veth0_vlan entered promiscuous mode [ 319.415204][ T7395] device pim6reg1 entered promiscuous mode [ 319.783010][ T7403] device pim6reg1 entered promiscuous mode [ 320.690795][ T7418] device wg2 left promiscuous mode [ 321.121660][ T7435] device pim6reg1 entered promiscuous mode [ 322.274575][ T7456] device wg2 left promiscuous mode [ 322.436467][ T7455] device wg2 entered promiscuous mode [ 323.939700][ T7484] device wg2 left promiscuous mode [ 324.018587][ T7484] device wg2 entered promiscuous mode [ 324.450791][ T7500] device pim6reg1 entered promiscuous mode [ 325.117665][ T7515] device wg2 left promiscuous mode [ 325.233832][ T7515] device wg2 entered promiscuous mode [ 325.489019][ T7524] device sit0 left promiscuous mode [ 325.591895][ T7526] device sit0 entered promiscuous mode [ 326.656571][ T7552] device wg2 entered promiscuous mode [ 327.144203][ T7565] device wg2 left promiscuous mode [ 327.400596][ T7566] device wg2 entered promiscuous mode [ 327.472063][ T7563] device pim6reg1 entered promiscuous mode [ 328.342067][ T7592] device pim6reg1 entered promiscuous mode [ 330.032520][ T7603] device wg2 left promiscuous mode [ 330.422259][ T7602] device wg2 entered promiscuous mode [ 331.662776][ T7619] device wg2 left promiscuous mode [ 333.677895][ T7645] device pim6reg1 entered promiscuous mode [ 334.033057][ T7649] device wg2 left promiscuous mode [ 334.129637][ T7651] device wg2 entered promiscuous mode [ 334.374918][ T7658] device wg2 left promiscuous mode [ 334.445906][ T7655] device wg2 entered promiscuous mode [ 334.897503][ T7666] device wg2 left promiscuous mode [ 334.927857][ T7666] device wg2 entered promiscuous mode [ 335.366214][ T7688] device pim6reg1 entered promiscuous mode [ 336.279308][ T7713] veth1_virt_wifi: mtu less than device minimum [ 336.483043][ T7721] device pim6reg1 entered promiscuous mode [ 336.754671][ T7720] device wg2 entered promiscuous mode [ 337.558663][ T7747] device pim6reg1 entered promiscuous mode [ 337.601598][ T7745] device wg2 left promiscuous mode [ 337.659978][ T7748] device wg2 entered promiscuous mode [ 337.869576][ T7761] device pim6reg1 entered promiscuous mode [ 337.958735][ T28] audit: type=1400 audit(1760161192.792:141): avc: denied { append } for pid=7768 comm="syz.5.2534" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 340.672493][ T7824] device wg2 left promiscuous mode [ 340.881462][ T7826] device wg2 entered promiscuous mode [ 340.944498][ T7832] FAULT_INJECTION: forcing a failure. [ 340.944498][ T7832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 340.990567][ T7832] CPU: 1 PID: 7832 Comm: syz.2.2554 Not tainted syzkaller #0 [ 340.998009][ T7832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 341.008091][ T7832] Call Trace: [ 341.011389][ T7832] [ 341.014337][ T7832] __dump_stack+0x21/0x24 [ 341.018701][ T7832] dump_stack_lvl+0xee/0x150 [ 341.023325][ T7832] ? __cfi_dump_stack_lvl+0x8/0x8 [ 341.028374][ T7832] dump_stack+0x15/0x24 [ 341.032646][ T7832] should_fail_ex+0x3d4/0x520 [ 341.037363][ T7832] should_fail+0xb/0x10 [ 341.041574][ T7832] should_fail_usercopy+0x1a/0x20 [ 341.046641][ T7832] _copy_from_user+0x1e/0xc0 [ 341.051445][ T7832] __sys_bpf+0x277/0x780 [ 341.055857][ T7832] ? bpf_link_show_fdinfo+0x320/0x320 [ 341.061359][ T7832] ? __cfi_ksys_write+0x10/0x10 [ 341.066266][ T7832] ? debug_smp_processor_id+0x17/0x20 [ 341.071683][ T7832] __x64_sys_bpf+0x7c/0x90 [ 341.076153][ T7832] x64_sys_call+0x488/0x9a0 [ 341.080881][ T7832] do_syscall_64+0x4c/0xa0 [ 341.085331][ T7832] ? clear_bhb_loop+0x30/0x80 [ 341.090047][ T7832] ? clear_bhb_loop+0x30/0x80 [ 341.095107][ T7832] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 341.101130][ T7832] RIP: 0033:0x7fa63078eec9 [ 341.105585][ T7832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.125343][ T7832] RSP: 002b:00007fa63156d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 341.133794][ T7832] RAX: ffffffffffffffda RBX: 00007fa6309e5fa0 RCX: 00007fa63078eec9 [ 341.141893][ T7832] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 341.149899][ T7832] RBP: 00007fa63156d090 R08: 0000000000000000 R09: 0000000000000000 [ 341.157911][ T7832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.165921][ T7832] R13: 00007fa6309e6038 R14: 00007fa6309e5fa0 R15: 00007ffce97ca438 [ 341.173941][ T7832] [ 342.294673][ T7862] device wg2 left promiscuous mode [ 342.449299][ T7867] device wg2 entered promiscuous mode [ 342.650147][ T7880] device pim6reg1 entered promiscuous mode [ 342.711286][ T7881] device pim6reg1 entered promiscuous mode [ 343.529054][ T7899] device wg2 left promiscuous mode [ 343.803024][ T7897] device wg2 entered promiscuous mode [ 344.384280][ T7927] FAULT_INJECTION: forcing a failure. [ 344.384280][ T7927] name failslab, interval 1, probability 0, space 0, times 0 [ 344.405126][ T7927] CPU: 1 PID: 7927 Comm: syz.5.2589 Not tainted syzkaller #0 [ 344.412584][ T7927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 344.422772][ T7927] Call Trace: [ 344.426083][ T7927] [ 344.429065][ T7927] __dump_stack+0x21/0x24 [ 344.433432][ T7927] dump_stack_lvl+0xee/0x150 [ 344.438055][ T7927] ? __cfi_dump_stack_lvl+0x8/0x8 [ 344.443131][ T7927] dump_stack+0x15/0x24 [ 344.447337][ T7927] should_fail_ex+0x3d4/0x520 [ 344.452154][ T7927] __should_failslab+0xac/0xf0 [ 344.457145][ T7927] ? bpf_prog_test_run_skb+0x24f/0x1290 [ 344.462745][ T7927] should_failslab+0x9/0x20 [ 344.467285][ T7927] __kmem_cache_alloc_node+0x3d/0x2c0 [ 344.472720][ T7927] ? bpf_prog_test_run_skb+0x24f/0x1290 [ 344.478320][ T7927] __kmalloc+0xa1/0x1e0 [ 344.482541][ T7927] bpf_prog_test_run_skb+0x24f/0x1290 [ 344.488090][ T7927] ? __fget_files+0x2d5/0x330 [ 344.492898][ T7927] ? __kasan_check_write+0x14/0x20 [ 344.498056][ T7927] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 344.503915][ T7927] bpf_prog_test_run+0x3e3/0x630 [ 344.508888][ T7927] ? slab_free_freelist_hook+0xc2/0x190 [ 344.514551][ T7927] ? bpf_prog_query+0x270/0x270 [ 344.519540][ T7927] ? selinux_bpf+0xce/0xf0 [ 344.524084][ T7927] ? security_bpf+0x93/0xb0 [ 344.528614][ T7927] __sys_bpf+0x56d/0x780 [ 344.532881][ T7927] ? bpf_link_show_fdinfo+0x320/0x320 [ 344.538289][ T7927] ? __cfi_ksys_write+0x10/0x10 [ 344.543311][ T7927] ? debug_smp_processor_id+0x17/0x20 [ 344.548733][ T7927] __x64_sys_bpf+0x7c/0x90 [ 344.553187][ T7927] x64_sys_call+0x488/0x9a0 [ 344.557732][ T7927] do_syscall_64+0x4c/0xa0 [ 344.562274][ T7927] ? clear_bhb_loop+0x30/0x80 [ 344.566995][ T7927] ? clear_bhb_loop+0x30/0x80 [ 344.571772][ T7927] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 344.577693][ T7927] RIP: 0033:0x7fdbbaf8eec9 [ 344.582137][ T7927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 344.602714][ T7927] RSP: 002b:00007fdbbbebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 344.611384][ T7927] RAX: ffffffffffffffda RBX: 00007fdbbb1e5fa0 RCX: 00007fdbbaf8eec9 [ 344.620005][ T7927] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 344.628029][ T7927] RBP: 00007fdbbbebf090 R08: 0000000000000000 R09: 0000000000000000 [ 344.636035][ T7927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.644135][ T7927] R13: 00007fdbbb1e6038 R14: 00007fdbbb1e5fa0 R15: 00007ffcaf23c318 [ 344.652156][ T7927] [ 344.984242][ T7938] device sit0 left promiscuous mode [ 345.369305][ T7943] device wg2 left promiscuous mode [ 345.409661][ T7943] device wg2 entered promiscuous mode [ 345.667481][ T7963] device sit0 left promiscuous mode [ 345.715426][ T7963] device sit0 entered promiscuous mode [ 346.206012][ T7973] device pim6reg1 entered promiscuous mode [ 346.992650][ T7989] device wg2 left promiscuous mode [ 347.358826][ T7983] device wg2 entered promiscuous mode [ 347.814012][ T8014] bond_slave_1: mtu less than device minimum [ 349.128353][ T8055] device pim6reg1 entered promiscuous mode [ 349.463260][ T8062] device sit0 left promiscuous mode [ 349.534200][ T8062] device sit0 entered promiscuous mode [ 349.755569][ T8068] device pim6reg1 entered promiscuous mode [ 350.009961][ T8075] device pim6reg1 entered promiscuous mode [ 350.410934][ T8091] FAULT_INJECTION: forcing a failure. [ 350.410934][ T8091] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 350.424678][ T8091] CPU: 1 PID: 8091 Comm: syz.0.2646 Not tainted syzkaller #0 [ 350.432115][ T8091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 350.442207][ T8091] Call Trace: [ 350.445528][ T8091] [ 350.448500][ T8091] __dump_stack+0x21/0x24 [ 350.452867][ T8091] dump_stack_lvl+0xee/0x150 [ 350.457591][ T8091] ? __cfi_dump_stack_lvl+0x8/0x8 [ 350.462683][ T8091] dump_stack+0x15/0x24 [ 350.466936][ T8091] should_fail_ex+0x3d4/0x520 [ 350.471675][ T8091] should_fail+0xb/0x10 [ 350.475969][ T8091] should_fail_usercopy+0x1a/0x20 [ 350.481147][ T8091] _copy_from_user+0x1e/0xc0 [ 350.485786][ T8091] bpf_prog_test_run_skb+0x286/0x1290 [ 350.491230][ T8091] ? __fget_files+0x2d5/0x330 [ 350.495952][ T8091] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 350.501825][ T8091] bpf_prog_test_run+0x3e3/0x630 [ 350.506904][ T8091] ? slab_free_freelist_hook+0xc2/0x190 [ 350.512757][ T8091] ? bpf_prog_query+0x270/0x270 [ 350.517650][ T8091] ? selinux_bpf+0xce/0xf0 [ 350.522184][ T8091] ? security_bpf+0x93/0xb0 [ 350.527262][ T8091] __sys_bpf+0x56d/0x780 [ 350.532158][ T8091] ? bpf_link_show_fdinfo+0x320/0x320 [ 350.537903][ T8091] ? __cfi_ksys_write+0x10/0x10 [ 350.542808][ T8091] ? debug_smp_processor_id+0x17/0x20 [ 350.548245][ T8091] __x64_sys_bpf+0x7c/0x90 [ 350.552780][ T8091] x64_sys_call+0x488/0x9a0 [ 350.557310][ T8091] do_syscall_64+0x4c/0xa0 [ 350.561760][ T8091] ? clear_bhb_loop+0x30/0x80 [ 350.566542][ T8091] ? clear_bhb_loop+0x30/0x80 [ 350.571254][ T8091] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 350.577177][ T8091] RIP: 0033:0x7efe4818eec9 [ 350.581796][ T8091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 350.601446][ T8091] RSP: 002b:00007efe48f5c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 350.610147][ T8091] RAX: ffffffffffffffda RBX: 00007efe483e5fa0 RCX: 00007efe4818eec9 [ 350.618213][ T8091] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 350.626480][ T8091] RBP: 00007efe48f5c090 R08: 0000000000000000 R09: 0000000000000000 [ 350.634777][ T8091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 350.642864][ T8091] R13: 00007efe483e6038 R14: 00007efe483e5fa0 R15: 00007ffdb34ea968 [ 350.650882][ T8091] [ 351.793957][ T8127] device pim6reg1 entered promiscuous mode [ 352.755859][ T28] audit: type=1400 audit(1760161207.582:142): avc: denied { write } for pid=8135 comm="syz.3.2660" name="cgroup.subtree_control" dev="cgroup2" ino=193 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 352.868151][ T28] audit: type=1400 audit(1760161207.582:143): avc: denied { open } for pid=8135 comm="syz.3.2660" path="" dev="cgroup2" ino=193 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 353.757193][ T8166] device pim6reg1 entered promiscuous mode [ 353.969181][ T8170] device pim6reg1 entered promiscuous mode [ 354.315662][ T8175] device pim6reg1 entered promiscuous mode [ 355.458531][ T8208] device pim6reg1 entered promiscuous mode [ 355.530423][ T8212] device pim6reg1 entered promiscuous mode [ 355.748796][ T8216] device pim6reg1 entered promiscuous mode [ 355.800839][ T8220] FAULT_INJECTION: forcing a failure. [ 355.800839][ T8220] name failslab, interval 1, probability 0, space 0, times 0 [ 355.814050][ T8220] CPU: 1 PID: 8220 Comm: syz.2.2691 Not tainted syzkaller #0 [ 355.821597][ T8220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 355.831689][ T8220] Call Trace: [ 355.834988][ T8220] [ 355.838012][ T8220] __dump_stack+0x21/0x24 [ 355.842627][ T8220] dump_stack_lvl+0xee/0x150 [ 355.847279][ T8220] ? __cfi_dump_stack_lvl+0x8/0x8 [ 355.852347][ T8220] ? do_syscall_64+0x4c/0xa0 [ 355.856989][ T8220] dump_stack+0x15/0x24 [ 355.861185][ T8220] should_fail_ex+0x3d4/0x520 [ 355.866024][ T8220] __should_failslab+0xac/0xf0 [ 355.871012][ T8220] ? sk_prot_alloc+0xed/0x320 [ 355.875743][ T8220] should_failslab+0x9/0x20 [ 355.880310][ T8220] __kmem_cache_alloc_node+0x3d/0x2c0 [ 355.885811][ T8220] ? sk_prot_alloc+0xed/0x320 [ 355.890513][ T8220] __kmalloc+0xa1/0x1e0 [ 355.894778][ T8220] sk_prot_alloc+0xed/0x320 [ 355.899337][ T8220] sk_alloc+0x3b/0x460 [ 355.903449][ T8220] ? __kasan_check_write+0x14/0x20 [ 355.908596][ T8220] bpf_prog_test_run_skb+0x37e/0x1290 [ 355.913988][ T8220] ? __fget_files+0x2d5/0x330 [ 355.918876][ T8220] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 355.924717][ T8220] bpf_prog_test_run+0x3e3/0x630 [ 355.929749][ T8220] ? slab_free_freelist_hook+0xc2/0x190 [ 355.935343][ T8220] ? bpf_prog_query+0x270/0x270 [ 355.940240][ T8220] ? selinux_bpf+0xce/0xf0 [ 355.944784][ T8220] ? security_bpf+0x93/0xb0 [ 355.949412][ T8220] __sys_bpf+0x56d/0x780 [ 355.953667][ T8220] ? bpf_link_show_fdinfo+0x320/0x320 [ 355.959150][ T8220] ? __cfi_ksys_write+0x10/0x10 [ 355.964339][ T8220] ? debug_smp_processor_id+0x17/0x20 [ 355.969823][ T8220] __x64_sys_bpf+0x7c/0x90 [ 355.974357][ T8220] x64_sys_call+0x488/0x9a0 [ 355.978943][ T8220] do_syscall_64+0x4c/0xa0 [ 355.983383][ T8220] ? clear_bhb_loop+0x30/0x80 [ 355.988186][ T8220] ? clear_bhb_loop+0x30/0x80 [ 355.992921][ T8220] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 355.998859][ T8220] RIP: 0033:0x7fa63078eec9 [ 356.003374][ T8220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 356.022991][ T8220] RSP: 002b:00007fa63156d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 356.031512][ T8220] RAX: ffffffffffffffda RBX: 00007fa6309e5fa0 RCX: 00007fa63078eec9 [ 356.039513][ T8220] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 356.047593][ T8220] RBP: 00007fa63156d090 R08: 0000000000000000 R09: 0000000000000000 [ 356.055603][ T8220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 356.063662][ T8220] R13: 00007fa6309e6038 R14: 00007fa6309e5fa0 R15: 00007ffce97ca438 [ 356.071674][ T8220] [ 356.419267][ T8230] device sit0 left promiscuous mode [ 356.454597][ T8241] device pim6reg1 entered promiscuous mode [ 356.464020][ T8230] device sit0 entered promiscuous mode [ 357.714653][ T28] audit: type=1400 audit(1760161212.542:144): avc: denied { create } for pid=8256 comm="syz.0.2705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 359.100328][ T8292] device pim6reg1 entered promiscuous mode [ 359.409718][ T8301] device pim6reg1 entered promiscuous mode [ 359.621726][ T8306] device pim6reg1 entered promiscuous mode [ 360.443260][ T8328] device wg2 left promiscuous mode [ 360.718934][ T8332] device pim6reg1 entered promiscuous mode [ 360.772109][ T8325] device wg2 entered promiscuous mode [ 361.022452][ T8338] device pim6reg1 entered promiscuous mode [ 361.231596][ T8349] device pim6reg1 entered promiscuous mode [ 361.928242][ T8360] device pim6reg1 entered promiscuous mode [ 362.223914][ T8373] device pim6reg1 entered promiscuous mode [ 362.478072][ T8398] FAULT_INJECTION: forcing a failure. [ 362.478072][ T8398] name failslab, interval 1, probability 0, space 0, times 0 [ 362.491553][ T8395] device pim6reg1 entered promiscuous mode [ 362.557192][ T8398] CPU: 0 PID: 8398 Comm: syz.2.2760 Not tainted syzkaller #0 [ 362.564819][ T8398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 362.574911][ T8398] Call Trace: [ 362.578382][ T8398] [ 362.581366][ T8398] __dump_stack+0x21/0x24 [ 362.585749][ T8398] dump_stack_lvl+0xee/0x150 [ 362.590391][ T8398] ? __cfi_dump_stack_lvl+0x8/0x8 [ 362.595503][ T8398] ? __kasan_kmalloc+0x95/0xb0 [ 362.600326][ T8398] dump_stack+0x15/0x24 [ 362.604615][ T8398] should_fail_ex+0x3d4/0x520 [ 362.609345][ T8398] ? build_skb+0x2a/0x220 [ 362.613815][ T8398] __should_failslab+0xac/0xf0 [ 362.618640][ T8398] should_failslab+0x9/0x20 [ 362.623730][ T8398] kmem_cache_alloc+0x3b/0x330 [ 362.628548][ T8398] build_skb+0x2a/0x220 [ 362.632763][ T8398] bpf_prog_test_run_skb+0x39f/0x1290 [ 362.638671][ T8398] ? __fget_files+0x2d5/0x330 [ 362.643407][ T8398] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 362.649269][ T8398] bpf_prog_test_run+0x3e3/0x630 [ 362.654339][ T8398] ? slab_free_freelist_hook+0xc2/0x190 [ 362.659939][ T8398] ? bpf_prog_query+0x270/0x270 [ 362.664840][ T8398] ? selinux_bpf+0xce/0xf0 [ 362.669308][ T8398] ? security_bpf+0x93/0xb0 [ 362.674145][ T8398] __sys_bpf+0x56d/0x780 [ 362.678431][ T8398] ? bpf_link_show_fdinfo+0x320/0x320 [ 362.683852][ T8398] ? __cfi_ksys_write+0x10/0x10 [ 362.688852][ T8398] ? debug_smp_processor_id+0x17/0x20 [ 362.694287][ T8398] __x64_sys_bpf+0x7c/0x90 [ 362.698755][ T8398] x64_sys_call+0x488/0x9a0 [ 362.703308][ T8398] do_syscall_64+0x4c/0xa0 [ 362.707768][ T8398] ? clear_bhb_loop+0x30/0x80 [ 362.712491][ T8398] ? clear_bhb_loop+0x30/0x80 [ 362.717207][ T8398] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 362.723230][ T8398] RIP: 0033:0x7fa63078eec9 [ 362.727759][ T8398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 362.747566][ T8398] RSP: 002b:00007fa63156d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 362.756014][ T8398] RAX: ffffffffffffffda RBX: 00007fa6309e5fa0 RCX: 00007fa63078eec9 [ 362.764019][ T8398] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 362.772023][ T8398] RBP: 00007fa63156d090 R08: 0000000000000000 R09: 0000000000000000 [ 362.780535][ T8398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 362.788526][ T8398] R13: 00007fa6309e6038 R14: 00007fa6309e5fa0 R15: 00007ffce97ca438 [ 362.796562][ T8398] [ 363.089607][ T8412] device pim6reg1 entered promiscuous mode [ 363.833392][ T8432] device pim6reg1 entered promiscuous mode [ 364.272159][ T8448] device syzkaller0 entered promiscuous mode [ 364.546266][ T8467] device pim6reg1 entered promiscuous mode [ 366.061696][ T8513] device wg2 left promiscuous mode [ 367.004859][ T8550] device syzkaller0 entered promiscuous mode [ 367.234801][ T8553] device syzkaller0 entered promiscuous mode [ 367.781188][ T8562] GPL: port 1(erspan0) entered blocking state [ 367.803035][ T8562] GPL: port 1(erspan0) entered disabled state [ 367.872023][ T8562] device erspan0 entered promiscuous mode [ 367.951901][ T8564] GPL: port 1(erspan0) entered blocking state [ 367.958079][ T8564] GPL: port 1(erspan0) entered forwarding state [ 369.431560][ T8586] device wg2 left promiscuous mode [ 369.563302][ T8585] device wg2 entered promiscuous mode [ 370.178153][ T8597] device wg2 left promiscuous mode [ 370.388885][ T8597] device wg2 entered promiscuous mode [ 371.509066][ T8622] device wg2 entered promiscuous mode [ 371.817393][ T8635] device sit0 left promiscuous mode [ 371.922045][ T8638] device sit0 entered promiscuous mode [ 372.421482][ T8640] device wg2 left promiscuous mode [ 372.467088][ T8632] device wg2 entered promiscuous mode [ 372.506172][ T8648] device pim6reg1 entered promiscuous mode [ 372.634553][ T8652] device sit0 left promiscuous mode [ 372.740393][ T8658] device sit0 entered promiscuous mode [ 374.047261][ T8669] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.054355][ T8669] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.143038][ T8669] device bridge_slave_0 entered promiscuous mode [ 374.242129][ T8669] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.285861][ T8669] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.317410][ T8669] device bridge_slave_1 entered promiscuous mode [ 374.588890][ T8681] device pim6reg1 entered promiscuous mode [ 374.921018][ T8683] device wg2 left promiscuous mode [ 374.987410][ T8683] device wg2 entered promiscuous mode [ 375.325177][ T43] device bridge_slave_1 left promiscuous mode [ 375.367986][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.439280][ T43] device bridge_slave_0 left promiscuous mode [ 375.445498][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.555402][ T43] device veth0_vlan left promiscuous mode [ 376.027308][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 376.035127][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 376.081335][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 376.089990][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 376.098402][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.105817][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.145122][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 376.153431][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 376.167753][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 376.176770][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.183913][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.277524][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 376.327649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 376.381470][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 376.390052][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 376.414447][ T8669] device veth0_vlan entered promiscuous mode [ 376.486906][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 376.500770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 376.510165][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 376.518552][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.628127][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.710296][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 376.726792][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 376.735646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 376.744709][ T8669] device veth1_macvtap entered promiscuous mode [ 376.832394][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 376.852149][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 376.868535][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 376.877545][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 376.886892][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 377.946811][ T8729] device wg2 entered promiscuous mode [ 378.035727][ T8738] device pim6reg1 entered promiscuous mode [ 378.480200][ T8735] device syzkaller0 entered promiscuous mode [ 378.932639][ T8753] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.942081][ T8753] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.037372][ T8756] device bridge_slave_1 left promiscuous mode [ 379.047927][ T8756] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.112675][ T8756] device bridge_slave_0 left promiscuous mode [ 379.187699][ T8756] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.474991][ T8773] device wg2 left promiscuous mode [ 379.552239][ T8773] device wg2 entered promiscuous mode [ 382.047654][ T8792] device pim6reg1 entered promiscuous mode [ 383.209216][ T8822] device pim6reg1 entered promiscuous mode [ 384.540671][ T8834] device sit0 entered promiscuous mode [ 387.134806][ T8873] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.177364][ T8873] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.207736][ T8873] device bridge_slave_0 entered promiscuous mode [ 387.249325][ T8873] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.267225][ T8873] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.275459][ T8873] device bridge_slave_1 entered promiscuous mode [ 387.373685][ T2856] device .€ left promiscuous mode [ 387.379003][ T2856] Ÿë: port 1(.€) entered disabled state [ 387.392415][ T2856] device veth0_vlan left promiscuous mode [ 387.641513][ T8892] device syzkaller0 entered promiscuous mode [ 387.926196][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 387.934057][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 387.978195][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 387.986837][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 387.995413][ T340] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.002507][ T340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.010712][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 388.020724][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.029134][ T340] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.036219][ T340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.044257][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.054138][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.063047][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 388.093532][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 388.109381][ T8873] device veth0_vlan entered promiscuous mode [ 388.116859][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.125239][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.134159][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.152792][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 388.169124][ T8873] device veth1_macvtap entered promiscuous mode [ 388.297532][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 388.360215][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 389.048424][ T8916] device wg2 left promiscuous mode [ 391.299153][ T8970] device pim6reg1 entered promiscuous mode [ 392.358972][ T8986] device pim6reg1 entered promiscuous mode [ 392.674579][ T9003] FAULT_INJECTION: forcing a failure. [ 392.674579][ T9003] name failslab, interval 1, probability 0, space 0, times 0 [ 392.781659][ T9003] CPU: 1 PID: 9003 Comm: syz.5.2959 Not tainted syzkaller #0 [ 392.789210][ T9003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 392.799307][ T9003] Call Trace: [ 392.802749][ T9003] [ 392.805721][ T9003] __dump_stack+0x21/0x24 [ 392.810086][ T9003] dump_stack_lvl+0xee/0x150 [ 392.814720][ T9003] ? __cfi_dump_stack_lvl+0x8/0x8 [ 392.819998][ T9003] dump_stack+0x15/0x24 [ 392.824280][ T9003] should_fail_ex+0x3d4/0x520 [ 392.829159][ T9003] __should_failslab+0xac/0xf0 [ 392.834050][ T9003] ? __request_module+0x28f/0x890 [ 392.839564][ T9003] should_failslab+0x9/0x20 [ 392.844475][ T9003] __kmem_cache_alloc_node+0x3d/0x2c0 [ 392.849982][ T9003] ? __request_module+0x28f/0x890 [ 392.855306][ T9003] __kmalloc_node_track_caller+0xa0/0x1e0 [ 392.861085][ T9003] ? __kasan_kmalloc+0x95/0xb0 [ 392.865892][ T9003] kstrdup+0x3b/0x80 [ 392.869945][ T9003] __request_module+0x28f/0x890 [ 392.875009][ T9003] ? __cfi___request_module+0x10/0x10 [ 392.880424][ T9003] ? cap_capable+0x1aa/0x230 [ 392.885328][ T9003] ? security_capable+0x99/0xc0 [ 392.890249][ T9003] dev_load+0x5b/0xb0 [ 392.894361][ T9003] dev_ioctl+0x53f/0xd10 [ 392.898717][ T9003] sock_do_ioctl+0x23f/0x310 [ 392.903457][ T9003] ? sock_show_fdinfo+0xb0/0xb0 [ 392.908365][ T9003] ? selinux_file_ioctl+0x377/0x480 [ 392.913690][ T9003] sock_ioctl+0x4d8/0x6e0 [ 392.918090][ T9003] ? __cfi_sock_ioctl+0x10/0x10 [ 392.923080][ T9003] ? __fget_files+0x2d5/0x330 [ 392.927911][ T9003] ? security_file_ioctl+0x95/0xc0 [ 392.933247][ T9003] ? __cfi_sock_ioctl+0x10/0x10 [ 392.938233][ T9003] __se_sys_ioctl+0x12f/0x1b0 [ 392.943249][ T9003] __x64_sys_ioctl+0x7b/0x90 [ 392.948140][ T9003] x64_sys_call+0x58b/0x9a0 [ 392.952675][ T9003] do_syscall_64+0x4c/0xa0 [ 392.957224][ T9003] ? clear_bhb_loop+0x30/0x80 [ 392.961948][ T9003] ? clear_bhb_loop+0x30/0x80 [ 392.966672][ T9003] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 392.972611][ T9003] RIP: 0033:0x7fdbbaf8eec9 [ 392.977081][ T9003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 392.997180][ T9003] RSP: 002b:00007fdbbbebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 393.005719][ T9003] RAX: ffffffffffffffda RBX: 00007fdbbb1e5fa0 RCX: 00007fdbbaf8eec9 [ 393.013729][ T9003] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 393.022013][ T9003] RBP: 00007fdbbbebf090 R08: 0000000000000000 R09: 0000000000000000 [ 393.030116][ T9003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 393.038214][ T9003] R13: 00007fdbbb1e6038 R14: 00007fdbbb1e5fa0 R15: 00007ffcaf23c318 [ 393.046307][ T9003] [ 393.095772][ T9010] device sit0 left promiscuous mode [ 393.109184][ T28] audit: type=1400 audit(1760161247.942:145): avc: denied { sys_module } for pid=9002 comm="syz.5.2959" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 393.203057][ T9011] device sit0 entered promiscuous mode [ 394.798874][ T9038] FAULT_INJECTION: forcing a failure. [ 394.798874][ T9038] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 394.857075][ T9038] CPU: 1 PID: 9038 Comm: syz.5.2968 Not tainted syzkaller #0 [ 394.864630][ T9038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 394.874733][ T9038] Call Trace: [ 394.878095][ T9038] [ 394.881070][ T9038] __dump_stack+0x21/0x24 [ 394.885434][ T9038] dump_stack_lvl+0xee/0x150 [ 394.890081][ T9038] ? __cfi_dump_stack_lvl+0x8/0x8 [ 394.895172][ T9038] dump_stack+0x15/0x24 [ 394.899372][ T9038] should_fail_ex+0x3d4/0x520 [ 394.904112][ T9038] should_fail+0xb/0x10 [ 394.908312][ T9038] should_fail_usercopy+0x1a/0x20 [ 394.913426][ T9038] _copy_from_user+0x1e/0xc0 [ 394.918137][ T9038] sock_do_ioctl+0x186/0x310 [ 394.922791][ T9038] ? sock_show_fdinfo+0xb0/0xb0 [ 394.927712][ T9038] ? selinux_file_ioctl+0x377/0x480 [ 394.933060][ T9038] sock_ioctl+0x4d8/0x6e0 [ 394.937415][ T9038] ? __cfi_sock_ioctl+0x10/0x10 [ 394.942461][ T9038] ? __fget_files+0x2d5/0x330 [ 394.947144][ T9038] ? security_file_ioctl+0x95/0xc0 [ 394.952350][ T9038] ? __cfi_sock_ioctl+0x10/0x10 [ 394.957222][ T9038] __se_sys_ioctl+0x12f/0x1b0 [ 394.962068][ T9038] __x64_sys_ioctl+0x7b/0x90 [ 394.966698][ T9038] x64_sys_call+0x58b/0x9a0 [ 394.971523][ T9038] do_syscall_64+0x4c/0xa0 [ 394.976148][ T9038] ? clear_bhb_loop+0x30/0x80 [ 394.980865][ T9038] ? clear_bhb_loop+0x30/0x80 [ 394.985606][ T9038] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 394.991595][ T9038] RIP: 0033:0x7fdbbaf8eec9 [ 394.996495][ T9038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 395.016260][ T9038] RSP: 002b:00007fdbbbebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 395.024910][ T9038] RAX: ffffffffffffffda RBX: 00007fdbbb1e5fa0 RCX: 00007fdbbaf8eec9 [ 395.033092][ T9038] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 395.041091][ T9038] RBP: 00007fdbbbebf090 R08: 0000000000000000 R09: 0000000000000000 [ 395.049187][ T9038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 395.057224][ T9038] R13: 00007fdbbb1e6038 R14: 00007fdbbb1e5fa0 R15: 00007ffcaf23c318 [ 395.065304][ T9038] [ 395.233645][ T9049] device syzkaller0 entered promiscuous mode [ 396.006234][ T28] audit: type=1400 audit(1760161250.832:146): avc: denied { create } for pid=9060 comm="syz.3.2977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 396.885523][ T9065] device pim6reg1 entered promiscuous mode [ 397.136078][ T9072] device wg2 entered promiscuous mode [ 398.094668][ T9100] device pim6reg1 entered promiscuous mode [ 398.364584][ T9103] device pim6reg1 entered promiscuous mode [ 398.766233][ T9110] device wg2 left promiscuous mode [ 398.898331][ T9110] device wg2 entered promiscuous mode [ 398.934088][ T9118] device sit0 entered promiscuous mode [ 400.567708][ T9141] device pim6reg1 entered promiscuous mode [ 400.715987][ T9149] FAULT_INJECTION: forcing a failure. [ 400.715987][ T9149] name failslab, interval 1, probability 0, space 0, times 0 [ 400.779158][ T9149] CPU: 0 PID: 9149 Comm: syz.5.3006 Not tainted syzkaller #0 [ 400.786644][ T9149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 400.796834][ T9149] Call Trace: [ 400.800589][ T9149] [ 400.803554][ T9149] __dump_stack+0x21/0x24 [ 400.807935][ T9149] dump_stack_lvl+0xee/0x150 [ 400.812593][ T9149] ? __cfi_dump_stack_lvl+0x8/0x8 [ 400.817665][ T9149] ? avc_has_perm_noaudit+0x2f4/0x460 [ 400.823230][ T9149] dump_stack+0x15/0x24 [ 400.827446][ T9149] should_fail_ex+0x3d4/0x520 [ 400.832169][ T9149] __should_failslab+0xac/0xf0 [ 400.836977][ T9149] ? qdisc_alloc+0x79/0x780 [ 400.841620][ T9149] should_failslab+0x9/0x20 [ 400.846186][ T9149] __kmem_cache_alloc_node+0x3d/0x2c0 [ 400.851613][ T9149] ? qdisc_alloc+0x79/0x780 [ 400.856148][ T9149] __kmalloc_node+0xa1/0x1e0 [ 400.860783][ T9149] qdisc_alloc+0x79/0x780 [ 400.865158][ T9149] ? vlan_device_event+0x49e/0x1ba0 [ 400.870526][ T9149] ? mutex_unlock+0x89/0x220 [ 400.875174][ T9149] ? br_device_event+0x15f/0x770 [ 400.880240][ T9149] qdisc_create_dflt+0x6b/0x3b0 [ 400.885143][ T9149] dev_activate+0x2cf/0x1040 [ 400.889777][ T9149] __dev_open+0x3ce/0x4f0 [ 400.894232][ T9149] ? dev_open+0x230/0x230 [ 400.898578][ T9149] ? _raw_spin_unlock_bh+0x50/0x60 [ 400.903744][ T9149] ? dev_set_rx_mode+0x223/0x2c0 [ 400.908732][ T9149] ? __kasan_check_read+0x11/0x20 [ 400.913761][ T9149] __dev_change_flags+0x21b/0x6b0 [ 400.918803][ T9149] ? __cfi___dev_change_flags+0x10/0x10 [ 400.924388][ T9149] dev_change_flags+0x88/0x1a0 [ 400.929177][ T9149] dev_ifsioc+0x159/0xed0 [ 400.933637][ T9149] ? dev_ioctl+0xd10/0xd10 [ 400.938076][ T9149] ? __kasan_check_write+0x14/0x20 [ 400.943270][ T9149] ? mutex_lock+0x8d/0x1a0 [ 400.947745][ T9149] ? __cfi_mutex_lock+0x10/0x10 [ 400.952699][ T9149] ? dev_get_by_name_rcu+0xe5/0x130 [ 400.957922][ T9149] dev_ioctl+0x556/0xd10 [ 400.962287][ T9149] sock_do_ioctl+0x23f/0x310 [ 400.966925][ T9149] ? sock_show_fdinfo+0xb0/0xb0 [ 400.971835][ T9149] ? selinux_file_ioctl+0x377/0x480 [ 400.977066][ T9149] sock_ioctl+0x4d8/0x6e0 [ 400.981427][ T9149] ? __cfi_sock_ioctl+0x10/0x10 [ 400.986306][ T9149] ? __fget_files+0x2d5/0x330 [ 400.991015][ T9149] ? security_file_ioctl+0x95/0xc0 [ 400.996154][ T9149] ? __cfi_sock_ioctl+0x10/0x10 [ 401.001040][ T9149] __se_sys_ioctl+0x12f/0x1b0 [ 401.005776][ T9149] __x64_sys_ioctl+0x7b/0x90 [ 401.010419][ T9149] x64_sys_call+0x58b/0x9a0 [ 401.015040][ T9149] do_syscall_64+0x4c/0xa0 [ 401.019490][ T9149] ? clear_bhb_loop+0x30/0x80 [ 401.024198][ T9149] ? clear_bhb_loop+0x30/0x80 [ 401.028910][ T9149] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 401.034830][ T9149] RIP: 0033:0x7fdbbaf8eec9 [ 401.039272][ T9149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 401.058926][ T9149] RSP: 002b:00007fdbbbebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 401.067388][ T9149] RAX: ffffffffffffffda RBX: 00007fdbbb1e5fa0 RCX: 00007fdbbaf8eec9 [ 401.075494][ T9149] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 401.083533][ T9149] RBP: 00007fdbbbebf090 R08: 0000000000000000 R09: 0000000000000000 [ 401.091547][ T9149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 401.099555][ T9149] R13: 00007fdbbb1e6038 R14: 00007fdbbb1e5fa0 R15: 00007ffcaf23c318 [ 401.107651][ T9149] [ 401.115698][ T9149] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 401.123965][ T9149] device pim6reg1 entered promiscuous mode [ 402.444642][ T9180] FAULT_INJECTION: forcing a failure. [ 402.444642][ T9180] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 402.497379][ T9180] CPU: 0 PID: 9180 Comm: syz.3.3017 Not tainted syzkaller #0 [ 402.504877][ T9180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 402.514966][ T9180] Call Trace: [ 402.518473][ T9180] [ 402.521458][ T9180] __dump_stack+0x21/0x24 [ 402.525822][ T9180] dump_stack_lvl+0xee/0x150 [ 402.530457][ T9180] ? __cfi_dump_stack_lvl+0x8/0x8 [ 402.535559][ T9180] dump_stack+0x15/0x24 [ 402.539759][ T9180] should_fail_ex+0x3d4/0x520 [ 402.544491][ T9180] should_fail+0xb/0x10 [ 402.548684][ T9180] should_fail_usercopy+0x1a/0x20 [ 402.553752][ T9180] _copy_from_user+0x1e/0xc0 [ 402.558378][ T9180] __sys_bpf+0x277/0x780 [ 402.562661][ T9180] ? bpf_link_show_fdinfo+0x320/0x320 [ 402.568089][ T9180] ? __cfi_ksys_write+0x10/0x10 [ 402.572986][ T9180] ? debug_smp_processor_id+0x17/0x20 [ 402.578411][ T9180] __x64_sys_bpf+0x7c/0x90 [ 402.582878][ T9180] x64_sys_call+0x488/0x9a0 [ 402.587427][ T9180] do_syscall_64+0x4c/0xa0 [ 402.591879][ T9180] ? clear_bhb_loop+0x30/0x80 [ 402.596597][ T9180] ? clear_bhb_loop+0x30/0x80 [ 402.601393][ T9180] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 402.607418][ T9180] RIP: 0033:0x7f6c80f8eec9 [ 402.611906][ T9180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.631543][ T9180] RSP: 002b:00007f6c81e9e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 402.640001][ T9180] RAX: ffffffffffffffda RBX: 00007f6c811e5fa0 RCX: 00007f6c80f8eec9 [ 402.648285][ T9180] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 402.656293][ T9180] RBP: 00007f6c81e9e090 R08: 0000000000000000 R09: 0000000000000000 [ 402.664322][ T9180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.672346][ T9180] R13: 00007f6c811e6038 R14: 00007f6c811e5fa0 R15: 00007ffe419e1518 [ 402.680497][ T9180] [ 404.201415][ T9208] device pim6reg1 entered promiscuous mode [ 405.114175][ T9197] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.169792][ T9197] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.197655][ T9197] device bridge_slave_0 entered promiscuous mode [ 405.347065][ T9197] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.354247][ T9197] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.427923][ T9197] device bridge_slave_1 entered promiscuous mode [ 406.170906][ T43] device bridge_slave_1 left promiscuous mode [ 406.195074][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.234609][ T43] device bridge_slave_0 left promiscuous mode [ 406.251422][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.912746][ T9243] device pim6reg1 entered promiscuous mode [ 407.003529][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 407.017171][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 407.070300][ T9248] device sit0 left promiscuous mode [ 407.083547][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 407.101605][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 407.121470][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.128758][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 407.137056][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 407.145884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 407.154672][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.161887][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 407.291645][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 407.368206][ T9248] device sit0 entered promiscuous mode [ 407.642873][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 407.663637][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 407.729432][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 407.759192][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 407.845572][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 407.864865][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 407.949908][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 407.970072][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 407.982303][ T9197] device veth0_vlan entered promiscuous mode [ 407.994422][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 408.006508][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 408.044743][ T9197] device veth1_macvtap entered promiscuous mode [ 408.052183][ T9258] FAULT_INJECTION: forcing a failure. [ 408.052183][ T9258] name failslab, interval 1, probability 0, space 0, times 0 [ 408.073143][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 408.084018][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 408.092543][ T9258] CPU: 0 PID: 9258 Comm: syz.3.3039 Not tainted syzkaller #0 [ 408.100146][ T9258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 408.110801][ T9258] Call Trace: [ 408.114193][ T9258] [ 408.117178][ T9258] __dump_stack+0x21/0x24 [ 408.121553][ T9258] dump_stack_lvl+0xee/0x150 [ 408.126179][ T9258] ? __cfi_dump_stack_lvl+0x8/0x8 [ 408.131270][ T9258] dump_stack+0x15/0x24 [ 408.135554][ T9258] should_fail_ex+0x3d4/0x520 [ 408.140436][ T9258] __should_failslab+0xac/0xf0 [ 408.145263][ T9258] ? bpf_prog_test_run_skb+0x24f/0x1290 [ 408.150858][ T9258] should_failslab+0x9/0x20 [ 408.155405][ T9258] __kmem_cache_alloc_node+0x3d/0x2c0 [ 408.160910][ T9258] ? bpf_prog_test_run_skb+0x24f/0x1290 [ 408.166589][ T9258] __kmalloc+0xa1/0x1e0 [ 408.170802][ T9258] bpf_prog_test_run_skb+0x24f/0x1290 [ 408.171925][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 408.176267][ T9258] ? __fget_files+0x2d5/0x330 [ 408.176300][ T9258] ? __kasan_check_write+0x14/0x20 [ 408.176320][ T9258] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 408.199408][ T9258] bpf_prog_test_run+0x3e3/0x630 [ 408.204422][ T9258] ? slab_free_freelist_hook+0xc2/0x190 [ 408.210017][ T9258] ? bpf_prog_query+0x270/0x270 [ 408.214922][ T9258] ? selinux_bpf+0xce/0xf0 [ 408.219379][ T9258] ? security_bpf+0x93/0xb0 [ 408.223929][ T9258] __sys_bpf+0x56d/0x780 [ 408.228211][ T9258] ? bpf_link_show_fdinfo+0x320/0x320 [ 408.233622][ T9258] ? __cfi_ksys_write+0x10/0x10 [ 408.238698][ T9258] ? debug_smp_processor_id+0x17/0x20 [ 408.244154][ T9258] __x64_sys_bpf+0x7c/0x90 [ 408.248614][ T9258] x64_sys_call+0x488/0x9a0 [ 408.253160][ T9258] do_syscall_64+0x4c/0xa0 [ 408.257732][ T9258] ? clear_bhb_loop+0x30/0x80 [ 408.262459][ T9258] ? clear_bhb_loop+0x30/0x80 [ 408.267193][ T9258] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 408.273218][ T9258] RIP: 0033:0x7f6c80f8eec9 [ 408.277665][ T9258] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.297536][ T9258] RSP: 002b:00007f6c81e9e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 408.305988][ T9258] RAX: ffffffffffffffda RBX: 00007f6c811e5fa0 RCX: 00007f6c80f8eec9 [ 408.313993][ T9258] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 408.322264][ T9258] RBP: 00007f6c81e9e090 R08: 0000000000000000 R09: 0000000000000000 [ 408.330271][ T9258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.338381][ T9258] R13: 00007f6c811e6038 R14: 00007f6c811e5fa0 R15: 00007ffe419e1518 [ 408.346401][ T9258] [ 408.370410][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 408.382582][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 408.452833][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 408.467653][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 408.555482][ T9262] device syzkaller0 entered promiscuous mode [ 409.959528][ T9297] device syzkaller0 entered promiscuous mode [ 410.365338][ T9314] device wg2 entered promiscuous mode [ 411.636787][ T9331] device pim6reg1 entered promiscuous mode [ 411.901221][ T9340] device pim6reg1 entered promiscuous mode [ 412.664413][ T9349] FAULT_INJECTION: forcing a failure. [ 412.664413][ T9349] name failslab, interval 1, probability 0, space 0, times 0 [ 412.678117][ T9349] CPU: 0 PID: 9349 Comm: syz.2.3067 Not tainted syzkaller #0 [ 412.685569][ T9349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 412.695664][ T9349] Call Trace: [ 412.699226][ T9349] [ 412.702260][ T9349] __dump_stack+0x21/0x24 [ 412.706716][ T9349] dump_stack_lvl+0xee/0x150 [ 412.711362][ T9349] ? __cfi_dump_stack_lvl+0x8/0x8 [ 412.716434][ T9349] dump_stack+0x15/0x24 [ 412.721402][ T9349] should_fail_ex+0x3d4/0x520 [ 412.726151][ T9349] __should_failslab+0xac/0xf0 [ 412.730953][ T9349] ? kvmalloc_node+0x294/0x480 [ 412.735743][ T9349] should_failslab+0x9/0x20 [ 412.740455][ T9349] __kmem_cache_alloc_node+0x3d/0x2c0 [ 412.745947][ T9349] ? kasan_save_alloc_info+0x25/0x30 [ 412.751264][ T9349] ? kvmalloc_node+0x294/0x480 [ 412.756068][ T9349] __kmalloc_node+0xa1/0x1e0 [ 412.760698][ T9349] ? dev_activate+0x2cf/0x1040 [ 412.765579][ T9349] ? __dev_change_flags+0x21b/0x6b0 [ 412.770808][ T9349] kvmalloc_node+0x294/0x480 [ 412.775513][ T9349] ? x64_sys_call+0x58b/0x9a0 [ 412.780323][ T9349] ? do_syscall_64+0x4c/0xa0 [ 412.784945][ T9349] ? __cfi_kvmalloc_node+0x10/0x10 [ 412.790088][ T9349] ? __kasan_check_write+0x14/0x20 [ 412.795224][ T9349] ? qdisc_alloc+0x5ae/0x780 [ 412.799848][ T9349] pfifo_fast_init+0x260/0x7a0 [ 412.804637][ T9349] qdisc_create_dflt+0x150/0x3b0 [ 412.809605][ T9349] dev_activate+0x2cf/0x1040 [ 412.814222][ T9349] __dev_open+0x3ce/0x4f0 [ 412.818694][ T9349] ? dev_open+0x230/0x230 [ 412.823039][ T9349] ? _raw_spin_unlock_bh+0x50/0x60 [ 412.828175][ T9349] ? dev_set_rx_mode+0x223/0x2c0 [ 412.833142][ T9349] ? __kasan_check_read+0x11/0x20 [ 412.838183][ T9349] __dev_change_flags+0x21b/0x6b0 [ 412.843401][ T9349] ? __cfi___dev_change_flags+0x10/0x10 [ 412.849010][ T9349] dev_change_flags+0x88/0x1a0 [ 412.853826][ T9349] dev_ifsioc+0x159/0xed0 [ 412.858648][ T9349] ? dev_ioctl+0xd10/0xd10 [ 412.863435][ T9349] ? __kasan_check_write+0x14/0x20 [ 412.868586][ T9349] ? mutex_lock+0x8d/0x1a0 [ 412.873041][ T9349] ? __cfi_mutex_lock+0x10/0x10 [ 412.878018][ T9349] ? dev_get_by_name_rcu+0xe5/0x130 [ 412.883344][ T9349] dev_ioctl+0x556/0xd10 [ 412.887653][ T9349] sock_do_ioctl+0x23f/0x310 [ 412.892395][ T9349] ? sock_show_fdinfo+0xb0/0xb0 [ 412.897394][ T9349] ? selinux_file_ioctl+0x377/0x480 [ 412.902627][ T9349] sock_ioctl+0x4d8/0x6e0 [ 412.906992][ T9349] ? __cfi_sock_ioctl+0x10/0x10 [ 412.911879][ T9349] ? __fget_files+0x2d5/0x330 [ 412.916582][ T9349] ? security_file_ioctl+0x95/0xc0 [ 412.921828][ T9349] ? __cfi_sock_ioctl+0x10/0x10 [ 412.926733][ T9349] __se_sys_ioctl+0x12f/0x1b0 [ 412.931535][ T9349] __x64_sys_ioctl+0x7b/0x90 [ 412.936167][ T9349] x64_sys_call+0x58b/0x9a0 [ 412.940894][ T9349] do_syscall_64+0x4c/0xa0 [ 412.945963][ T9349] ? clear_bhb_loop+0x30/0x80 [ 412.950852][ T9349] ? clear_bhb_loop+0x30/0x80 [ 412.955564][ T9349] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 412.961551][ T9349] RIP: 0033:0x7f67c138eec9 [ 412.966003][ T9349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.985641][ T9349] RSP: 002b:00007f67c217e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 412.994086][ T9349] RAX: ffffffffffffffda RBX: 00007f67c15e5fa0 RCX: 00007f67c138eec9 [ 413.002089][ T9349] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 413.010181][ T9349] RBP: 00007f67c217e090 R08: 0000000000000000 R09: 0000000000000000 [ 413.018458][ T9349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.026462][ T9349] R13: 00007f67c15e6038 R14: 00007f67c15e5fa0 R15: 00007ffdc0aadd58 [ 413.034475][ T9349] [ 413.042689][ T9349] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 413.052692][ T9349] device pim6reg1 entered promiscuous mode [ 413.641766][ T9358] device syzkaller0 entered promiscuous mode [ 413.925903][ T9366] device wg2 left promiscuous mode [ 413.949648][ T9370] device wg2 entered promiscuous mode [ 415.068349][ T9390] device wg2 left promiscuous mode [ 415.094550][ T9390] device wg2 entered promiscuous mode [ 416.159142][ T9426] device wg2 left promiscuous mode [ 416.291090][ T9426] device wg2 entered promiscuous mode [ 416.579682][ T9439] device pim6reg1 entered promiscuous mode [ 417.039966][ T9460] device pim6reg1 entered promiscuous mode [ 417.187960][ T9463] device wg2 left promiscuous mode [ 417.314723][ T9464] device wg2 entered promiscuous mode [ 419.028598][ T9512] device wg2 left promiscuous mode [ 419.092142][ T9514] device wg2 entered promiscuous mode [ 419.371900][ T9525] device pim6reg1 entered promiscuous mode [ 419.474460][ T9524] device wg2 left promiscuous mode [ 419.577126][ T9528] device wg2 entered promiscuous mode [ 419.675909][ T9532] device sit0 left promiscuous mode [ 419.787113][ T9532] device sit0 entered promiscuous mode [ 420.484596][ T9548] device wg2 left promiscuous mode [ 420.972993][ T9548] device wg2 entered promiscuous mode [ 421.642308][ T9570] device pim6reg1 entered promiscuous mode [ 422.812865][ T9587] device wg2 entered promiscuous mode [ 423.837375][ T9595] device wg2 left promiscuous mode [ 423.882575][ T9598] device wg2 entered promiscuous mode [ 426.615310][ T9646] device pim6reg1 entered promiscuous mode [ 427.291207][ T9651] device wg2 left promiscuous mode [ 427.687434][ T9649] device wg2 entered promiscuous mode [ 429.518230][ T9677] device pim6reg1 entered promiscuous mode [ 429.881307][ T9681] device wg2 left promiscuous mode [ 430.136162][ T9687] device sit0 left promiscuous mode [ 430.154666][ T9687] device sit0 entered promiscuous mode [ 430.511020][ T9693] device pim6reg1 entered promiscuous mode [ 430.567404][ T9694] device pim6reg1 entered promiscuous mode [ 431.160292][ T9710] device pim6reg1 entered promiscuous mode [ 431.209005][ T9710] FAULT_INJECTION: forcing a failure. [ 431.209005][ T9710] name failslab, interval 1, probability 0, space 0, times 0 [ 431.380268][ T9710] CPU: 1 PID: 9710 Comm: syz.4.3185 Not tainted syzkaller #0 [ 431.387726][ T9710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 431.397819][ T9710] Call Trace: [ 431.401136][ T9710] [ 431.404104][ T9710] __dump_stack+0x21/0x24 [ 431.408479][ T9710] dump_stack_lvl+0xee/0x150 [ 431.413114][ T9710] ? __cfi_dump_stack_lvl+0x8/0x8 [ 431.418179][ T9710] ? __wake_up_klogd+0xe3/0x110 [ 431.423081][ T9710] dump_stack+0x15/0x24 [ 431.427293][ T9710] should_fail_ex+0x3d4/0x520 [ 431.432019][ T9710] __should_failslab+0xac/0xf0 [ 431.436831][ T9710] should_failslab+0x9/0x20 [ 431.441365][ T9710] kmem_cache_alloc_node+0x42/0x340 [ 431.446604][ T9710] ? __alloc_skb+0xea/0x4b0 [ 431.451185][ T9710] ? br_get_link_af_size_filtered+0xe0/0x180 [ 431.457297][ T9710] __alloc_skb+0xea/0x4b0 [ 431.461674][ T9710] rtmsg_ifinfo_build_skb+0x7c/0x190 [ 431.467056][ T9710] rtmsg_ifinfo+0x7a/0x130 [ 431.471505][ T9710] __dev_notify_flags+0xdb/0x500 [ 431.476469][ T9710] ? __cfi___dev_notify_flags+0x10/0x10 [ 431.482042][ T9710] ? __dev_change_flags+0x521/0x6b0 [ 431.487297][ T9710] ? __cfi___dev_change_flags+0x10/0x10 [ 431.492892][ T9710] dev_change_flags+0xe8/0x1a0 [ 431.497687][ T9710] dev_ifsioc+0x159/0xed0 [ 431.502048][ T9710] ? dev_ioctl+0xd10/0xd10 [ 431.506503][ T9710] ? __kasan_check_write+0x14/0x20 [ 431.511733][ T9710] ? mutex_lock+0x8d/0x1a0 [ 431.516196][ T9710] ? __cfi_mutex_lock+0x10/0x10 [ 431.521095][ T9710] ? dev_get_by_name_rcu+0xe5/0x130 [ 431.526332][ T9710] dev_ioctl+0x556/0xd10 [ 431.530619][ T9710] sock_do_ioctl+0x23f/0x310 [ 431.535496][ T9710] ? sock_show_fdinfo+0xb0/0xb0 [ 431.540371][ T9710] ? selinux_file_ioctl+0x377/0x480 [ 431.545588][ T9710] sock_ioctl+0x4d8/0x6e0 [ 431.549939][ T9710] ? __cfi_sock_ioctl+0x10/0x10 [ 431.554818][ T9710] ? __fget_files+0x2d5/0x330 [ 431.559526][ T9710] ? security_file_ioctl+0x95/0xc0 [ 431.564664][ T9710] ? __cfi_sock_ioctl+0x10/0x10 [ 431.569552][ T9710] __se_sys_ioctl+0x12f/0x1b0 [ 431.574253][ T9710] __x64_sys_ioctl+0x7b/0x90 [ 431.578859][ T9710] x64_sys_call+0x58b/0x9a0 [ 431.583391][ T9710] do_syscall_64+0x4c/0xa0 [ 431.587832][ T9710] ? clear_bhb_loop+0x30/0x80 [ 431.592557][ T9710] ? clear_bhb_loop+0x30/0x80 [ 431.597259][ T9710] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 431.603200][ T9710] RIP: 0033:0x7f083838eec9 [ 431.607628][ T9710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 431.627259][ T9710] RSP: 002b:00007f08391e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 431.635711][ T9710] RAX: ffffffffffffffda RBX: 00007f08385e5fa0 RCX: 00007f083838eec9 [ 431.643713][ T9710] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 431.651739][ T9710] RBP: 00007f08391e1090 R08: 0000000000000000 R09: 0000000000000000 [ 431.659769][ T9710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 431.667771][ T9710] R13: 00007f08385e6038 R14: 00007f08385e5fa0 R15: 00007ffef5b66e08 [ 431.675777][ T9710] [ 431.997332][ T9726] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.005648][ T9726] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.168457][ T9729] device bridge_slave_1 left promiscuous mode [ 432.214458][ T9729] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.318025][ T9729] device bridge_slave_0 left promiscuous mode [ 432.377892][ T9729] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.678122][ T9755] device pim6reg1 entered promiscuous mode [ 433.241396][ T9762] device pim6reg1 entered promiscuous mode [ 433.530710][ T9770] device sit0 entered promiscuous mode [ 433.896786][ T9776] device wg2 entered promiscuous mode [ 435.372760][ T9807] device pim6reg1 entered promiscuous mode [ 435.891471][ T9819] device pim6reg1 entered promiscuous mode [ 436.135241][ T9828] device pim6reg1 entered promiscuous mode [ 436.207634][ T9833] device pim6reg1 entered promiscuous mode [ 436.356668][ T9841] device pim6reg1 entered promiscuous mode [ 436.611621][ T9850] device wg2 left promiscuous mode [ 436.639630][ T9850] device wg2 entered promiscuous mode [ 436.928749][ T9864] device pim6reg1 entered promiscuous mode [ 437.060069][ T9865] device syzkaller0 entered promiscuous mode [ 437.818377][ T9883] device wg2 left promiscuous mode [ 437.976315][ T9885] device wg2 entered promiscuous mode [ 438.126109][ T9893] FAULT_INJECTION: forcing a failure. [ 438.126109][ T9893] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 438.161449][ T9893] CPU: 0 PID: 9893 Comm: syz.2.3245 Not tainted syzkaller #0 [ 438.168899][ T9893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 438.179071][ T9893] Call Trace: [ 438.182373][ T9893] [ 438.185324][ T9893] __dump_stack+0x21/0x24 [ 438.189684][ T9893] dump_stack_lvl+0xee/0x150 [ 438.194323][ T9893] ? __cfi_dump_stack_lvl+0x8/0x8 [ 438.199374][ T9893] ? __rcu_read_unlock+0xa0/0xa0 [ 438.204456][ T9893] ? migrate_enable+0x19c/0x280 [ 438.209353][ T9893] dump_stack+0x15/0x24 [ 438.213539][ T9893] should_fail_ex+0x3d4/0x520 [ 438.218295][ T9893] should_fail+0xb/0x10 [ 438.222698][ T9893] should_fail_usercopy+0x1a/0x20 [ 438.227765][ T9893] _copy_to_user+0x1e/0x90 [ 438.232221][ T9893] bpf_test_finish+0x1a8/0x6b0 [ 438.237047][ T9893] ? __kasan_slab_alloc+0x72/0x80 [ 438.242142][ T9893] ? convert_skb_to___skb+0x430/0x430 [ 438.247560][ T9893] bpf_prog_test_run_skb+0xce1/0x1290 [ 438.253052][ T9893] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 438.259022][ T9893] bpf_prog_test_run+0x3e3/0x630 [ 438.264035][ T9893] ? slab_free_freelist_hook+0xc2/0x190 [ 438.269742][ T9893] ? bpf_prog_query+0x270/0x270 [ 438.274718][ T9893] ? selinux_bpf+0xce/0xf0 [ 438.279186][ T9893] ? security_bpf+0x93/0xb0 [ 438.283858][ T9893] __sys_bpf+0x56d/0x780 [ 438.288230][ T9893] ? bpf_link_show_fdinfo+0x320/0x320 [ 438.293726][ T9893] ? __cfi_ksys_write+0x10/0x10 [ 438.298707][ T9893] ? debug_smp_processor_id+0x17/0x20 [ 438.304142][ T9893] __x64_sys_bpf+0x7c/0x90 [ 438.308618][ T9893] x64_sys_call+0x488/0x9a0 [ 438.313167][ T9893] do_syscall_64+0x4c/0xa0 [ 438.317624][ T9893] ? clear_bhb_loop+0x30/0x80 [ 438.322485][ T9893] ? clear_bhb_loop+0x30/0x80 [ 438.327217][ T9893] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 438.333331][ T9893] RIP: 0033:0x7f67c138eec9 [ 438.337793][ T9893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 438.357526][ T9893] RSP: 002b:00007f67c217e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 438.365993][ T9893] RAX: ffffffffffffffda RBX: 00007f67c15e5fa0 RCX: 00007f67c138eec9 [ 438.374011][ T9893] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 438.382044][ T9893] RBP: 00007f67c217e090 R08: 0000000000000000 R09: 0000000000000000 [ 438.390062][ T9893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 438.398072][ T9893] R13: 00007f67c15e6038 R14: 00007f67c15e5fa0 R15: 00007ffdc0aadd58 [ 438.406086][ T9893] [ 439.002663][ T9913] device pim6reg1 entered promiscuous mode [ 439.898644][ T9921] device veth1_macvtap left promiscuous mode [ 440.313398][ T9944] device pim6reg1 entered promiscuous mode [ 440.381369][ T9943] device pim6reg1 entered promiscuous mode [ 441.699092][ T9967] device sit0 left promiscuous mode [ 441.769912][ T9967] device sit0 entered promiscuous mode [ 442.071916][ T9976] device wg2 left promiscuous mode [ 442.143436][ T9983] device wg2 entered promiscuous mode [ 442.285698][ T9987] device pim6reg1 entered promiscuous mode [ 442.915106][ T9999] device sit0 entered promiscuous mode [ 445.310297][T10071] device sit0 left promiscuous mode [ 445.408859][T10077] device sit0 entered promiscuous mode [ 447.151269][T10122] FAULT_INJECTION: forcing a failure. [ 447.151269][T10122] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 447.190066][T10122] CPU: 0 PID: 10122 Comm: syz.3.3323 Not tainted syzkaller #0 [ 447.197606][T10122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 447.207824][T10122] Call Trace: [ 447.211126][T10122] [ 447.214111][T10122] __dump_stack+0x21/0x24 [ 447.218930][T10122] dump_stack_lvl+0xee/0x150 [ 447.223559][T10122] ? __cfi_dump_stack_lvl+0x8/0x8 [ 447.228717][T10122] ? __rcu_read_unlock+0xa0/0xa0 [ 447.233688][T10122] ? migrate_enable+0x19c/0x280 [ 447.238576][T10122] dump_stack+0x15/0x24 [ 447.242922][T10122] should_fail_ex+0x3d4/0x520 [ 447.247650][T10122] should_fail+0xb/0x10 [ 447.251852][T10122] should_fail_usercopy+0x1a/0x20 [ 447.256924][T10122] _copy_to_user+0x1e/0x90 [ 447.261466][T10122] bpf_test_finish+0x48d/0x6b0 [ 447.266283][T10122] ? __kasan_slab_alloc+0x72/0x80 [ 447.271356][T10122] ? convert_skb_to___skb+0x430/0x430 [ 447.276806][T10122] bpf_prog_test_run_skb+0xce1/0x1290 [ 447.283556][T10122] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 447.289411][T10122] bpf_prog_test_run+0x3e3/0x630 [ 447.294477][T10122] ? slab_free_freelist_hook+0xc2/0x190 [ 447.300098][T10122] ? bpf_prog_query+0x270/0x270 [ 447.305176][T10122] ? selinux_bpf+0xce/0xf0 [ 447.309722][T10122] ? security_bpf+0x93/0xb0 [ 447.314269][T10122] __sys_bpf+0x56d/0x780 [ 447.318549][T10122] ? bpf_link_show_fdinfo+0x320/0x320 [ 447.323954][T10122] ? __cfi_ksys_write+0x10/0x10 [ 447.328855][T10122] ? debug_smp_processor_id+0x17/0x20 [ 447.334281][T10122] __x64_sys_bpf+0x7c/0x90 [ 447.338748][T10122] x64_sys_call+0x488/0x9a0 [ 447.343289][T10122] do_syscall_64+0x4c/0xa0 [ 447.347739][T10122] ? clear_bhb_loop+0x30/0x80 [ 447.352458][T10122] ? clear_bhb_loop+0x30/0x80 [ 447.357259][T10122] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 447.363479][T10122] RIP: 0033:0x7f6c80f8eec9 [ 447.367919][T10122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 447.387725][T10122] RSP: 002b:00007f6c81e9e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 447.396203][T10122] RAX: ffffffffffffffda RBX: 00007f6c811e5fa0 RCX: 00007f6c80f8eec9 [ 447.404756][T10122] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 447.412737][T10122] RBP: 00007f6c81e9e090 R08: 0000000000000000 R09: 0000000000000000 [ 447.420719][T10122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.428881][T10122] R13: 00007f6c811e6038 R14: 00007f6c811e5fa0 R15: 00007ffe419e1518 [ 447.436873][T10122] [ 447.912335][T10143] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 448.003927][T10143] device syzkaller0 entered promiscuous mode [ 449.023506][T10176] device wg2 left promiscuous mode [ 449.123864][T10181] device wg2 entered promiscuous mode [ 449.471111][T10190] device pim6reg1 entered promiscuous mode [ 452.679814][T10233] device sit0 left promiscuous mode [ 452.790545][T10233] device sit0 entered promiscuous mode [ 453.213736][T10236] device syzkaller0 entered promiscuous mode [ 453.865157][T10264] device wg2 left promiscuous mode [ 453.991782][T10264] device wg2 entered promiscuous mode [ 454.078349][T10268] device syzkaller0 entered promiscuous mode [ 454.482880][T10279] device pim6reg1 entered promiscuous mode [ 454.637937][T10286] device veth0_vlan left promiscuous mode [ 454.644066][T10286] device veth0_vlan entered promiscuous mode [ 454.660902][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 454.685717][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 454.748206][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 455.574678][T10313] device syzkaller0 entered promiscuous mode [ 455.595608][T10320] device pim6reg1 entered promiscuous mode [ 455.881667][T10330] device pim6reg1 entered promiscuous mode [ 456.179173][T10328] device syzkaller0 entered promiscuous mode [ 457.052201][T10356] device syzkaller0 entered promiscuous mode [ 457.132379][T10361] device pim6reg1 entered promiscuous mode [ 457.141967][T10361] FAULT_INJECTION: forcing a failure. [ 457.141967][T10361] name failslab, interval 1, probability 0, space 0, times 0 [ 457.155882][T10361] CPU: 1 PID: 10361 Comm: syz.5.3400 Not tainted syzkaller #0 [ 457.163915][T10361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 457.174010][T10361] Call Trace: [ 457.177330][T10361] [ 457.180387][T10361] __dump_stack+0x21/0x24 [ 457.184752][T10361] dump_stack_lvl+0xee/0x150 [ 457.189380][T10361] ? __cfi_dump_stack_lvl+0x8/0x8 [ 457.194439][T10361] ? __kasan_check_write+0x14/0x20 [ 457.199588][T10361] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 457.205086][T10361] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 457.211026][T10361] dump_stack+0x15/0x24 [ 457.215252][T10361] should_fail_ex+0x3d4/0x520 [ 457.220025][T10361] __should_failslab+0xac/0xf0 [ 457.224834][T10361] ? ____ip_mc_inc_group+0x1ab/0x860 [ 457.230362][T10361] should_failslab+0x9/0x20 [ 457.234908][T10361] __kmem_cache_alloc_node+0x3d/0x2c0 [ 457.240337][T10361] ? ____ip_mc_inc_group+0x1ab/0x860 [ 457.246395][T10361] kmalloc_trace+0x29/0xb0 [ 457.250870][T10361] ____ip_mc_inc_group+0x1ab/0x860 [ 457.256300][T10361] ip_mc_up+0x112/0x1f0 [ 457.260520][T10361] inetdev_event+0xc7e/0x10e0 [ 457.265251][T10361] ? __cfi_inetdev_event+0x10/0x10 [ 457.270426][T10361] ? arp_netdev_event+0xd4/0x2b0 [ 457.276884][T10361] raw_notifier_call_chain+0xa1/0x110 [ 457.282767][T10361] __dev_notify_flags+0x28f/0x500 [ 457.288810][T10361] ? __cfi___dev_notify_flags+0x10/0x10 [ 457.294582][T10361] ? __dev_change_flags+0x521/0x6b0 [ 457.300024][T10361] ? __cfi___dev_change_flags+0x10/0x10 [ 457.305621][T10361] ? __cfi_free_modprobe_argv+0x10/0x10 [ 457.311312][T10361] ? __request_module+0x3dc/0x890 [ 457.316463][T10361] dev_change_flags+0xe8/0x1a0 [ 457.321281][T10361] dev_ifsioc+0x159/0xed0 [ 457.325853][T10361] ? dev_ioctl+0xd10/0xd10 [ 457.330368][T10361] ? __mutex_lock_slowpath+0xe/0x10 [ 457.335625][T10361] ? mutex_lock+0xf8/0x1a0 [ 457.340273][T10361] ? __cfi_mutex_lock+0x10/0x10 [ 457.345207][T10361] ? security_capable+0x99/0xc0 [ 457.350121][T10361] dev_ioctl+0x556/0xd10 [ 457.354426][T10361] sock_do_ioctl+0x23f/0x310 [ 457.359074][T10361] ? sock_show_fdinfo+0xb0/0xb0 [ 457.363984][T10361] ? selinux_file_ioctl+0x377/0x480 [ 457.369243][T10361] sock_ioctl+0x4d8/0x6e0 [ 457.373630][T10361] ? __cfi_sock_ioctl+0x10/0x10 [ 457.378769][T10361] ? __fget_files+0x2d5/0x330 [ 457.383592][T10361] ? security_file_ioctl+0x95/0xc0 [ 457.388842][T10361] ? __cfi_sock_ioctl+0x10/0x10 [ 457.393905][T10361] __se_sys_ioctl+0x12f/0x1b0 [ 457.398635][T10361] __x64_sys_ioctl+0x7b/0x90 [ 457.403361][T10361] x64_sys_call+0x58b/0x9a0 [ 457.407999][T10361] do_syscall_64+0x4c/0xa0 [ 457.412454][T10361] ? clear_bhb_loop+0x30/0x80 [ 457.417265][T10361] ? clear_bhb_loop+0x30/0x80 [ 457.422007][T10361] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 457.428228][T10361] RIP: 0033:0x7fdbbaf8eec9 [ 457.432690][T10361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 457.452570][T10361] RSP: 002b:00007fdbbbe9e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 457.461043][T10361] RAX: ffffffffffffffda RBX: 00007fdbbb1e6090 RCX: 00007fdbbaf8eec9 [ 457.469317][T10361] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 457.477590][T10361] RBP: 00007fdbbbe9e090 R08: 0000000000000000 R09: 0000000000000000 [ 457.485676][T10361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 457.493697][T10361] R13: 00007fdbbb1e6128 R14: 00007fdbbb1e6090 R15: 00007ffcaf23c318 [ 457.501732][T10361] [ 458.011709][ T28] audit: type=1400 audit(1760161312.842:147): avc: denied { create } for pid=10377 comm="syz.5.3407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 459.167552][T10424] device sit0 left promiscuous mode [ 459.251104][T10427] device sit0 entered promiscuous mode [ 459.784774][ T28] audit: type=1400 audit(1760161314.612:148): avc: denied { create } for pid=10438 comm="syz.0.3428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 460.727192][T10474] FAULT_INJECTION: forcing a failure. [ 460.727192][T10474] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 460.736264][T10472] device pim6reg1 entered promiscuous mode [ 460.747203][T10474] CPU: 0 PID: 10474 Comm: syz.2.3442 Not tainted syzkaller #0 [ 460.754808][T10474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 460.765315][T10474] Call Trace: [ 460.768649][T10474] [ 460.771610][T10474] __dump_stack+0x21/0x24 [ 460.775978][T10474] dump_stack_lvl+0xee/0x150 [ 460.780614][T10474] ? __cfi_dump_stack_lvl+0x8/0x8 [ 460.785691][T10474] dump_stack+0x15/0x24 [ 460.789889][T10474] should_fail_ex+0x3d4/0x520 [ 460.794812][T10474] should_fail+0xb/0x10 [ 460.799024][T10474] should_fail_usercopy+0x1a/0x20 [ 460.804104][T10474] _copy_from_user+0x1e/0xc0 [ 460.808774][T10474] sock_do_ioctl+0x186/0x310 [ 460.813417][T10474] ? sock_show_fdinfo+0xb0/0xb0 [ 460.818330][T10474] ? selinux_file_ioctl+0x377/0x480 [ 460.823584][T10474] sock_ioctl+0x4d8/0x6e0 [ 460.827967][T10474] ? __cfi_sock_ioctl+0x10/0x10 [ 460.832890][T10474] ? __fget_files+0x2d5/0x330 [ 460.837610][T10474] ? security_file_ioctl+0x95/0xc0 [ 460.842776][T10474] ? __cfi_sock_ioctl+0x10/0x10 [ 460.847755][T10474] __se_sys_ioctl+0x12f/0x1b0 [ 460.852474][T10474] __x64_sys_ioctl+0x7b/0x90 [ 460.857104][T10474] x64_sys_call+0x58b/0x9a0 [ 460.861660][T10474] do_syscall_64+0x4c/0xa0 [ 460.866114][T10474] ? clear_bhb_loop+0x30/0x80 [ 460.870930][T10474] ? clear_bhb_loop+0x30/0x80 [ 460.875740][T10474] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 460.881930][T10474] RIP: 0033:0x7f67c138eec9 [ 460.886579][T10474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 460.906605][T10474] RSP: 002b:00007f67c217e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 460.915108][T10474] RAX: ffffffffffffffda RBX: 00007f67c15e5fa0 RCX: 00007f67c138eec9 [ 460.923098][T10474] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 000000000000000a [ 460.931095][T10474] RBP: 00007f67c217e090 R08: 0000000000000000 R09: 0000000000000000 [ 460.939085][T10474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.947106][T10474] R13: 00007f67c15e6038 R14: 00007f67c15e5fa0 R15: 00007ffdc0aadd58 [ 460.955107][T10474] [ 461.537681][ T28] audit: type=1400 audit(1760161316.372:149): avc: denied { read } for pid=10492 comm="syz.0.3449" dev="nsfs" ino=4026532289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 461.723739][ T28] audit: type=1400 audit(1760161316.392:150): avc: denied { open } for pid=10492 comm="syz.0.3449" path="mnt:[4026532289]" dev="nsfs" ino=4026532289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 461.811754][T10493] device sit0 left promiscuous mode [ 462.054201][T10496] device sit0 entered promiscuous mode [ 463.336852][T10541] device syzkaller0 entered promiscuous mode [ 464.131094][T10553] device syzkaller0 entered promiscuous mode [ 464.714493][T10589] device pim6reg1 entered promiscuous mode [ 465.627911][T10603] device syzkaller0 entered promiscuous mode [ 466.478809][T10612] device syzkaller0 entered promiscuous mode [ 466.501290][T10617] device pim6reg1 entered promiscuous mode [ 467.057458][T10611] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.079133][T10611] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.103543][T10611] device bridge_slave_0 entered promiscuous mode [ 467.111132][T10611] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.118321][T10611] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.130282][T10611] device bridge_slave_1 entered promiscuous mode [ 467.294337][T10640] device syzkaller0 entered promiscuous mode [ 467.812629][ T1328] device bridge_slave_1 left promiscuous mode [ 467.819449][ T1328] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.855022][ T1328] device O3ãc¤± left promiscuous mode [ 467.876542][ T1328] bridge0: port 1(O3ãc¤±) entered disabled state [ 467.904588][ T1328] device veth0_vlan left promiscuous mode [ 468.232524][T10661] device sit0 left promiscuous mode [ 468.265400][T10659] device sit0 entered promiscuous mode [ 468.799651][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 468.819755][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 468.894718][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 468.936009][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 468.980952][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.988216][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.043269][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 469.070101][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 469.079598][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.086819][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.119782][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 469.194429][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 469.207847][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 469.217288][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 469.225530][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 469.250253][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 469.289412][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 469.298142][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 469.306136][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 469.315847][T10611] device veth0_vlan entered promiscuous mode [ 469.333251][T10611] device veth1_macvtap entered promiscuous mode [ 469.344641][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 469.361906][T10693] device pim6reg1 entered promiscuous mode [ 469.407375][T10693] FAULT_INJECTION: forcing a failure. [ 469.407375][T10693] name failslab, interval 1, probability 0, space 0, times 0 [ 469.491362][T10693] CPU: 0 PID: 10693 Comm: syz.4.3508 Not tainted syzkaller #0 [ 469.498904][T10693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 469.508996][T10693] Call Trace: [ 469.512312][T10693] [ 469.515279][T10693] __dump_stack+0x21/0x24 [ 469.519663][T10693] dump_stack_lvl+0xee/0x150 [ 469.524293][T10693] ? __cfi_dump_stack_lvl+0x8/0x8 [ 469.529378][T10693] ? pcpu_block_refresh_hint+0x201/0x310 [ 469.535082][T10693] dump_stack+0x15/0x24 [ 469.539291][T10693] should_fail_ex+0x3d4/0x520 [ 469.544140][T10693] __should_failslab+0xac/0xf0 [ 469.548956][T10693] ? ref_tracker_alloc+0x139/0x430 [ 469.554385][T10693] should_failslab+0x9/0x20 [ 469.558934][T10693] __kmem_cache_alloc_node+0x3d/0x2c0 [ 469.564369][T10693] ? ref_tracker_alloc+0x139/0x430 [ 469.569526][T10693] kmalloc_trace+0x29/0xb0 [ 469.574079][T10693] ref_tracker_alloc+0x139/0x430 [ 469.579052][T10693] ? __alloc_percpu_gfp+0x25/0x30 [ 469.584156][T10693] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 469.589673][T10693] fib6_nh_init+0x8e6/0x1ff0 [ 469.594428][T10693] ? kasan_set_track+0x60/0x70 [ 469.599237][T10693] ? addrconf_addr_gen+0x46b/0x5a0 [ 469.604388][T10693] ? addrconf_init_auto_addrs+0x84b/0xb80 [ 469.610240][T10693] ? __dev_notify_flags+0x28f/0x500 [ 469.615487][T10693] ? __cfi_fib6_nh_init+0x10/0x10 [ 469.620570][T10693] ? sock_ioctl+0x4d8/0x6e0 [ 469.625119][T10693] ? __se_sys_ioctl+0x12f/0x1b0 [ 469.630088][T10693] ? __x64_sys_ioctl+0x7b/0x90 [ 469.634886][T10693] ? x64_sys_call+0x58b/0x9a0 [ 469.639694][T10693] ? do_syscall_64+0x4c/0xa0 [ 469.644325][T10693] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 469.650458][T10693] ? ip_fib_metrics_init+0x40a/0x6f0 [ 469.655883][T10693] ? __cfi_ip_fib_metrics_init+0x10/0x10 [ 469.661574][T10693] ? __kasan_kmalloc+0x95/0xb0 [ 469.666396][T10693] ? memcpy+0x56/0x70 [ 469.670423][T10693] ? ipv6_addr_prefix+0xb9/0x180 [ 469.675409][T10693] ip6_route_info_create+0xa66/0x1510 [ 469.680844][T10693] ip6_route_add+0x27/0x130 [ 469.685401][T10693] addrconf_add_linklocal+0x3d4/0x620 [ 469.690935][T10693] ? __cfi_addrconf_add_linklocal+0x10/0x10 [ 469.696886][T10693] ? ipv6_generate_stable_address+0x517/0x690 [ 469.703145][T10693] addrconf_addr_gen+0x46b/0x5a0 [ 469.708148][T10693] ? ip6_route_add+0x104/0x130 [ 469.713079][T10693] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 469.718882][T10693] ? addrconf_add_dev+0x32c/0x420 [ 469.724047][T10693] ? addrconf_verify_rtnl+0xe60/0xe60 [ 469.729459][T10693] ? __local_bh_enable_ip+0x58/0x80 [ 469.734704][T10693] ? addrconf_permanent_addr+0x867/0x8c0 [ 469.740567][T10693] ? __kasan_check_read+0x11/0x20 [ 469.745636][T10693] addrconf_init_auto_addrs+0x84b/0xb80 [ 469.751226][T10693] ? addrconf_dad_run+0x590/0x590 [ 469.756301][T10693] ? igmpv3_del_delrec+0x700/0x700 [ 469.761492][T10693] ? __local_bh_enable_ip+0x58/0x80 [ 469.766844][T10693] ? _raw_spin_unlock_bh+0x50/0x60 [ 469.772003][T10693] ? __kasan_check_write+0x14/0x20 [ 469.777166][T10693] ? tun_sock_write_space+0x13b/0x1b0 [ 469.782700][T10693] ? __kasan_check_write+0x14/0x20 [ 469.787855][T10693] ? mutex_unlock+0x89/0x220 [ 469.792511][T10693] ? __cfi_mutex_unlock+0x10/0x10 [ 469.797882][T10693] ? macsec_notify+0xff/0x490 [ 469.802704][T10693] ? inetdev_event+0xe17/0x10e0 [ 469.807643][T10693] ? addrconf_link_ready+0x134/0x190 [ 469.812982][T10693] addrconf_notify+0x803/0xe40 [ 469.817806][T10693] raw_notifier_call_chain+0xa1/0x110 [ 469.823679][T10693] __dev_notify_flags+0x28f/0x500 [ 469.828839][T10693] ? __cfi___dev_notify_flags+0x10/0x10 [ 469.834780][T10693] ? __dev_change_flags+0x521/0x6b0 [ 469.840218][T10693] ? __cfi___dev_change_flags+0x10/0x10 [ 469.845908][T10693] dev_change_flags+0xe8/0x1a0 [ 469.850726][T10693] dev_ifsioc+0x159/0xed0 [ 469.855104][T10693] ? dev_ioctl+0xd10/0xd10 [ 469.859579][T10693] ? __mutex_lock_slowpath+0xe/0x10 [ 469.864825][T10693] ? mutex_lock+0xf8/0x1a0 [ 469.869316][T10693] ? __cfi_mutex_lock+0x10/0x10 [ 469.874210][T10693] ? dev_get_by_name_rcu+0xe5/0x130 [ 469.879558][T10693] dev_ioctl+0x556/0xd10 [ 469.883860][T10693] sock_do_ioctl+0x23f/0x310 [ 469.888551][T10693] ? sock_show_fdinfo+0xb0/0xb0 [ 469.893532][T10693] ? selinux_file_ioctl+0x377/0x480 [ 469.898778][T10693] sock_ioctl+0x4d8/0x6e0 [ 469.903162][T10693] ? __cfi_sock_ioctl+0x10/0x10 [ 469.908071][T10693] ? __fget_files+0x2d5/0x330 [ 469.912870][T10693] ? security_file_ioctl+0x95/0xc0 [ 469.918124][T10693] ? __cfi_sock_ioctl+0x10/0x10 [ 469.923058][T10693] __se_sys_ioctl+0x12f/0x1b0 [ 469.927783][T10693] __x64_sys_ioctl+0x7b/0x90 [ 469.932420][T10693] x64_sys_call+0x58b/0x9a0 [ 469.936971][T10693] do_syscall_64+0x4c/0xa0 [ 469.941433][T10693] ? clear_bhb_loop+0x30/0x80 [ 469.946157][T10693] ? clear_bhb_loop+0x30/0x80 [ 469.950970][T10693] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 469.956909][T10693] RIP: 0033:0x7f083838eec9 [ 469.961364][T10693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 469.981368][T10693] RSP: 002b:00007f08391e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 469.989828][T10693] RAX: ffffffffffffffda RBX: 00007f08385e5fa0 RCX: 00007f083838eec9 [ 469.998281][T10693] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 470.006524][T10693] RBP: 00007f08391e1090 R08: 0000000000000000 R09: 0000000000000000 [ 470.014710][T10693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 470.022715][T10693] R13: 00007f08385e6038 R14: 00007f08385e5fa0 R15: 00007ffef5b66e08 [ 470.030770][T10693] [ 470.127164][T10693] memory allocation failure, unreliable refcount tracker. [ 470.141813][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 470.202249][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 470.237643][T10696] device pim6reg1 entered promiscuous mode [ 470.461855][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 470.478691][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 471.617903][T10738] device syzkaller0 entered promiscuous mode [ 472.514350][T10756] device pim6reg1 entered promiscuous mode [ 472.726926][T10765] device wg2 left promiscuous mode [ 472.837592][T10765] device wg2 entered promiscuous mode [ 473.207321][T10769] device syzkaller0 entered promiscuous mode [ 473.643373][T10791] device sit0 left promiscuous mode [ 473.766152][T10791] device sit0 entered promiscuous mode [ 474.992922][T10817] device pim6reg1 entered promiscuous mode [ 476.103606][T10837] device pim6reg1 entered promiscuous mode [ 477.151471][T10851] device sit0 left promiscuous mode [ 477.283812][T10852] device sit0 entered promiscuous mode [ 477.802783][ T28] audit: type=1400 audit(1760161332.632:151): avc: denied { create } for pid=10873 comm="syz.3.3568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 478.261922][T10884] device syzkaller0 entered promiscuous mode [ 478.627420][T10886] device wg2 left promiscuous mode [ 479.145014][ T28] audit: type=1400 audit(1760161333.972:152): avc: denied { ioctl } for pid=10910 comm="syz.2.3582" path="pid:[4026532313]" dev="nsfs" ino=4026532313 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 479.485213][T10918] device veth0_vlan left promiscuous mode [ 479.528665][T10918] device veth0_vlan entered promiscuous mode [ 479.625177][ T1328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 479.736627][ T1328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 479.748099][ T1328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 479.896166][T10927] device syzkaller0 entered promiscuous mode [ 481.382843][T10973] device syzkaller0 entered promiscuous mode [ 481.785134][T10985] device pim6reg1 entered promiscuous mode [ 482.860025][T10997] device syzkaller0 entered promiscuous mode [ 483.758661][T11020] device syzkaller0 entered promiscuous mode [ 484.283191][T11029] device syzkaller0 entered promiscuous mode [ 484.729106][T11046] device pim6reg1 entered promiscuous mode [ 484.864792][T11053] device sit0 left promiscuous mode [ 485.019736][T11054] device sit0 entered promiscuous mode [ 485.533361][T11060] device syzkaller0 entered promiscuous mode [ 485.974597][T11067] device syzkaller0 entered promiscuous mode [ 487.396586][T11110] device pim6reg1 entered promiscuous mode [ 487.716614][T11115] device syzkaller0 entered promiscuous mode [ 488.132151][T11123] device pim6reg1 entered promiscuous mode [ 488.287620][T11135] device sit0 left promiscuous mode [ 488.364458][T11138] device sit0 entered promiscuous mode [ 488.546341][T11140] device veth1_macvtap left promiscuous mode [ 489.407794][T11154] device pim6reg1 entered promiscuous mode [ 490.053755][T11165] device pim6reg1 entered promiscuous mode [ 490.570521][T11182] device sit0 left promiscuous mode [ 490.666110][T11183] device sit0 entered promiscuous mode [ 491.808437][T11200] device pim6reg1 entered promiscuous mode [ 492.868369][T11225] device wg2 left promiscuous mode [ 493.038060][T11221] device wg2 entered promiscuous mode [ 493.744500][T11236] device syzkaller0 entered promiscuous mode [ 494.488395][T11251] device pim6reg1 entered promiscuous mode [ 494.660390][ T28] audit: type=1400 audit(1760161349.492:153): avc: denied { create } for pid=11257 comm="syz.2.3702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 494.878036][T11258] bond_slave_1: mtu less than device minimum [ 494.960480][T11258] device pim6reg1 entered promiscuous mode [ 495.603172][T11276] ip6_vti0: mtu greater than device maximum [ 495.932830][T11290] FAULT_INJECTION: forcing a failure. [ 495.932830][T11290] name failslab, interval 1, probability 0, space 0, times 0 [ 495.967140][T11290] CPU: 1 PID: 11290 Comm: syz.0.3715 Not tainted syzkaller #0 [ 495.974682][T11290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 495.984758][T11290] Call Trace: [ 495.988059][T11290] [ 495.991013][T11290] __dump_stack+0x21/0x24 [ 495.995464][T11290] dump_stack_lvl+0xee/0x150 [ 496.000091][T11290] ? __cfi_dump_stack_lvl+0x8/0x8 [ 496.005158][T11290] dump_stack+0x15/0x24 [ 496.009352][T11290] should_fail_ex+0x3d4/0x520 [ 496.014067][T11290] ? build_skb+0x2a/0x220 [ 496.018445][T11290] __should_failslab+0xac/0xf0 [ 496.023252][T11290] should_failslab+0x9/0x20 [ 496.027786][T11290] kmem_cache_alloc+0x3b/0x330 [ 496.032593][T11290] build_skb+0x2a/0x220 [ 496.036789][T11290] bpf_prog_test_run_skb+0x39f/0x1290 [ 496.042309][T11290] ? __fget_files+0x2d5/0x330 [ 496.047039][T11290] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 496.052901][T11290] bpf_prog_test_run+0x3e3/0x630 [ 496.058254][T11290] ? bpf_prog_query+0x270/0x270 [ 496.063162][T11290] ? selinux_bpf+0xce/0xf0 [ 496.067623][T11290] ? security_bpf+0x93/0xb0 [ 496.072155][T11290] __sys_bpf+0x56d/0x780 [ 496.076791][T11290] ? bpf_link_show_fdinfo+0x320/0x320 [ 496.082222][T11290] __x64_sys_bpf+0x7c/0x90 [ 496.086706][T11290] x64_sys_call+0x488/0x9a0 [ 496.091253][T11290] do_syscall_64+0x4c/0xa0 [ 496.095706][T11290] ? clear_bhb_loop+0x30/0x80 [ 496.100441][T11290] ? clear_bhb_loop+0x30/0x80 [ 496.105160][T11290] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 496.111091][T11290] RIP: 0033:0x7efe4818eec9 [ 496.115541][T11290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 496.135353][T11290] RSP: 002b:00007efe48f5c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 496.143808][T11290] RAX: ffffffffffffffda RBX: 00007efe483e5fa0 RCX: 00007efe4818eec9 [ 496.151823][T11290] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 496.159830][T11290] RBP: 00007efe48f5c090 R08: 0000000000000000 R09: 0000000000000000 [ 496.167835][T11290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 496.175843][T11290] R13: 00007efe483e6038 R14: 00007efe483e5fa0 R15: 00007ffdb34ea968 [ 496.183860][T11290] [ 496.262648][T11296] device sit0 left promiscuous mode [ 496.314448][T11303] device sit0 entered promiscuous mode [ 496.801787][T11304] device pim6reg1 entered promiscuous mode [ 497.143933][T11315] device pim6reg1 entered promiscuous mode [ 497.649201][T11333] device wg2 left promiscuous mode [ 497.780726][T11328] device wg2 entered promiscuous mode [ 499.690417][T11392] device syzkaller0 entered promiscuous mode [ 500.830194][T11424] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.837668][T11424] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.966301][T11424] device bridge_slave_1 left promiscuous mode [ 500.974609][T11424] bridge0: port 2(bridge_slave_1) entered disabled state [ 501.002917][T11424] device bridge_slave_0 left promiscuous mode [ 501.009279][T11424] bridge0: port 1(bridge_slave_0) entered disabled state [ 501.164830][T11443] device pim6reg1 entered promiscuous mode [ 501.234778][ T8] GPL: port 1(erspan0) entered disabled state [ 501.262947][ T8] device erspan0 left promiscuous mode [ 501.307076][ T8] GPL: port 1(erspan0) entered disabled state [ 501.412695][T11409] bridge0: port 1(bridge_slave_0) entered blocking state [ 501.421245][T11409] bridge0: port 1(bridge_slave_0) entered disabled state [ 501.429185][T11409] device bridge_slave_0 entered promiscuous mode [ 501.490264][ T8] bridge0: port 3(gretap0) entered disabled state [ 501.504434][ T8] device gretap0 left promiscuous mode [ 501.514929][ T8] bridge0: port 3(gretap0) entered disabled state [ 501.523696][T11409] bridge0: port 2(bridge_slave_1) entered blocking state [ 501.530913][T11409] bridge0: port 2(bridge_slave_1) entered disabled state [ 501.538777][T11409] device bridge_slave_1 entered promiscuous mode [ 502.239044][ T8] device bridge_slave_1 left promiscuous mode [ 502.245586][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 502.254442][ T8] device bridge_slave_0 left promiscuous mode [ 502.260839][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 502.297854][ T8] device veth1_macvtap left promiscuous mode [ 502.567688][T11455] device wg2 left promiscuous mode [ 502.584931][T11456] device wg2 entered promiscuous mode [ 503.399648][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 503.417377][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 503.431544][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 503.441747][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 503.451637][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 503.458783][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 503.535468][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 503.555065][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 503.564152][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 503.584337][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.591469][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 503.600976][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 503.611350][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 503.674229][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 503.723799][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 503.746584][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 503.762246][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 503.775443][T11409] device veth0_vlan entered promiscuous mode [ 503.903998][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 503.937001][T11409] device veth1_macvtap entered promiscuous mode [ 503.969716][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 503.980380][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 504.061044][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 504.102686][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 505.252958][T11501] device wg2 entered promiscuous mode [ 506.184612][T11531] device vlan1 entered promiscuous mode [ 508.696516][T11591] device wg2 left promiscuous mode [ 509.390746][T11602] device wg2 left promiscuous mode [ 509.876806][T11600] device wg2 entered promiscuous mode [ 512.060807][T11629] device wg2 left promiscuous mode [ 512.262003][T11628] device wg2 left promiscuous mode [ 512.289153][T11632] device wg2 entered promiscuous mode [ 512.362326][T11638] device syzkaller0 entered promiscuous mode [ 512.976283][T11659] Ÿë: port 1(ip6gretap0) entered blocking state [ 513.007057][T11659] Ÿë: port 1(ip6gretap0) entered disabled state [ 513.016245][T11659] device ip6gretap0 entered promiscuous mode [ 513.309555][T11660] ÿÿÿÿÿÿ: renamed from vlan1 [ 513.601643][T11668] device pim6reg1 entered promiscuous mode [ 514.786644][T11678] device pim6reg1 entered promiscuous mode [ 515.705775][T11691] ip6_vti0: mtu greater than device maximum [ 516.676933][T11711] device syzkaller0 entered promiscuous mode [ 517.716328][T11717] device syzkaller0 entered promiscuous mode [ 518.974019][T11748] device veth1_macvtap left promiscuous mode [ 519.024815][T11748] device veth1_macvtap entered promiscuous mode [ 519.031562][T11748] device macsec0 entered promiscuous mode [ 519.364744][T11752] device syzkaller0 entered promiscuous mode [ 519.552522][T11754] device syzkaller0 entered promiscuous mode [ 520.993432][T11814] device sit0 left promiscuous mode [ 521.119137][T11814] device sit0 entered promiscuous mode [ 521.470632][T11817] device pim6reg1 entered promiscuous mode [ 522.159806][T11824] device syzkaller0 entered promiscuous mode [ 522.476306][T11835] device wg2 left promiscuous mode [ 522.640931][T11838] device wg2 entered promiscuous mode [ 522.678538][T11835] device wg2 entered promiscuous mode [ 523.708835][T11869] syz.3.3904[11869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 523.708943][T11869] syz.3.3904[11869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.068499][T11883] device wg2 left promiscuous mode [ 524.151177][T11884] device wg2 entered promiscuous mode [ 525.857866][T11913] ÿÿÿÿÿÿþ€: renamed from vlan1 [ 526.325067][T11927] bond_slave_1: mtu less than device minimum [ 526.917410][T11953] device sit0 left promiscuous mode [ 527.000618][T11953] device sit0 entered promiscuous mode [ 527.303241][T11968] bond_slave_1: mtu less than device minimum [ 528.532647][T12001] bond_slave_1: mtu less than device minimum [ 528.803195][T12003] device wg2 left promiscuous mode [ 528.915710][T12002] device wg2 entered promiscuous mode [ 529.123687][T12011] bond_slave_1: mtu less than device minimum [ 529.259315][T12021] device pim6reg1 entered promiscuous mode [ 529.832464][T12043] device syzkaller0 entered promiscuous mode [ 530.532505][T12052] device wg2 left promiscuous mode [ 530.679482][T12048] device wg2 entered promiscuous mode [ 531.159495][T12063] bond_slave_1: mtu less than device minimum [ 531.356949][T12061] device syzkaller0 entered promiscuous mode [ 531.843687][T12078] device sit0 left promiscuous mode [ 532.138873][T12086] device sit0 entered promiscuous mode [ 532.351795][T12092] device wg2 left promiscuous mode [ 532.416337][T12094] device wg2 entered promiscuous mode [ 535.379752][T12176] bond_slave_1: mtu less than device minimum [ 540.600160][T12323] device wg2 left promiscuous mode [ 540.693413][T12327] device wg2 entered promiscuous mode [ 541.310193][T12344] device veth0_vlan left promiscuous mode [ 541.351604][T12344] device veth0_vlan entered promiscuous mode [ 541.465795][T10512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 541.485161][T10512] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 541.523861][T10512] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿþ€: link becomes ready [ 543.859552][ T28] audit: type=1400 audit(1760161398.602:154): avc: denied { create } for pid=12381 comm="syz.2.4079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 545.027848][T12392] device wg2 left promiscuous mode [ 545.052663][T12395] device wg2 entered promiscuous mode [ 545.330377][T12399] device wg2 entered promiscuous mode [ 545.793933][T12405] device wg2 left promiscuous mode [ 545.904665][T12404] device wg2 entered promiscuous mode [ 547.269253][T12428] device wg2 left promiscuous mode [ 547.310885][T12428] device wg2 entered promiscuous mode [ 547.916857][T12457] device sit0 left promiscuous mode [ 547.984128][T12459] device sit0 entered promiscuous mode [ 548.836829][T12473] device wg2 left promiscuous mode [ 548.927281][T12477] device wg2 entered promiscuous mode [ 550.050202][T12514] device sit0 left promiscuous mode [ 550.267799][T12523] device sit0 entered promiscuous mode [ 551.512952][T12558] device wg2 left promiscuous mode [ 551.762555][T12559] device wg2 entered promiscuous mode [ 553.174605][T12587] device wg2 left promiscuous mode [ 553.239806][T12593] device wg2 entered promiscuous mode [ 554.494977][T12631] device wg2 left promiscuous mode [ 554.546667][T12626] device wg2 entered promiscuous mode [ 555.345178][T12674] device sit0 left promiscuous mode [ 555.404572][T12669] device wg2 left promiscuous mode [ 555.478686][T12674] device sit0 entered promiscuous mode [ 555.838801][T12670] device wg2 entered promiscuous mode [ 556.315715][T12700] device sit0 left promiscuous mode [ 556.406680][T12700] device sit0 entered promiscuous mode [ 556.894995][T12710] device wg2 left promiscuous mode [ 556.909806][T12711] device wg2 entered promiscuous mode [ 557.381104][T12730] device veth0_vlan left promiscuous mode [ 557.430567][T12730] device veth0_vlan entered promiscuous mode [ 557.512118][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 557.528468][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 557.537150][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿþ€: link becomes ready [ 557.559782][T12730] syz.0.4207[12730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.559885][T12730] syz.0.4207[12730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 559.881855][T12821] device sit0 left promiscuous mode [ 560.452121][T12838] device veth0_vlan left promiscuous mode [ 560.532734][T12838] device veth0_vlan entered promiscuous mode [ 560.689155][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 560.712654][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 560.741162][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 560.791251][T12844] bond_slave_1: mtu less than device minimum [ 562.050085][T12852] device sit0 entered promiscuous mode [ 565.571631][T12920] device wg2 left promiscuous mode [ 566.309329][T12919] device wg2 entered promiscuous mode [ 566.398233][T12930] device wg2 left promiscuous mode [ 566.679902][T12922] device wg2 entered promiscuous mode [ 567.691064][T12957] device wg2 left promiscuous mode [ 567.861747][T12957] device wg2 entered promiscuous mode [ 568.304232][T12964] device wg2 entered promiscuous mode [ 572.231799][T13058] device wg2 left promiscuous mode [ 572.363614][T13067] device veth0_vlan left promiscuous mode [ 572.409008][T13067] device veth0_vlan entered promiscuous mode [ 572.433839][T13051] device wg2 entered promiscuous mode [ 572.462537][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 572.482890][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 572.577809][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 572.912789][T13085] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.920102][T13085] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.189454][T13117] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 574.216568][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 574.310112][T13115] bond_slave_1: mtu less than device minimum [ 576.753230][T13140] device veth0_vlan left promiscuous mode [ 576.768861][T13140] device veth0_vlan entered promiscuous mode [ 576.782464][ T1328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 576.799132][ T1328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 576.827371][ T1328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 576.880493][T13151] bond_slave_1: mtu less than device minimum [ 577.592489][T13160] device wg2 left promiscuous mode [ 577.712819][T13159] device wg2 left promiscuous mode [ 577.824534][T13155] device wg2 entered promiscuous mode [ 577.833524][T13156] device wg2 entered promiscuous mode [ 577.863252][T13164] device veth0_vlan left promiscuous mode [ 577.872600][T13164] device veth0_vlan entered promiscuous mode [ 578.648912][T13190] bond_slave_1: mtu less than device minimum [ 579.600232][T13208] device wg2 left promiscuous mode [ 579.642090][T13201] device wg2 entered promiscuous mode [ 579.988593][T13221] bond_slave_1: mtu less than device minimum [ 581.114641][T13229] device veth0_vlan left promiscuous mode [ 581.141962][T13229] device veth0_vlan entered promiscuous mode [ 581.182887][ T1328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 581.199391][ T1328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 581.235737][ T1328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 581.458427][T13252] device sit0 left promiscuous mode [ 581.560905][T13250] device sit0 entered promiscuous mode [ 586.877346][T13395] device wg2 left promiscuous mode [ 587.123216][T13398] ±ÿ: renamed from team_slave_1 [ 587.154522][T13387] device wg2 entered promiscuous mode [ 587.946361][T13432] bond_slave_1: mtu less than device minimum [ 589.709977][T13468] bond_slave_1: mtu less than device minimum [ 590.589375][T13500] bond_slave_1: mtu less than device minimum [ 591.651218][T13533] device wg2 left promiscuous mode [ 591.714165][T13528] device wg2 entered promiscuous mode [ 592.112554][ T1328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 592.128390][ T1328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 592.138248][ T1328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 593.208586][T13566] device wg2 left promiscuous mode [ 593.320315][T13564] device wg2 entered promiscuous mode [ 593.776104][T13581] device wg2 left promiscuous mode [ 594.070801][T13578] device wg2 entered promiscuous mode [ 595.119735][T13617] device sit0 left promiscuous mode [ 595.787447][T13628] device sit0 entered promiscuous mode [ 595.894792][T13630] device wg2 left promiscuous mode [ 595.932839][T13640] device wg2 entered promiscuous mode [ 596.015817][T13650] device sit0 left promiscuous mode [ 596.157639][T13650] device sit0 entered promiscuous mode [ 597.838546][T13681] device wg2 left promiscuous mode [ 597.871223][T13677] device wg2 entered promiscuous mode [ 599.467860][T13709] device wg2 left promiscuous mode [ 599.486032][T13709] device wg2 entered promiscuous mode [ 599.502568][T13713] bond_slave_1: mtu less than device minimum [ 599.938898][T13728] device sit0 left promiscuous mode [ 602.266617][T13757] device sit0 left promiscuous mode [ 602.580459][T13765] device wg2 left promiscuous mode [ 602.729666][T13764] device wg2 entered promiscuous mode [ 603.996974][T13789] syz.5.4579 (13789) used greatest stack depth: 21192 bytes left [ 604.898098][T13801] device wg2 left promiscuous mode [ 605.003444][T13801] device wg2 entered promiscuous mode [ 607.862660][T13859] device wg2 left promiscuous mode [ 607.947069][T13862] device sit0 entered promiscuous mode [ 608.054006][T13854] device wg2 entered promiscuous mode [ 610.885670][T13903] device wg2 left promiscuous mode [ 611.075589][T13902] device wg2 entered promiscuous mode [ 611.104094][T13905] device sit0 left promiscuous mode [ 611.169762][T13908] device sit0 entered promiscuous mode [ 611.659272][T13933] device sit0 entered promiscuous mode [ 613.765626][T14007] device wg2 left promiscuous mode [ 613.837955][T14012] device wg2 entered promiscuous mode [ 613.885416][T14016] device sit0 entered promiscuous mode [ 614.884225][T14035] device veth1_macvtap left promiscuous mode [ 615.746225][T14057] device wg2 left promiscuous mode [ 616.156325][T14051] device wg2 entered promiscuous mode [ 616.405274][T14078] device wg2 left promiscuous mode [ 616.460094][T14078] device wg2 entered promiscuous mode [ 617.220825][T14103] device sit0 left promiscuous mode [ 617.356621][T14107] device sit0 entered promiscuous mode [ 624.873379][T14296] device wg2 left promiscuous mode [ 625.089967][T14305] syz.3.4760[14305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.090075][T14305] syz.3.4760[14305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.103339][T14298] device sit0 entered promiscuous mode [ 625.345289][T14297] device wg2 entered promiscuous mode [ 629.114308][T14363] device sit0 left promiscuous mode [ 629.316104][T14366] device sit0 entered promiscuous mode [ 630.118308][T14379] device wg2 left promiscuous mode [ 630.159215][T14379] device wg2 entered promiscuous mode [ 630.608304][T14391] device wg2 left promiscuous mode [ 630.785860][T14391] device wg2 entered promiscuous mode [ 636.068860][T14520] device wg2 left promiscuous mode [ 636.173239][T14520] device wg2 entered promiscuous mode [ 636.839774][T14534] device wg2 left promiscuous mode [ 636.887087][T14532] device wg2 entered promiscuous mode [ 636.900989][T14537] device wg2 left promiscuous mode [ 636.928425][T14536] device wg2 entered promiscuous mode [ 638.536184][T14569] device wg2 left promiscuous mode [ 638.705248][T14567] device wg2 entered promiscuous mode [ 639.004285][T14578] device sit0 left promiscuous mode [ 639.087698][T14578] device sit0 entered promiscuous mode [ 640.575063][T14610] device sit0 left promiscuous mode [ 640.606295][T14612] device sit0 entered promiscuous mode [ 641.897340][T14656] bond_slave_1: mtu less than device minimum [ 642.110445][T14665] device sit0 left promiscuous mode [ 642.336877][T14665] device sit0 entered promiscuous mode [ 642.864699][T14687] bond_slave_1: mtu less than device minimum [ 643.773122][T14716] bond_slave_1: mtu less than device minimum [ 643.949706][T14728] device sit0 left promiscuous mode [ 643.990642][T14728] device sit0 entered promiscuous mode [ 645.496926][T14763] bond_slave_1: mtu less than device minimum [ 647.986892][T14793] device sit0 left promiscuous mode [ 648.028155][T14795] bond_slave_1: mtu less than device minimum [ 648.090130][T14793] device sit0 entered promiscuous mode [ 649.545916][T14837] bond_slave_1: mtu less than device minimum [ 650.472900][T14860] device wg2 left promiscuous mode [ 650.782664][T14874] bond_slave_1: mtu less than device minimum [ 652.144470][T14913] bond_slave_1: mtu less than device minimum [ 654.237774][T14956] device wg2 left promiscuous mode [ 654.847722][T14977] device sit0 left promiscuous mode [ 654.906752][T14983] device sit0 entered promiscuous mode [ 655.751154][T14996] device wg2 left promiscuous mode [ 656.333772][T15032] device wg2 left promiscuous mode [ 668.953586][T15278] device wg2 entered promiscuous mode [ 669.809314][T15303] device sit0 left promiscuous mode [ 669.984435][T15304] device sit0 entered promiscuous mode [ 672.336891][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 672.376423][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 676.040921][T15438] device sit0 left promiscuous mode [ 676.117534][T15441] device sit0 entered promiscuous mode [ 678.443107][T15493] device wg2 entered promiscuous mode [ 680.518857][T15527] device wg2 entered promiscuous mode [ 681.800050][T15553] device veth0_vlan left promiscuous mode [ 681.806854][T15553] device veth0_vlan entered promiscuous mode [ 682.498887][T15601] bond_slave_1: mtu less than device minimum [ 682.857752][T15605] device wg2 left promiscuous mode [ 682.878695][T15613] device wg2 entered promiscuous mode [ 683.079335][T15639] bond_slave_1: mtu less than device minimum [ 684.150627][T15676] bond_slave_1: mtu less than device minimum [ 685.975070][T15722] bond_slave_1: mtu less than device minimum [ 688.273482][T15759] bond_slave_1: mtu less than device minimum [ 688.485763][T15765] FAULT_INJECTION: forcing a failure. [ 688.485763][T15765] name failslab, interval 1, probability 0, space 0, times 0 [ 688.576882][T15765] CPU: 0 PID: 15765 Comm: syz.4.5271 Not tainted syzkaller #0 [ 688.584406][T15765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 688.594502][T15765] Call Trace: [ 688.597867][T15765] [ 688.600828][T15765] __dump_stack+0x21/0x24 [ 688.605252][T15765] dump_stack_lvl+0xee/0x150 [ 688.610064][T15765] ? __cfi_dump_stack_lvl+0x8/0x8 [ 688.615299][T15765] dump_stack+0x15/0x24 [ 688.619507][T15765] should_fail_ex+0x3d4/0x520 [ 688.624331][T15765] __should_failslab+0xac/0xf0 [ 688.629134][T15765] ? __request_module+0x28f/0x890 [ 688.634232][T15765] should_failslab+0x9/0x20 [ 688.638768][T15765] __kmem_cache_alloc_node+0x3d/0x2c0 [ 688.644193][T15765] ? __request_module+0x28f/0x890 [ 688.649347][T15765] __kmalloc_node_track_caller+0xa0/0x1e0 [ 688.655296][T15765] ? __kasan_kmalloc+0x95/0xb0 [ 688.660103][T15765] kstrdup+0x3b/0x80 [ 688.664046][T15765] __request_module+0x28f/0x890 [ 688.668924][T15765] ? __cfi___request_module+0x10/0x10 [ 688.674353][T15765] ? cap_capable+0x1aa/0x230 [ 688.679076][T15765] ? security_capable+0x99/0xc0 [ 688.684152][T15765] dev_load+0x5b/0xb0 [ 688.688202][T15765] dev_ioctl+0x2f9/0xd10 [ 688.692480][T15765] sock_do_ioctl+0x23f/0x310 [ 688.697171][T15765] ? sock_show_fdinfo+0xb0/0xb0 [ 688.702082][T15765] ? selinux_file_ioctl+0x377/0x480 [ 688.707366][T15765] sock_ioctl+0x4d8/0x6e0 [ 688.711852][T15765] ? __cfi_sock_ioctl+0x10/0x10 [ 688.716784][T15765] ? __fget_files+0x2d5/0x330 [ 688.721497][T15765] ? security_file_ioctl+0x95/0xc0 [ 688.726653][T15765] ? __cfi_sock_ioctl+0x10/0x10 [ 688.731588][T15765] __se_sys_ioctl+0x12f/0x1b0 [ 688.736299][T15765] __x64_sys_ioctl+0x7b/0x90 [ 688.740925][T15765] x64_sys_call+0x58b/0x9a0 [ 688.745471][T15765] do_syscall_64+0x4c/0xa0 [ 688.749929][T15765] ? clear_bhb_loop+0x30/0x80 [ 688.754651][T15765] ? clear_bhb_loop+0x30/0x80 [ 688.759418][T15765] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 688.765610][T15765] RIP: 0033:0x7f083838eec9 [ 688.770133][T15765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 688.790389][T15765] RSP: 002b:00007f08391e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 688.799371][T15765] RAX: ffffffffffffffda RBX: 00007f08385e5fa0 RCX: 00007f083838eec9 [ 688.807754][T15765] RDX: 0000200000000000 RSI: 0000000000008923 RDI: 0000000000000005 [ 688.816218][T15765] RBP: 00007f08391e1090 R08: 0000000000000000 R09: 0000000000000000 [ 688.824836][T15765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 688.833208][T15765] R13: 00007f08385e6038 R14: 00007f08385e5fa0 R15: 00007ffef5b66e08 [ 688.841249][T15765] [ 689.618928][T15785] bond_slave_1: mtu less than device minimum [ 690.002984][T15790] device wg2 left promiscuous mode [ 690.337328][T15803] GPL: port 1(erspan0) entered blocking state [ 690.352550][T15803] GPL: port 1(erspan0) entered disabled state [ 690.385891][T15803] device erspan0 entered promiscuous mode [ 690.426048][T15804] GPL: port 1(erspan0) entered blocking state [ 690.432239][T15804] GPL: port 1(erspan0) entered forwarding state [ 690.501609][T15795] device veth1_macvtap left promiscuous mode [ 691.655214][T15825] bond_slave_1: mtu less than device minimum [ 694.617010][T15864] bond_slave_1: mtu less than device minimum [ 694.913322][T15880] device sit0 left promiscuous mode [ 694.980447][T15880] device gre0 entered promiscuous mode [ 695.641740][T15905] bond_slave_1: mtu less than device minimum [ 698.282360][T16009] device sit0 entered promiscuous mode [ 698.732698][T16014] device sit0 left promiscuous mode [ 698.747521][T16018] device sit0 entered promiscuous mode [ 701.107013][T16076] device sit0 left promiscuous mode [ 701.216316][T16076] device sit0 entered promiscuous mode [ 701.340520][T15726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 701.349052][T15726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 701.395935][T15726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 704.361091][T16196] device sit0 left promiscuous mode [ 704.450953][T16198] device sit0 entered promiscuous mode [ 704.843021][T16215] FAULT_INJECTION: forcing a failure. [ 704.843021][T16215] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 704.977771][T16215] CPU: 0 PID: 16215 Comm: syz.5.5431 Not tainted syzkaller #0 [ 704.985388][T16215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 704.995472][T16215] Call Trace: [ 704.998772][T16215] [ 705.001716][T16215] __dump_stack+0x21/0x24 [ 705.006068][T16215] dump_stack_lvl+0xee/0x150 [ 705.010674][T16215] ? __cfi_dump_stack_lvl+0x8/0x8 [ 705.015720][T16215] ? dump_stack+0x9/0x24 [ 705.019999][T16215] ? dump_stack_lvl+0x1/0x150 [ 705.024715][T16215] dump_stack+0x15/0x24 [ 705.028901][T16215] should_fail_ex+0x3d4/0x520 [ 705.033621][T16215] should_fail+0xb/0x10 [ 705.037823][T16215] should_fail_usercopy+0x1a/0x20 [ 705.042886][T16215] _copy_from_iter+0x190/0xfd0 [ 705.047778][T16215] ? __cfi__copy_from_iter+0x10/0x10 [ 705.053087][T16215] ? check_stack_object+0x81/0x140 [ 705.058287][T16215] ? __check_object_size+0x45a/0x600 [ 705.063614][T16215] kernfs_fop_write_iter+0x1a1/0x410 [ 705.068929][T16215] vfs_write+0x5db/0xca0 [ 705.073210][T16215] ? __cfi_vfs_write+0x10/0x10 [ 705.078000][T16215] ? __cfi_mutex_lock+0x10/0x10 [ 705.082882][T16215] ? __fdget_pos+0x2cd/0x380 [ 705.087512][T16215] ? ksys_write+0x71/0x240 [ 705.091962][T16215] ksys_write+0x140/0x240 [ 705.096312][T16215] ? __cfi_ksys_write+0x10/0x10 [ 705.101258][T16215] ? debug_smp_processor_id+0x17/0x20 [ 705.106678][T16215] __x64_sys_write+0x7b/0x90 [ 705.111298][T16215] x64_sys_call+0x27b/0x9a0 [ 705.115833][T16215] do_syscall_64+0x4c/0xa0 [ 705.120282][T16215] ? clear_bhb_loop+0x30/0x80 [ 705.124987][T16215] ? clear_bhb_loop+0x30/0x80 [ 705.129695][T16215] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 705.135623][T16215] RIP: 0033:0x7f6ca538eec9 [ 705.140055][T16215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 705.159686][T16215] RSP: 002b:00007f6ca6314038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 705.168131][T16215] RAX: ffffffffffffffda RBX: 00007f6ca55e5fa0 RCX: 00007f6ca538eec9 [ 705.176116][T16215] RDX: 0000000000000031 RSI: 0000200000000240 RDI: 000000000000000a [ 705.184244][T16215] RBP: 00007f6ca6314090 R08: 0000000000000000 R09: 0000000000000000 [ 705.192250][T16215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 705.200257][T16215] R13: 00007f6ca55e6038 R14: 00007f6ca55e5fa0 R15: 00007ffc7bef2bd8 [ 705.208266][T16215] [ 707.696249][T16311] device sit0 left promiscuous mode [ 707.721690][T16311] device sit0 entered promiscuous mode [ 708.278198][T16324] device wg2 left promiscuous mode [ 708.539146][T16339] Ÿë: port 2(erspan0) entered blocking state [ 708.558753][T16339] Ÿë: port 2(erspan0) entered disabled state [ 708.645766][T16339] device erspan0 entered promiscuous mode [ 708.727272][T16340] Ÿë: port 2(erspan0) entered blocking state [ 708.733650][T16340] Ÿë: port 2(erspan0) entered forwarding state [ 708.740353][T16340] Ÿë: port 1(ip6gretap0) entered blocking state [ 708.746934][T16340] Ÿë: port 1(ip6gretap0) entered forwarding state [ 708.877079][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): Ÿë: link becomes ready [ 708.887441][T16345] device wg2 entered promiscuous mode [ 709.031423][T16356] device sit0 left promiscuous mode [ 709.120234][T16356] device sit0 entered promiscuous mode [ 710.477465][T16402] device veth0_vlan left promiscuous mode [ 710.543522][T16402] device veth0_vlan entered promiscuous mode [ 710.645951][T15726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 710.677541][T15726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 710.730477][T15726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 712.242993][T16444] device sit0 left promiscuous mode [ 712.359091][T16447] device sit0 entered promiscuous mode [ 713.434303][T16486] bond_slave_1: mtu less than device minimum [ 714.447917][T16522] bond_slave_1: mtu less than device minimum [ 716.945101][T16628] device sit0 left promiscuous mode [ 717.029516][T16630] device sit0 entered promiscuous mode [ 717.370095][T16636] bond_slave_1: mtu less than device minimum [ 717.523176][T16642] device sit0 left promiscuous mode [ 717.696623][T16643] device sit0 entered promiscuous mode [ 718.462875][T16664] device veth1_macvtap entered promiscuous mode [ 718.470133][T16664] device macsec0 entered promiscuous mode [ 718.490611][T10512] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 718.612353][T16674] bond_slave_1: mtu less than device minimum [ 718.832805][T16679] cgroup: fork rejected by pids controller in /syz3 [ 719.048348][T16682] device sit0 left promiscuous mode [ 720.008272][T15727] GPL: port 1(erspan0) entered disabled state [ 720.047647][T15727] device erspan0 left promiscuous mode [ 720.087009][T15727] GPL: port 1(erspan0) entered disabled state [ 720.368395][T15727] device veth1_macvtap left promiscuous mode [ 720.374470][T15727] device veth0_vlan left promiscuous mode [ 722.099490][T16768] device wg2 left promiscuous mode [ 722.434721][T16773] device sit0 left promiscuous mode [ 722.648150][T16775] device sit0 entered promiscuous mode [ 725.849989][T16814] device sit0 left promiscuous mode [ 725.979280][T16814] device sit0 entered promiscuous mode [ 731.366247][T16916] device sit0 entered promiscuous mode [ 733.073660][T16941] device veth0_vlan left promiscuous mode [ 733.112063][T16941] device veth0_vlan entered promiscuous mode [ 733.165827][T15727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 733.178730][T15727] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 733.198185][T15727] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 741.191305][T17032] device sit0 left promiscuous mode [ 741.259455][T17038] device sit0 entered promiscuous mode [ 741.688924][T17030] bond_slave_1: mtu less than device minimum [ 746.016234][T17094] bond_slave_1: mtu less than device minimum [ 746.232122][T17102] device wg2 left promiscuous mode [ 746.272562][T17102] device wg2 entered promiscuous mode [ 755.455858][T17203] device sit0 left promiscuous mode [ 755.637138][T17205] device sit0 entered promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=3 req=5595 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 756.153668][ T28] audit: type=1400 audit(1760161610.982:155): avc: denied { write } for pid=274 comm="syz-executor" path="pipe:[14875]" dev="pipefs" ino=14875 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 757.389013][ T1328] Ÿë: port 1(ip6gretap0) entered disabled state [ 757.416117][ T1328] device ip6gretap0 left promiscuous mode [ 757.421987][ T1328] Ÿë: port 1(ip6gretap0) entered disabled state [ 757.758774][ T1328] Ÿë: port 2(erspan0) entered disabled state [ 757.765975][ T1328] device erspan0 left promiscuous mode [ 757.771539][ T1328] Ÿë: port 2(erspan0) entered disabled state [ 757.948109][ T1328] device bridge_slave_1 left promiscuous mode [ 757.954369][ T1328] bridge0: port 2(bridge_slave_1) entered disabled state [ 757.962588][ T1328] device bridge_slave_0 left promiscuous mode [ 757.969612][ T1328] bridge0: port 1(bridge_slave_0) entered disabled state [ 757.980218][ T1328] device veth1_macvtap left promiscuous mode [ 758.948900][ T1328] device bridge_slave_1 left promiscuous mode [ 758.955079][ T1328] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.963350][ T1328] device bridge_slave_0 left promiscuous mode [ 758.969760][ T1328] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.978067][ T1328] device bridge_slave_1 left promiscuous mode [ 758.984300][ T1328] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.992192][ T1328] device bridge_slave_0 left promiscuous mode [ 758.998429][ T1328] bridge0: port 1(bridge_slave_0) entered disabled state [ 759.007478][ T1328] device veth0_vlan left promiscuous mode [ 759.013520][ T1328] device veth0_vlan left promiscuous mode