last executing test programs: 2m39.694677534s ago: executing program 3 (id=1934): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='percpu_create_chunk\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 2m39.515329908s ago: executing program 3 (id=1938): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000080000000050000000010"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='percpu_create_chunk\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 2m39.326488804s ago: executing program 3 (id=1939): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x81}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r1, 0x27, 0x14, 0x0, &(0x7f0000000000)="f8ad1dcc02cb29dcc80032008100", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000080", @ANYRESDEC=r0], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x2000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r3], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x2480}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2m38.466905673s ago: executing program 3 (id=1946): bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0700000004000000080200000500000000000000", @ANYRES32, @ANYBLOB="001c00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000b3246daed55c332a85ef18eb72d7101c99a592f283532d03f559e0b481563bf69559274a438f00c29a699c0b8e9dbefa3134c5972301d1a566dc24f1935845060aa970d2b2567f6a13d8c4ed03946ae0ae67aa2bdef5e8f46d72705e274b4b854a26c30a740ecf437f9fa75902cbf619669d4c81fccba86cd2e299a4"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1b, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0xe62}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x69}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xff, 0x3, 0x0, 0x0, 0x0, 0xae, 0x8264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_bp={0x0, 0x1f}, 0x2010, 0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x7, 0x0, 0x807}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xa2265000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000005000000020000000700000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000d390b10b0100000014080000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000880)=ANY=[@ANYBLOB="1800002d2e04ffffffff00000000000000000000233ce6cdb49243f00ffd570a92054d2f11f841a06a5883448d7cd55935c735bb2c2b305f1d1b571b932b", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r10}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x50) socketpair$unix(0x1, 0x5, 0x0, 0x0) 2m37.839421334s ago: executing program 3 (id=1955): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000040), 0x4) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) sendmsg$tipc(r5, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) recvmsg(r4, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x1, &(0x7f0000000700)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f447333de39c7095758218a68bc5142f0cb2229fa6c8b0d7c8126aee6d3def94cd964218564fb1d255bce6cef9bea8322326039744a98eead8c59bc75bb5b42123eef53ae4bc331b0ad09a8efc4175c484ad74df9158ff1882cdd83c97c03a35e91c30a0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1900000004000000040000000900000008000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000100"/28], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r10, 0x18000000000002a0, 0x0, 0x11, 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000400)={r11}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r8}, 0x10) 2m35.553574888s ago: executing program 3 (id=1961): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff4a, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r0}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r2, 0x8b0d, &(0x7f0000000000)={'veth1_virt_wifi\x00', @link_local}) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0xc, &(0x7f0000000000)=ANY=[@ANYRES16=0x0, @ANYRES8=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000990500000100200000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/24], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r6, 0x0, 0x1ba8847c99}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x50) close(r7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000008018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000faffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r3, &(0x7f0000000780)}, 0x20) 2m20.445735599s ago: executing program 32 (id=1961): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff4a, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r0}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r2, 0x8b0d, &(0x7f0000000000)={'veth1_virt_wifi\x00', @link_local}) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0xc, &(0x7f0000000000)=ANY=[@ANYRES16=0x0, @ANYRES8=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000990500000100200000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/24], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r6, 0x0, 0x1ba8847c99}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x50) close(r7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000008018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000faffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r3, &(0x7f0000000780)}, 0x20) 3.285900853s ago: executing program 1 (id=3498): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffff"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x10000, 0xfffffcf1, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000000}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000002, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="01000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x50) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) r6 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) close(r6) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='tlb_flush\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdb9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r8}, 0x10) 2.950394691s ago: executing program 1 (id=3503): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r0, 0x18000000000002a0, 0xe, 0x26f9, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd", 0x0, 0x14000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="06000000040004000800"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@generic={&(0x7f00000003c0)='.\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f00000001c0), 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000bc0)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x9) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x10) close(r3) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r5, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00\x00!\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES16=r2, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="641c89b2b3de6047bc6e68fabe2078e36a583848001790112bca3e9ae90828aa7166f6a4a9d5756d64ebff839508b4c6df8c7dd681b828152744f2128ba99f7cdd219c71aa66b299042026707b49edd232024fddaca629a82457216d50ae6b2317dab097601d12042086aef8d7e794b531e74684168c4a5e78242fdfed7ae330e31a8f84f5e6c9077cd53bb7949b06ea8ccdaaff7d82679030b92faca9908624adaa89aacf147a1e8afa0e020c7608c99c3785a4c90fa70899f833091d5f1e8063afd166192f05ee01c75c3811f1d39e7f1fe2078d22381b6ce1c9b0348787013b0eedd955ee121bc69a8d6ca44eba41d93b8f13d43c9cb5"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) 2.663430154s ago: executing program 1 (id=3505): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x10, 0x4, 0x0, 0x0, 0x3, 0x174c54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xc}, 0x4001, 0xc8, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000ea00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000010240), 0x5a) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x4, 0x15, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@map_fd={0x18, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000940)='syzkaller\x00', 0xc5e, 0x0, &(0x7f0000000980), 0x41100, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0xc, 0x3, 0x8}, 0x10, 0x0, r7, 0x4, &(0x7f0000000a80)=[r6, r6, r1, r6, r6], &(0x7f0000000ac0)=[{0x5, 0x4, 0xb, 0x9}, {0x3, 0x4, 0xf, 0xa}, {0x2, 0x5, 0x10, 0x7}, {0x5, 0x2, 0x3, 0xa}], 0x10, 0x5}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x1d, 0xa, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x9c5}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000340)='syzkaller\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000840)={0x4, 0x5, 0x911, 0xd884}, 0x10, 0x0, r8, 0x7, &(0x7f0000000bc0)=[r6], &(0x7f0000000c00)=[{0x0, 0x4, 0xa, 0x5}, {0x0, 0x2}, {0x1, 0x3, 0xb, 0xa}, {0x2, 0x1, 0xd, 0x5}, {0x2, 0x5, 0xd, 0xb}, {0x3, 0x5, 0xd, 0x7}, {0x2, 0x1, 0x3}], 0x10, 0x200}, 0x94) close(r5) recvmsg$unix(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r3, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', r10, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xc, 0x0, 0xccd}, 0x10}, 0x94) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="02004b0004704457449a98483a00000000000000391a803b87300b5197e1be2b765b011e843b81d6805122d14ecb30ab7d594a7957fbdb834de864770e489949fbda288509613e1cb46791c4509124a9", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r12, @ANYRES32=r11, @ANYBLOB="26000000000007fffff40000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r12}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 2.002255247s ago: executing program 5 (id=3517): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 1.905276775s ago: executing program 5 (id=3519): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001780)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000100)='e', 0x0, 0x0, 0x3}, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r2}, 0x18) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001280)=ANY=[@ANYBLOB="b702000001040000bfa30000000000000703000000feffff7a0af0fff8bffffd79a4f0ff00000000b7060000ffffffff2d640500000000006502040001001f000404000001007d60b7030000000000006a0a00fefdff00008500000026000000b7000000000000009500000000000000c743a0c8e3ebbadc20e5a7efcc9ac1467fb2ea80dbcf8df265e1b40e4c8afd5c0c000000008da68076774bbcdb2c769937000090af27db5b56024db96bcbbbd2cb2000ce03000000000000007e357754508535766c80114604a86fe569b05614eab9297eb290a248a120c9c6e39f403ff065fd3052aae80675eeba68562eaeaea5fecf298ca20f274233106eab63ecf772de7b265040b6c50b7420b48a93fe94c756108afcd0b2eb78040000005f02a5a6474ae549070004000000001294fba0ed5020e6474ac921fee1f6d8ad6a80d0947cd6d4a561ced21a0b4a902be6af7ec2d1ba002e57f301000000000000000000000000100000aaf25343063e6581f9e6de14ad72e5ad84309f47f96a576cd20cef7ed951a73ea73d7c7f14e306f1f1d1377e57bbb19700f0077e9d0000b93eb0f2c6f8141e350dc68147e5958128d22d58625cf9dba211bfff9c3709c9b134625d3d2369f516a49eeeb1a662c8dfb875bdf5c6ba73cccdfacb202994c40d322717faff03323dce8a34ee0ca2cf61efb4b30000642735d6d482ba98d252f36c54333a8b1aa736369392b9067665339820f5f1557b0bf7cc06a5a13c714e0b1a1f000000ff3283076cda3d0b1a2905cfc3d04f1db264b530abcbe44bc405f600807970727fb819afa1907228fa9e83433eedb4ac88d0285594ffb0d14c09d5c77f33702822b02488ea570204c8441ced81cacf945dcb2486d65ceec8bcaffbe800a041a378b40dc9e3600e916ae6307bd8325a442095bc9a8b0c95905979f34adddbb26f0d24425c8ab9d937d84b521914f92eed3d3e9de82942a952e86b567aff5bc2e3c1fcc00f618363df5d0d181ee8f4b8fd356c9eb365adc037e443820c05c5db16ff07a9cf471e2ebf91ab00a05f88c1cd55f8c81f5eb1f8d615ca27efb2193bb61665a1ce37f30c2efc9c3b5a4a5d95479fac471ba60fbd0e50225563cd37343d09da72472efc2b2877fbab12a891513e5f0763ae06c0610a2869747c143d7500760600f3ffb2310e19ac58bf29d7f178d09a9f634a3ae492f54649589e3692768a0f3a08ff275df45508ad85950d8e08465fa1067ea8f383b3e7a7ddf5977d46f4bc38f914b4a496426d8468f9ba618b6b2218b50c8fc9efbce3ba799cf70de7e13be871aa7eb402e2b11f440361e18d4e334bfc6ae54e62e67a03b4c756c544189e4519a029674e2a2bbbc7f6600000000000800000e5e30b70b1eb176d3a62660600000030a0af132e680510811d3ab71af5d98e2d3d928a749e8b9402d14655612bd58fb40b4625cb69bf6cea97b447f2d970d99100000000086000001b881afb2cc500003a73562af4878f75b4c98274eeb666aa1f5fcf91990cf0dcfef9540057b8a3fff2bc02c5941626d2015f414546e87835ba18e9101734a9e9c6955fc6b9a25fe2a3dd8bab7f21beccba5493a164c663eceed401737c12c65804712236a9a29a43b1e27e9b6816f2328ea8423121f12b7b35aa721fef26934ccafde573bee5c33ef15309f43cbd5d61aa679a9c402d337ebf57a5eacb569401c1df7b9c45b09743c61d1db37f0000000000020000000061d7d6818db785d8ba13dc577fe61a68eb365de5661f43d4c789bb117a3d208ae44a381b718b3157e218959156ff8e92b7e92bc275d2c9114547351a0d0f2a70d13be0194b6cb68b03000000000000004f153bbc7f52861e4e5df0d19e4e40ac44cfda6f87807e5b5ed7072c04da88afd3d4b79f060e004a0e2f00b9e726ac75d2ac0691314c627e9a8a07bdd607919fd48f01ad6d2f7621d9a75b134f1bc25ed7c33d411a5baa4daa3add16afc502b2b7629541d722e91d631e5ffb9d4beb5aa5a2c4e490a5bd5cf4538ba310b8cbc221af38ea842d4cb908bcd574f794459fd54b58c6a791e6df620047bade4ba41ee0141843958479544619f749ff70088b0fd115077f7eff7c5a3315ca604d110df1c54407f191a78d8362e4dc6e1138391c2af2b96779bb76c9f1daea4f085f38810edef6dd047937c231cba791a4e7713c5b3b0a0b6ba37db5016e02d114d714459d065a79609fea4efebad04edac11aac0e53dd094827453144fa419ee81823d00a90a9058ba740d2f41253a8d01a8c1a7265a084e30ad10d412aee8170a7111d62473e7bd8f3d64fb7ebdd32aada331900000000000000000000000084ef49dd02000000bf48ea48e0e1f463d9dcb285038ec38d5f4969ed0e98a71ac7bf8159a234833a5241722b2d24aa2fa4965d4eb7966fb27d118b6ef3308627e67d42f1041d5e92da28e0a7724ce715854775cbe06c5166f1dac0745f1373156a536cb6394c2c4473e2050cacf693fdf8e305080000001a901ecd90a5f53b8327a485557bc2a147b036477915e600000000034258ebbb6099b597d17ee2fc97ca850b8580b1337016a40566814594c13052b9d2b0741326825f19a24460e545c71e1940c998f39ac04a0c29691a7c8f7a78c1a7590a293c561f304533c638ae635f5ce026f7fa034d8cfe0e11831d4829692beab26891ef583cfcb713a4d3a2d8b958c0875d7e4bdcf98802db086ebcbb9d82fa569a18f06facc2ffe1ea9ae4231e1e503faa2de7f898c97788c4b9c61c70ff92abdf7476cc351156d11c0ada7614f315f4c6cca119d16827d4e864f5a7a9b690272a510c451dc07f391309d02e31e53b2bf0b5f86e776b1bcfe6c85ccd7ddf8a9559d596b5603895f265685fdd11263c946f8ef3ccec1b0d45a47a89b8237cbbdab14e4ca6dc76b2c41e071b93a065c0f5aa718e1cfab29beea78a6bd9a3114f0fb92be9a5862627b4bd99db2c08e4636e43f05f33535d5d1f9bb40e1fd8e5125a3d29b31dd94a6744bbc21722222b976089f073a4d3fcafc6d06518cf0c4fc6c3e3da0000000000000000000000007d3b60775243f2143d9f54804b11102cf0e4c641db1ba8bf75e46ab3a8fdece6562e7ebb3e407f3c7504dfa3da3aecbd49af3d1edeea11cc970416fadeedc8423bfdc85041ac4d8243a1130e6f4cb5bbfed9d095e18c98c7d690e4c491a7ddcd5635bc61dbed719ca28e8ca3f1fbbe588913ed057f1d6e34a79f4dc10df54d1993a5bc5f9ef6dbd339ee4b0b5764169f305e284ef82cc23e9366d4bc7eb45c7230b13433e5240657cb8eba33260147be8620b6d98cc48b000000000000000000000000c1ce872b18984f080100000000000000bd3fded92547d41809b398f36749083a147eb09ff1ed601bd36b873d3947fb223da647052528e0466cb917db7800f7c7000b593fca1903991cca1343882e3a1f60044f11c081dae4fc5bcf20efacdd2c577f4bcda2eea6f75a31dc90eebb6135b6fb824052181b0ad8a49ebf03ccf61d7e39bf6b0762d24d19796016301d1415b5110ba9df7f204aedb2a2e4e621c0553d312b309db67192f98ef7800000d629c04e216afc8fc66616bbf304e452373aa927c2ad6f5417f1b9bc322b802c1a1c42112a92a331cdc113b9ace3ff52ede7a853f9a89002ba070bac2f635a03db3375e5564f1a798bf9c0f8c72725d2eca9b0ec7e453d78ea20eca61530fe574299b393ca144adcb06108dfbb934065a87972739150a8752ac111c4d9062ccb95c54034fbdee131d94dfbaab1854d55665746fb7b47d25e54070b0d14c0a29c57bc4930075e1761913b036d43852c6df9f10e15105b2a1866b598a3577943514db0dce953dcec62139ff3f16066efec5d8cbc0600000000007289be5883aab951ea67cf2ff691d05c1ea91dd569ed9897fe8d88a0a6977dc8955be17e8026aff11c61fa5cc76196c1423cd597345253ba5d5ab46938e8fb23fa7047bc59c4345e912585a8adb5fe2ff51b64a326321b594e3f2d339f4090bdae6b30b62064bacbc155d3c930576f506b093ca7c60957bdfdd6536baaa871cf6a603c736b78761e6463b8ac503e219cc3d98f649602ad24d5667368290ee926fba76ee482a201a03efece3b236f4ee2ffcd5d90d92a2f0c5cea48c87f27c2f1e92988a6508c12f6b7755cc48eb10edafca92cb0260c72295a27a24846d3a2334bd60e94c0fd07e5db0a4964a7fc4e89e11a300510776934e87bb3c21394f46954a012b2a3b0760f5bad1dbd6b466ed7153bd18ee2c0b2353c38df9e0782eb000000000000000000000000001b58cadcc5aaf65e05663985a177aa1d1ea2ad1b8151c7d58f5b92827f550269b3585d98e1394e816a477e52ce2f6de2bd7192f46cf965e774968d151d2bda084b10ec4c8d2c6ab582b1e5e3ed874235ff128c661298ed75879d8a4025ad1c3d9ef6355dc7284c6e648a61da026a777fcc7ae2c60ce64a2f2b0000000000000000000000000000003022110d1230e998429a6fd8f35939a8ae5acc89125539d84b98df6f8ee2ad0b238759bf400ac14c591aefe9660076a494f73b0ea8f3cb4a9c2e4f745a2afb593fabb9481600b2f44e6415153c1f8cf974a226d2700608bb2838ef07d75aed8b082716be3c37f60f48b9995f6325fdaa1c164b1e2bcbde000000000000000000d4fd710a526223440f9df8d22bf9224e4b71b0757dbc8311a2ffbf680a2c09a893ffd79f0a645df3e2dce61e24c28750f50ccb9244fdb344773f79483ec0b6936fd853fda9ee154914a00831cf4bf6f9e6fe6cdfab5ab31de15450e6e703316d9597100d83d0444d511ec95edfc460461eef194209655b2a966078be83da84fe699fa66295c9995c869c18501c3d3bf6b17e5b2211c4903580dcdc7ea2bf9e3b202d7b01ea0b800868eb22cbb86e927b364c9c5642ea6188f53c36dffecbdeda61ceb3b1c1f4a7bc77e39a9ff7e547cef240c3cf78f61d3e000000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfe37}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r5, 0x18000000000002a0, 0xe, 0xa002a0, &(0x7f0000000040)="b907ef19edfff007049e0ff0888e", 0x0, 0x4000, 0x18000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000090000000000000000007301070000000000950000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x24}, 0x8}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000b000000010001000900400001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r8, &(0x7f00000003c0), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000380), 0x12) 1.710221171s ago: executing program 1 (id=3520): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r1], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@ptr={0x1, 0x0, 0x0, 0x2, 0x1}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x4, [{0x9, 0x5, 0x8}]}, @decl_tag={0x6, 0x0, 0x0, 0x11, 0x5, 0xffffffffffffffff}]}, {0x0, [0x0, 0x30, 0x30]}}, &(0x7f00000004c0)=""/101, 0x51, 0x65, 0x0, 0x2}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x1c, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}, @jmp={0x5, 0x0, 0x3, 0x1, 0x7, 0xfffffffffffffffe, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @call={0x85, 0x0, 0x0, 0x1e}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x7, 0xee, &(0x7f00000006c0)=""/238, 0x41100, 0x24, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000540)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0x6, 0x5, 0x3}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000800)=[r1], &(0x7f0000000840)=[{0x5, 0x1, 0x5, 0x1}, {0x5, 0x8001, 0xf}, {0x0, 0x2, 0x6, 0x9}, {0x5, 0x4, 0x5, 0x8}, {0x4, 0x1, 0xc, 0xc}], 0x10, 0x7}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="34cbf9c55466da0eadc249236ab3cbf316717306be4c08c8c7da1f1ee04ab4b4eac14995ebdf620ff778a4e3452587e42a3c6aa1bd35dfd99f23b525893bc3b5f9f3bed1986bf8d0dddd7c5cdada611f9bf641e421ed71a842d84fa289a542f941d6e06b2b14e2a706ce30acf7d82f224f3e30cadd9d15f3dddbb29dbeb9f68fb68bedb91e0b1ef48832778fe36699c7ebf101659a8f476c4a065eac71d6d1e7fafc6f25ec2c9a8f431fe347a2d30e912c5b2397613ce784637ec71e37566eb0548b461f71028459c6f137c18737d58b56949d022bf1eaf486692bb76836a233c7879d740ad0beaf5159d3380442824f536a41bb22d08fe53952b9c6fed2605d53311c71b455655f96ea6a87e41e9211e90170b0a2b1a2098175ebcd33d517085d224122264cddadd82a3d11bc4a33ce66108b22b1abc6243d306d8f6b8a2ddb5373c190d8f859a3174a200936b079f85edcac7fc03fb993ec0ff8b83f1fd3f1b888d192d99c7ede5d381784d25410cccf1b0bf26a54f065e1e3ec59cc5704fb658fc980a0ac4287ef884ee82007554be3f1e163c81468d0c26c95e3e12393776e32800bb4f086f19080c4fca3d72e8569a5627ce98f2ae0bdb3ec42c23847d47e10b1c58da7e9cea990da842d96e3a51ed7d892f7b28a10486424a69a9109ebd4d7d5a3768400ac000a6d7556ca192e5cd45efb82001ac7b53e03036b6019a07ffb545cd3853e077f08a015f6232488c1139a9409c95ed005261e36b307406ba5714ef395129345866109341feb6c7c458ce08c147a983b46375ddb3621cee0312ba1a434bcd6081e1a8ae8b6d518988b9965faf9aff86df8173b93342cceaec357a100e59b4d66553633626b0b12e9622b8f8fdfe26545b87c57f8ce8609fb8e19b0f6d1cd64e8de85c7327f543b2f38cf3086b57f85e1aaa4add723e4bc4e3ea2c27acec1e545ae3fc870bd42422f6eaf17a1f82699c9cadf224ea1e5d1705b49118d91cc3731aeed60e41bf15a9613aeda8e63a29bc7a95b2d993d23269a310b91f69d16a71243c0f4080d3359f5ddd63c7032bef14ab25eb7df4b28b2132bcbf94a281c8f5de79885a6d679f145fca292b599bb09a1864726d86b65d4781408320b968e2224c23ce7a56d8892970043737ae47f071aaeb219716bc21e3304e301eb5cd32aea951a70621eb870214a72e6c474c3a20f5bd8e089ba16326cc9a80a1a4f5f0e8f58629e20b1c73eb8af330744b187a5cfdb410466378313700ca44eb6dcbc8f3d70f58e134202546f0b1a3b61a298f2a1184b1533bdad308fa2f960087e0f239d2ccbaee3889ddc1a2bea2183b98854d255a6f708909134fab83f42f13e7604f602e264f4a3b2b2a08c673c7ce2813218159b472d3b20ecbf26dd2f7b3ba5298a4ff7444ea0936e098c126f590b05e7697ed8a3d52ba1abc7285de2f160b9b081cb775a5ab77aad1bb98d47e3da53fc4c11d4db47de1e4e6f56ad671f5d8389b33260cc546e4f0bf34fec9b2abd209e6b89e6e381367774676ed6e6eaffe42b07241c276f3c84f17a0762de83eb769bdf28991ddbc23758f01c9ecfba4ab2ca2118fcedd7adde9ff47f643c13e3ad2f13b576985128f233e329fe269d5745cd2b30e5762452a4ff58fdec30623175f8d575ced1c43411e2869aadbe6f1e79a010bca334cb08d545bc2808f359b7777d1bb5675ee210574b9f72cdeb071e07eeaa0988086213a37a972647cf21d3a3bcbd7359da327bacad41b93c5e0e494669109dddcec781774f248f5663e4fac187d42ffccf68335de2adac4f8d3e1bf04b95a9464960186ed019773ffeda18f9827a61edc5fc4088eb0965cb1bd8af1185aa3972b8f73839b4611e303bcbc1f84a330f60fa0a7795ea3cffe0e338406533e12c7deef0b5906c513eab4619a8f02fdd65dcfb7297ef971c4601ad079f7ad38278ae3ff455b37d5492af546975535450693fd4593c8157b3fdb16fd3a106d2f1509d1c06dabb8933269d790a1c5e5f7bdd4a57e1e670d7043cfed88c365b5f8eefe530ef7da5322df981723332c088fce89c2ceee23b420f64332243b9c606d67d538810a94e0ffbd37a119d8fc4d6caec0def40e62613873c74feabde63e12cb2016c1d35cf1bb95bf59e01a63be8825cb3118b74b106f21eef5ee2f41e5fb39fdde058050f780d98ced247c66fc3a03ba04edaf14d698859ba303d511cf0845dc5e269aef2287770a247fd5ae1299b45819ff41725f9da3e4dab7770eb83992b53ae9a9de69e764f6e3aee3e27cfb1bacf531a91605894ae209da6d25872fb54bf36b2ed450b51aa8ee4875b9bc7e55753f61e12a323d301faceb2ecff0686b1359343a94774a6a098dc2df440725cd8331f527d4e22f8090d8879ef4765849705b99465d7ebdf661b81c303d13b87270dc1f227d5954fcbc93bbce6fde2a1f8d573d9cd8130c173a14706f1e9dabc4d16a5b003dd3239faf91769e25cf007b0623141e4e57f11746cd62f20d73956fa84c6a12e1756b6671a64bd7a474ba425907e1a61ba6d2ffa1149165a713a141bfec0f1af51afebdb84d5f14eb51acc284403627d6ce48fd028dc04e00ed963de37f85d155c33e2b4ceb09044c4f1c7791348216b674a8831a232a638f8bfb396fabbe1f880944bc5dcac55df8abc78f804306c88617acfd4adfbb5a055d3d3e91abb763ad84e701cc5679498e04600570f4b2e57c70542043dc590ab363215e6ab3f0bd89383748783d01c9227229edac723d4e2eaa061a44f2630691f25ca6093775183fdf432e01322203dd654b336670116a6a52a27ff2032b1103a4e4be0cc2fb05b24352d72e374e90cc3db2a5a691c7f6b8d1058d7730433c742d8ce52074318b1bce9bb104cf90c8b7f65293c2b74434661444f38d94d977e03433440517f6155a3cad2621c5502dd6148b867a40e6a40be4c8265ec2164b5257f06da1784e98991f42003ced4ba67c23b8c654b542d2d31168fd853cf56cc2c464d7a8a9fbcd2715968788f8527c597ab5f917753c1f1708d2c19972373c5a22af71847de22b9f1e9d38a04ea4dd291da3099cb836a696350bf1263c3c275c27b8b82f604625451a24490b0b5367c2fd05e699546ddf17709d2e2c2710f4361d9dd6e2de2b4353b7f4f8141f6f989dc1a798a974565978e4f9ec0c59a7dbc04bcab072c8513b9ca782c22cdd31fb116c10081740fd8f7d0cbd5c54f1069297f20b45d79bb9ace8e851a655fedf47b2dc76fd30b9ba9f09c9b50d6910ffcdec7078c36fe1e9b19dbb110197496349560a43c0ab42b4ce286643e73a92246ecb71e95ce0d54114772f8477c7d5604c1a52d2f680c5868cf08a2688dd9fef492a01836112cec824483e77da93d104a9e18d06bddf9a4007740a0537ac1a5e09900acc65d52680212a15b68b0ef887228e06f533c1ca95b8f9d81b9fc6608cb5bacf4b867922999c69d46048ec3f408866789f49fcb176fc99ed9d3e6c357ed2e3ce2665925773e5d86c2ceaf8f18519a00d9d2e19e9a6b16af0a53fd7df6974f5db00494460e7f3de6ff6b642859335e020513bb525adddabf0d7d6ae85e7e56e32ca8acc07fe86b7b445358966ba3914c1dfa7b814d9e846ff02a6a8c8f5713a0f727024b5d1ea7e4ce7c64f9b24dd3337a3df33714c5404403b0304b25a66fe3ac85083965877117b3d721e7922f0ac7e278feeb8dc09f58cbcfbb81b11d4699737f37ac240a24b9c4b2b587e68974f7ca5561856f32e389d32056f7d58e4de24c11bd5c5afaa441120370d0c48341e1b8146a6bbca8c15f23c155d2533e97a8e6496bc00533ec83be8488d020708d97385a03bcbf57cadc2c1e575e1ac134cdb5047f3f88eae0230751626cea1c85da9b74ddace668afebb2dc66d302ddf3c5f8f21ac0c0535d00839457e7cac9282a8e49d018b077e38ea512cf28eacff5d98e880abfb5af2e7c039d2e1f1edaad2642963ef29d715f754e2715caa6af046a298b285e3582d903be726b608619332e1a82be48b0f5adf6838f41ff776e5290de8269794bce8fb971267d036bd6bd30e42df918125d573ced78263251bcae2b7b40f1ba855b4f2472312ea8752c4a0e09468bd25615a6c00a9b44c484c5507b8400537f20890e9499ec94ed2b6aeff21e57c6e8a93d80097f85ac9316b03a5f768721bf7d041bb9a6a03eabd615e3c4d74f56c429d53b8fec4b5e86c5b311a6cd4a86f03e04dab25ad65b68a8b8d9053993fd2440ff2b81768213084c831d31a0f8c646aff9090b5463cbee452abd6318340ec41b50f1deba7ffb60b326751de3f6dbf9b17714299233d5c43071367ece2e53212e7f4e084fea60850d4d16908d9bbbb531fbf72143fdb62d1b40afde3d0b2ac2c94c32e456bbef62f8d677e332aec8ccc8eedbac61e7b89b32d57157a39ad5c456258d9c36db0edc82c2baead990ee78007ed89c8f450e92d5e209cc25f7c13f5909ca404fddbdbeff89cc42350c91e9f1fdf9753c6e95f71257f8cbb97838684461cd1244c938b9939a4e9c7727902b6f1a5434e0a06d3fc221771dd87572ae801c5ce6886122f0c91dae57440ffc7ace4e8e0041a1d245103aaadbfc2ecff622228daed2b0cd30f7f59b2617f6f0571ee4403d84e652d78b8e64d5450b6483ef70582dcda9351f2dddd3a4ac84f514f708d3af6242501bd041beae78e6b29b517b534148ea91ef85653fec824d6ddb0c0fa2555ab2564ba29227b1046b48a11ee0e6aafda9d0b80b0f05a8d057cbeb16264cb579aea3ba2b2000052d03c77844ab7c", 0xd4d}], 0x1}, 0x0) 1.652391136s ago: executing program 1 (id=3521): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000071182b000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="0000000000020000000000000000001000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="5400000f000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a0000002000650e030000000500000008000000"], 0x88}, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'veth0_to_bridge\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.615768449s ago: executing program 4 (id=3522): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0d00000007000000040000000100000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r1}, &(0x7f0000000840), &(0x7f0000000880)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r1, &(0x7f0000000d40), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) 1.003751439s ago: executing program 4 (id=3524): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8982, &(0x7f0000000080)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/20], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00', @random="0b917cdc5d72"}) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r8, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) 959.709702ms ago: executing program 5 (id=3525): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x800) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r2, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001240)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000001280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x37, &(0x7f0000001300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001340), &(0x7f0000001380), 0x8, 0x97, 0x8, 0x8, &(0x7f00000013c0)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001700)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x4, [@struct={0x7, 0x8, 0x0, 0x4, 0x0, 0x8001, [{0x8, 0x1, 0x1ff}, {0x5, 0x3, 0x89b5}, {0x7, 0x0, 0xfff}, {0x5, 0x3, 0x2}, {0x7, 0x4, 0xffffffff}, {0x5, 0x2, 0xda}, {0x3, 0x2, 0x1}, {0x6, 0x1, 0x81}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001600)=""/233, 0x88, 0xe9, 0x1, 0x80, 0x10000}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x18, 0x9, &(0x7f0000001100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x437}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000f40)='GPL\x00', 0xffffd63e, 0xb0, &(0x7f0000001180)=""/176, 0x41100, 0x48, '\x00', r3, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x3, 0x4, 0xc0, 0xfff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001780)=[r1, r1, r1, r1, r1, r1], &(0x7f00000017c0)=[{0x1, 0x2, 0x5, 0x4}], 0x10, 0xffff}, 0x94) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'dvmrp1\x00', 0x400}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000080000000050000000010"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='percpu_create_chunk\x00', r6}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 752.540519ms ago: executing program 0 (id=3528): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000ac0)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r1, 0x18000000000002a0, 0xe40, 0x2e, &(0x7f0000000040)="76389e147583ddd0569ba56a88a855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 716.272872ms ago: executing program 5 (id=3529): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 699.119543ms ago: executing program 2 (id=3530): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffff"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x10000, 0xfffffcf1, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000000}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000002, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="01000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x50) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) r6 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) close(r6) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='tlb_flush\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdb9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r8}, 0x10) 681.269354ms ago: executing program 0 (id=3531): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r0, 0x18000000000002a0, 0xe, 0x26f9, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd", 0x0, 0x14000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="06000000040004000800"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@generic={&(0x7f00000003c0)='.\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f00000001c0), 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000bc0)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x9) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x10) close(r3) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r5, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00\x00!\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES16=r2, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="641c89b2b3de6047bc6e68fabe2078e36a583848001790112bca3e9ae90828aa7166f6a4a9d5756d64ebff839508b4c6df8c7dd681b828152744f2128ba99f7cdd219c71aa66b299042026707b49edd232024fddaca629a82457216d50ae6b2317dab097601d12042086aef8d7e794b531e74684168c4a5e78242fdfed7ae330e31a8f84f5e6c9077cd53bb7949b06ea8ccdaaff7d82679030b92faca9908624adaa89aacf147a1e8afa0e020c7608c99c3785a4c90fa70899f833091d5f1e8063afd166192f05ee01c75c3811f1d39e7f1fe2078d22381b6ce1c9b0348787013b0eedd955ee121bc69a8d6ca44eba41d93b8f13d43c9cb5"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) 648.179907ms ago: executing program 5 (id=3532): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1, 0x0, 0x0, 0x2000000}, 0x40002001) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) close(r0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xb}, 0x10260a, 0x0, 0xfffffff8, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x14, 0x16}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffff80, 0x10, &(0x7f0000000000), 0x76}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r10, r9, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r10}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) sendmsg$inet(r8, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 593.425692ms ago: executing program 4 (id=3533): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r0}, &(0x7f0000004000), &(0x7f0000004040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 512.447668ms ago: executing program 4 (id=3534): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0d00000007000000040000000100000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/18], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r1}, &(0x7f0000000840), &(0x7f0000000880)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r1, &(0x7f0000000d40), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) 506.536619ms ago: executing program 0 (id=3535): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0xc, 0x3, 0x7, 0xc1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r0}, 0x38) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2a, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r2, 0x40047451, &(0x7f0000000180)) 454.165443ms ago: executing program 1 (id=3536): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r5}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8, 0xf2db72b, 0x0, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000280)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4eebbcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c27", 0x39}], 0x1}, 0x0) recvmsg$unix(r2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x1000000000000004}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 435.243335ms ago: executing program 2 (id=3537): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xdeb9065d}, 0x94) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 430.469735ms ago: executing program 4 (id=3538): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0900000000000000f37538e486dd630080fc5c082c00db5bffffffffff00000006036c040000000000000000000000000000ac1414aa33200007"], 0xfdef) 357.762661ms ago: executing program 2 (id=3539): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x800) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r2, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001240)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000001280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x37, &(0x7f0000001300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001340), &(0x7f0000001380), 0x8, 0x97, 0x8, 0x8, &(0x7f00000013c0)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001700)={&(0x7f0000001540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x4, [@struct={0x7, 0x8, 0x0, 0x4, 0x0, 0x8001, [{0x8, 0x1, 0x1ff}, {0x5, 0x3, 0x89b5}, {0x7, 0x0, 0xfff}, {0x5, 0x3, 0x2}, {0x7, 0x4, 0xffffffff}, {0x5, 0x2, 0xda}, {0x3, 0x2, 0x1}, {0x6, 0x1, 0x81}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001600)=""/233, 0x88, 0xe9, 0x1, 0x80, 0x10000}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x18, 0x9, &(0x7f0000001100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x437}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000f40)='GPL\x00', 0xffffd63e, 0xb0, &(0x7f0000001180)=""/176, 0x41100, 0x48, '\x00', r3, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x3, 0x4, 0xc0, 0xfff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001780)=[r1, r1, r1, r1, r1, r1], &(0x7f00000017c0)=[{0x1, 0x2, 0x5, 0x4}], 0x10, 0xffff}, 0x94) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'dvmrp1\x00', 0x400}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000080000000050000000010"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='percpu_create_chunk\x00', r6}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 357.512891ms ago: executing program 4 (id=3540): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000040), 0x4) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) sendmsg$tipc(r5, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) recvmsg(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r4, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x1, &(0x7f0000000700)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f447333de39c7095758218a68bc5142f0cb2229fa6c8b0d7c8126aee6d3def94cd964218564fb1d255bce6cef9bea8322326039744a98eead8c59bc75bb5b42123eef53ae4bc331b0ad09a8efc4175c484ad74df9158ff1882cdd83c97c03a35e91c30a0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1900000004000000040000000900000008000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000100"/28], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r10, 0x18000000000002a0, 0x0, 0x11, 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000400)={r11}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r8}, 0x10) 284.559127ms ago: executing program 2 (id=3541): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000ac0)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r1, 0x18000000000002a0, 0xe40, 0x2e, &(0x7f0000000040)="76389e147583ddd0569ba56a88a855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 202.043143ms ago: executing program 0 (id=3542): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 184.177605ms ago: executing program 5 (id=3543): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r1, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x63, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c25000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000ff01000000000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)=@generic={0x0, r8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b7030000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e67f00001100000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x6, 0x8, 0x2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r9, &(0x7f0000000300), 0x0}, 0x20) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8982, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000073113f000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='fdb_delete\x00', r5}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 182.830735ms ago: executing program 0 (id=3544): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r0}, &(0x7f0000004000), &(0x7f0000004040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 173.292896ms ago: executing program 2 (id=3545): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r0, 0x18000000000002a0, 0xe, 0x26f9, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd", 0x0, 0x14000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="06000000040004000800"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@generic={&(0x7f00000003c0)='.\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f00000001c0), 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000bc0)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x9) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x10) close(r3) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r5, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00\x00!\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES16=r2, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="641c89b2b3de6047bc6e68fabe2078e36a583848001790112bca3e9ae90828aa7166f6a4a9d5756d64ebff839508b4c6df8c7dd681b828152744f2128ba99f7cdd219c71aa66b299042026707b49edd232024fddaca629a82457216d50ae6b2317dab097601d12042086aef8d7e794b531e74684168c4a5e78242fdfed7ae330e31a8f84f5e6c9077cd53bb7949b06ea8ccdaaff7d82679030b92faca9908624adaa89aacf147a1e8afa0e020c7608c99c3785a4c90fa70899f833091d5f1e8063afd166192f05ee01c75c3811f1d39e7f1fe2078d22381b6ce1c9b0348787013b0eedd955ee121bc69a8d6ca44eba41d93b8f13d43c9cb5"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) 61.185775ms ago: executing program 0 (id=3546): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000071182b000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="0000000000020000000000000000001000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500), 0x0, 0x88, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000580), &(0x7f0000000680), 0x8, 0xac, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="5400000f000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a0000002000650e030000000500000008000000"], 0x88}, 0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'veth0_to_bridge\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 0s ago: executing program 2 (id=3547): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) (fail_nth: 9) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) kernel console output (not intermixed with test programs): dbe9 [ 248.288692][ T6242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.309685][ T6242] RSP: 002b:00007f438c3b6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 248.318479][ T6242] RAX: ffffffffffffffda RBX: 00007f438db74fa0 RCX: 00007f438d94dbe9 [ 248.326562][ T6242] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000a [ 248.335129][ T6242] RBP: 00007f438c3b6090 R08: 0000000000000000 R09: 0000000000000000 [ 248.344089][ T6242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.352093][ T6242] R13: 00007f438db75038 R14: 00007f438db74fa0 R15: 00007ffd20684da8 [ 248.360447][ T6242] [ 248.436894][ T6242] wireguard: wg2: Could not create IPv6 socket [ 248.443537][ T6242] device wg2 entered promiscuous mode [ 249.127704][ T282] syz-executor (282) used greatest stack depth: 21376 bytes left [ 249.216748][ T6259] device veth1_macvtap left promiscuous mode [ 250.326943][ T393] device bridge_slave_1 left promiscuous mode [ 250.335836][ T393] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.352278][ T393] device bridge_slave_0 left promiscuous mode [ 250.358766][ T393] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.367587][ T393] device veth0_vlan left promiscuous mode [ 253.780647][ T6320] device wg2 left promiscuous mode [ 253.810388][ T6320] device wg2 entered promiscuous mode [ 253.926338][ T6327] device wg2 left promiscuous mode [ 254.321910][ T6328] device wg2 entered promiscuous mode [ 255.574178][ T6374] syz.4.2222[6374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.574291][ T6374] syz.4.2222[6374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.789431][ T6374] syz.4.2222[6374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.823576][ T6374] syz.4.2222[6374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.006964][ T6397] tap0: tun_chr_ioctl cmd 1074025681 [ 256.519749][ T6404] FAULT_INJECTION: forcing a failure. [ 256.519749][ T6404] name failslab, interval 1, probability 0, space 0, times 0 [ 256.616790][ T6404] CPU: 1 PID: 6404 Comm: syz.0.2233 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 256.627223][ T6404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 256.637495][ T6404] Call Trace: [ 256.640795][ T6404] [ 256.643742][ T6404] __dump_stack+0x21/0x30 [ 256.648110][ T6404] dump_stack_lvl+0xee/0x150 [ 256.653004][ T6404] ? show_regs_print_info+0x20/0x20 [ 256.658452][ T6404] dump_stack+0x15/0x20 [ 256.662907][ T6404] should_fail+0x3c1/0x510 [ 256.667374][ T6404] ? tipc_buf_acquire+0x2b/0xe0 [ 256.672267][ T6404] __should_failslab+0xa4/0xe0 [ 256.677094][ T6404] should_failslab+0x9/0x20 [ 256.681735][ T6404] slab_pre_alloc_hook+0x3b/0xe0 [ 256.686944][ T6404] ? tipc_buf_acquire+0x2b/0xe0 [ 256.692088][ T6404] ? tipc_buf_acquire+0x2b/0xe0 [ 256.696993][ T6404] __kmalloc_track_caller+0x6c/0x2c0 [ 256.702865][ T6404] ? tipc_buf_acquire+0x2b/0xe0 [ 256.707757][ T6404] ? tipc_buf_acquire+0x2b/0xe0 [ 256.713020][ T6404] __alloc_skb+0x21a/0x740 [ 256.717605][ T6404] tipc_buf_acquire+0x2b/0xe0 [ 256.722354][ T6404] tipc_msg_build+0x8f1/0xfb0 [ 256.727760][ T6404] __tipc_sendmsg+0x19dd/0x2680 [ 256.732768][ T6404] ? _raw_spin_lock+0xe0/0xe0 [ 256.737851][ T6404] ? local_bh_enable+0x30/0x30 [ 256.742652][ T6404] ? wait_woken+0x170/0x170 [ 256.747455][ T6404] ? avc_has_perm+0x158/0x240 [ 256.752381][ T6404] ? __kasan_check_write+0x14/0x20 [ 256.757625][ T6404] ? _raw_spin_lock_bh+0x8e/0xe0 [ 256.762709][ T6404] ? _raw_spin_lock_irq+0xe0/0xe0 [ 256.767779][ T6404] ? unwind_get_return_address+0x4d/0x90 [ 256.773541][ T6404] ? stack_trace_save+0xe0/0xe0 [ 256.778569][ T6404] ? __local_bh_enable_ip+0x58/0x80 [ 256.783808][ T6404] ? lock_sock_nested+0x1f1/0x290 [ 256.789037][ T6404] ? sock_init_data+0xc0/0xc0 [ 256.793764][ T6404] ? stack_trace_save+0x98/0xe0 [ 256.798861][ T6404] tipc_sendmsg+0x55/0x70 [ 256.803200][ T6404] ? tipc_recvmsg+0x13a0/0x13a0 [ 256.808055][ T6404] ____sys_sendmsg+0x5a2/0x8c0 [ 256.812843][ T6404] ? __sys_sendmsg_sock+0x40/0x40 [ 256.817981][ T6404] ? import_iovec+0x7c/0xb0 [ 256.822585][ T6404] ___sys_sendmsg+0x1f0/0x260 [ 256.827368][ T6404] ? __sys_sendmsg+0x250/0x250 [ 256.832401][ T6404] ? __fdget+0x1a1/0x230 [ 256.836821][ T6404] __x64_sys_sendmsg+0x1e2/0x2a0 [ 256.842093][ T6404] ? ___sys_sendmsg+0x260/0x260 [ 256.846998][ T6404] ? ksys_write+0x1eb/0x240 [ 256.851632][ T6404] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 256.857800][ T6404] x64_sys_call+0x4b/0x9a0 [ 256.862225][ T6404] do_syscall_64+0x4c/0xa0 [ 256.866827][ T6404] ? clear_bhb_loop+0x50/0xa0 [ 256.871714][ T6404] ? clear_bhb_loop+0x50/0xa0 [ 256.876583][ T6404] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 256.882777][ T6404] RIP: 0033:0x7f438d94dbe9 [ 256.887343][ T6404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 256.907950][ T6404] RSP: 002b:00007f438c3b6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 256.916557][ T6404] RAX: ffffffffffffffda RBX: 00007f438db74fa0 RCX: 00007f438d94dbe9 [ 256.924532][ T6404] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 256.932677][ T6404] RBP: 00007f438c3b6090 R08: 0000000000000000 R09: 0000000000000000 [ 256.940827][ T6404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 256.948799][ T6404] R13: 00007f438db75038 R14: 00007f438db74fa0 R15: 00007ffd20684da8 [ 256.956785][ T6404] [ 258.684467][ T6463] device syzkaller0 entered promiscuous mode [ 261.141753][ T6559] device syzkaller0 entered promiscuous mode [ 261.471056][ T6571] GPL: port 2(macsec0) entered blocking state [ 261.595753][ T6571] GPL: port 2(macsec0) entered disabled state [ 261.685386][ T6571] device macsec0 entered promiscuous mode [ 262.688739][ T6636] bond_slave_1: mtu less than device minimum [ 263.917407][ T6665] FAULT_INJECTION: forcing a failure. [ 263.917407][ T6665] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 263.990841][ T6665] CPU: 1 PID: 6665 Comm: syz.2.2328 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 264.001241][ T6665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 264.011532][ T6665] Call Trace: [ 264.014834][ T6665] [ 264.017800][ T6665] __dump_stack+0x21/0x30 [ 264.022163][ T6665] dump_stack_lvl+0xee/0x150 [ 264.026880][ T6665] ? show_regs_print_info+0x20/0x20 [ 264.032430][ T6665] ? __alloc_pages+0x27d/0x440 [ 264.037315][ T6665] dump_stack+0x15/0x20 [ 264.041582][ T6665] should_fail+0x3c1/0x510 [ 264.046203][ T6665] should_fail_usercopy+0x1a/0x20 [ 264.051253][ T6665] copy_page_from_iter+0x2f6/0x680 [ 264.056379][ T6665] tun_get_user+0x813/0x33c0 [ 264.060985][ T6665] ? __kasan_poison_slab+0x70/0x70 [ 264.066108][ T6665] ? tun_do_read+0x1c40/0x1c40 [ 264.070878][ T6665] ? kstrtouint_from_user+0x1a0/0x200 [ 264.076361][ T6665] ? kstrtol_from_user+0x260/0x260 [ 264.081475][ T6665] ? avc_policy_seqno+0x1b/0x70 [ 264.086360][ T6665] ? selinux_file_permission+0x2aa/0x510 [ 264.092030][ T6665] tun_chr_write_iter+0x1eb/0x2e0 [ 264.097244][ T6665] vfs_write+0x802/0xf70 [ 264.101566][ T6665] ? file_end_write+0x1b0/0x1b0 [ 264.106432][ T6665] ? __fget_files+0x2c4/0x320 [ 264.111116][ T6665] ? __fdget_pos+0x1f7/0x380 [ 264.115716][ T6665] ? ksys_write+0x71/0x240 [ 264.120133][ T6665] ksys_write+0x140/0x240 [ 264.124463][ T6665] ? __ia32_sys_read+0x90/0x90 [ 264.129315][ T6665] ? debug_smp_processor_id+0x17/0x20 [ 264.134698][ T6665] __x64_sys_write+0x7b/0x90 [ 264.139289][ T6665] x64_sys_call+0x8ef/0x9a0 [ 264.143808][ T6665] do_syscall_64+0x4c/0xa0 [ 264.148324][ T6665] ? clear_bhb_loop+0x50/0xa0 [ 264.153360][ T6665] ? clear_bhb_loop+0x50/0xa0 [ 264.158240][ T6665] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 264.164260][ T6665] RIP: 0033:0x7f2eb60c0be9 [ 264.168774][ T6665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.188731][ T6665] RSP: 002b:00007f2eb4b29038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 264.197259][ T6665] RAX: ffffffffffffffda RBX: 00007f2eb62e7fa0 RCX: 00007f2eb60c0be9 [ 264.205338][ T6665] RDX: 0000000000000014 RSI: 00002000000002c0 RDI: 00000000000000c8 [ 264.213487][ T6665] RBP: 00007f2eb4b29090 R08: 0000000000000000 R09: 0000000000000000 [ 264.221549][ T6665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.229537][ T6665] R13: 00007f2eb62e8038 R14: 00007f2eb62e7fa0 R15: 00007ffeefa75698 [ 264.237703][ T6665] [ 264.986940][ T6699] FAULT_INJECTION: forcing a failure. [ 264.986940][ T6699] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 265.062871][ T6699] CPU: 1 PID: 6699 Comm: syz.4.2340 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 265.073078][ T6699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 265.083351][ T6699] Call Trace: [ 265.086832][ T6699] [ 265.089809][ T6699] __dump_stack+0x21/0x30 [ 265.094185][ T6699] dump_stack_lvl+0xee/0x150 [ 265.098811][ T6699] ? show_regs_print_info+0x20/0x20 [ 265.104047][ T6699] ? __kasan_check_write+0x14/0x20 [ 265.109187][ T6699] dump_stack+0x15/0x20 [ 265.113380][ T6699] should_fail+0x3c1/0x510 [ 265.117830][ T6699] should_fail_usercopy+0x1a/0x20 [ 265.122876][ T6699] _copy_from_user+0x20/0xd0 [ 265.127492][ T6699] iovec_from_user+0x1bc/0x2f0 [ 265.132280][ T6699] __import_iovec+0x71/0x400 [ 265.136986][ T6699] ? kstrtol_from_user+0x260/0x260 [ 265.142125][ T6699] import_iovec+0x7c/0xb0 [ 265.146562][ T6699] ___sys_recvmsg+0x420/0x4f0 [ 265.151268][ T6699] ? __sys_recvmsg+0x250/0x250 [ 265.156146][ T6699] ? vfs_write+0xc17/0xf70 [ 265.160597][ T6699] ? __fdget+0x1a1/0x230 [ 265.164867][ T6699] __x64_sys_recvmsg+0x1df/0x2a0 [ 265.169832][ T6699] ? ___sys_recvmsg+0x4f0/0x4f0 [ 265.174717][ T6699] ? ksys_write+0x1eb/0x240 [ 265.179244][ T6699] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 265.185341][ T6699] x64_sys_call+0x705/0x9a0 [ 265.189869][ T6699] do_syscall_64+0x4c/0xa0 [ 265.194309][ T6699] ? clear_bhb_loop+0x50/0xa0 [ 265.199013][ T6699] ? clear_bhb_loop+0x50/0xa0 [ 265.203721][ T6699] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 265.209658][ T6699] RIP: 0033:0x7feb8924dbe9 [ 265.214278][ T6699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 265.234001][ T6699] RSP: 002b:00007feb87cb6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 265.242871][ T6699] RAX: ffffffffffffffda RBX: 00007feb89474fa0 RCX: 00007feb8924dbe9 [ 265.250967][ T6699] RDX: 0000000000000061 RSI: 0000200000000080 RDI: 0000000000000006 [ 265.259060][ T6699] RBP: 00007feb87cb6090 R08: 0000000000000000 R09: 0000000000000000 [ 265.267057][ T6699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.275164][ T6699] R13: 00007feb89475038 R14: 00007feb89474fa0 R15: 00007ffc19de6258 [ 265.283170][ T6699] [ 265.882890][ T6739] FAULT_INJECTION: forcing a failure. [ 265.882890][ T6739] name failslab, interval 1, probability 0, space 0, times 0 [ 265.895748][ T6739] CPU: 0 PID: 6739 Comm: syz.1.2354 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 265.906199][ T6739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 265.916280][ T6739] Call Trace: [ 265.919629][ T6739] [ 265.922585][ T6739] __dump_stack+0x21/0x30 [ 265.926947][ T6739] dump_stack_lvl+0xee/0x150 [ 265.931578][ T6739] ? show_regs_print_info+0x20/0x20 [ 265.936817][ T6739] ? set_next_entity+0x2e6/0x770 [ 265.941787][ T6739] dump_stack+0x15/0x20 [ 265.946060][ T6739] should_fail+0x3c1/0x510 [ 265.950508][ T6739] __should_failslab+0xa4/0xe0 [ 265.955300][ T6739] should_failslab+0x9/0x20 [ 265.959835][ T6739] slab_pre_alloc_hook+0x3b/0xe0 [ 265.964794][ T6739] __kmalloc+0x6d/0x2c0 [ 265.968964][ T6739] ? uclamp_rq_max_value+0x4a0/0x4a0 [ 265.974264][ T6739] ? bpf_map_kmalloc_node+0xb9/0x140 [ 265.979574][ T6739] bpf_map_kmalloc_node+0xb9/0x140 [ 265.984704][ T6739] alloc_htab_elem+0x299/0x950 [ 265.989514][ T6739] __htab_percpu_map_update_elem+0x358/0x5f0 [ 265.995516][ T6739] bpf_percpu_hash_update+0x96/0xd0 [ 266.000758][ T6739] bpf_map_update_value+0x214/0x3e0 [ 266.005975][ T6739] generic_map_update_batch+0x4f5/0x740 [ 266.011914][ T6739] ? generic_map_delete_batch+0x510/0x510 [ 266.017681][ T6739] ? __fdget+0x1a1/0x230 [ 266.021959][ T6739] ? generic_map_delete_batch+0x510/0x510 [ 266.027704][ T6739] bpf_map_do_batch+0x463/0x5f0 [ 266.032582][ T6739] __sys_bpf+0x5e3/0x730 [ 266.036851][ T6739] ? bpf_link_show_fdinfo+0x310/0x310 [ 266.042448][ T6739] ? bpf_trace_run2+0xb5/0x1b0 [ 266.047260][ T6739] ? __bpf_trace_sys_enter+0x62/0x70 [ 266.052698][ T6739] __x64_sys_bpf+0x7c/0x90 [ 266.057143][ T6739] x64_sys_call+0x4b9/0x9a0 [ 266.061676][ T6739] do_syscall_64+0x4c/0xa0 [ 266.066163][ T6739] ? clear_bhb_loop+0x50/0xa0 [ 266.070893][ T6739] ? clear_bhb_loop+0x50/0xa0 [ 266.075599][ T6739] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 266.081533][ T6739] RIP: 0033:0x7fa5614dbbe9 [ 266.085971][ T6739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 266.105742][ T6739] RSP: 002b:00007fa55ff44038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 266.114375][ T6739] RAX: ffffffffffffffda RBX: 00007fa561702fa0 RCX: 00007fa5614dbbe9 [ 266.122503][ T6739] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 266.130514][ T6739] RBP: 00007fa55ff44090 R08: 0000000000000000 R09: 0000000000000000 [ 266.139024][ T6739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 266.147011][ T6739] R13: 00007fa561703038 R14: 00007fa561702fa0 R15: 00007ffdf9267898 [ 266.155341][ T6739] [ 268.373797][ T6859] FAULT_INJECTION: forcing a failure. [ 268.373797][ T6859] name failslab, interval 1, probability 0, space 0, times 0 [ 268.415683][ T6859] CPU: 1 PID: 6859 Comm: syz.0.2398 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 268.426123][ T6859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 268.436821][ T6859] Call Trace: [ 268.440371][ T6859] [ 268.443417][ T6859] __dump_stack+0x21/0x30 [ 268.447795][ T6859] dump_stack_lvl+0xee/0x150 [ 268.452418][ T6859] ? show_regs_print_info+0x20/0x20 [ 268.457748][ T6859] dump_stack+0x15/0x20 [ 268.461935][ T6859] should_fail+0x3c1/0x510 [ 268.466391][ T6859] __should_failslab+0xa4/0xe0 [ 268.471194][ T6859] should_failslab+0x9/0x20 [ 268.475984][ T6859] slab_pre_alloc_hook+0x3b/0xe0 [ 268.480949][ T6859] ? dup_task_struct+0x57/0xc10 [ 268.485824][ T6859] kmem_cache_alloc+0x44/0x260 [ 268.490639][ T6859] ? _raw_spin_lock_irq+0x8f/0xe0 [ 268.495702][ T6859] dup_task_struct+0x57/0xc10 [ 268.500416][ T6859] ? __kasan_check_write+0x14/0x20 [ 268.505575][ T6859] ? recalc_sigpending+0x1ac/0x230 [ 268.510735][ T6859] copy_process+0x5a9/0x3210 [ 268.515386][ T6859] ? kstrtol_from_user+0x260/0x260 [ 268.520550][ T6859] ? __kasan_check_write+0x14/0x20 [ 268.525703][ T6859] ? proc_fail_nth_write+0x17a/0x1f0 [ 268.531115][ T6859] ? proc_fail_nth_read+0x210/0x210 [ 268.536350][ T6859] ? __pidfd_prepare+0x150/0x150 [ 268.541338][ T6859] ? security_file_permission+0x83/0xa0 [ 268.547098][ T6859] kernel_clone+0x23f/0x940 [ 268.551670][ T6859] ? create_io_thread+0x130/0x130 [ 268.556732][ T6859] ? __kasan_check_write+0x14/0x20 [ 268.562066][ T6859] ? mutex_unlock+0x89/0x220 [ 268.566805][ T6859] __x64_sys_clone+0x176/0x1d0 [ 268.571696][ T6859] ? __kasan_check_write+0x14/0x20 [ 268.576836][ T6859] ? __ia32_sys_vfork+0xf0/0xf0 [ 268.581827][ T6859] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 268.587933][ T6859] x64_sys_call+0x41f/0x9a0 [ 268.592465][ T6859] do_syscall_64+0x4c/0xa0 [ 268.596917][ T6859] ? clear_bhb_loop+0x50/0xa0 [ 268.601641][ T6859] ? clear_bhb_loop+0x50/0xa0 [ 268.606367][ T6859] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 268.612467][ T6859] RIP: 0033:0x7f438d94dbe9 [ 268.616920][ T6859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 268.636556][ T6859] RSP: 002b:00007f438c3b5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 268.645011][ T6859] RAX: ffffffffffffffda RBX: 00007f438db74fa0 RCX: 00007f438d94dbe9 [ 268.653007][ T6859] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000010ef20e000 [ 268.661191][ T6859] RBP: 00007f438c3b6090 R08: 0000000000000000 R09: 0000000000000000 [ 268.669197][ T6859] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 268.677206][ T6859] R13: 00007f438db75038 R14: 00007f438db74fa0 R15: 00007ffd20684da8 [ 268.685557][ T6859] [ 271.383245][ T6888] device wg2 left promiscuous mode [ 271.616653][ T6889] device wg2 entered promiscuous mode [ 272.080813][ T6892] device wg2 entered promiscuous mode [ 274.153355][ T6930] device wg2 left promiscuous mode [ 274.291906][ T6937] device wg2 entered promiscuous mode [ 275.202717][ T6964] device wg2 left promiscuous mode [ 275.564090][ T6976] device wg2 left promiscuous mode [ 275.789425][ T6981] FAULT_INJECTION: forcing a failure. [ 275.789425][ T6981] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 275.828702][ T6977] device wg2 entered promiscuous mode [ 275.896579][ T6981] CPU: 1 PID: 6981 Comm: syz.5.2445 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 275.907150][ T6981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 275.917507][ T6981] Call Trace: [ 275.920819][ T6981] [ 275.923855][ T6981] __dump_stack+0x21/0x30 [ 275.928323][ T6981] dump_stack_lvl+0xee/0x150 [ 275.933277][ T6981] ? show_regs_print_info+0x20/0x20 [ 275.938488][ T6981] ? vfs_write+0xc17/0xf70 [ 275.942918][ T6981] dump_stack+0x15/0x20 [ 275.947099][ T6981] should_fail+0x3c1/0x510 [ 275.951639][ T6981] should_fail_usercopy+0x1a/0x20 [ 275.956683][ T6981] _copy_from_user+0x20/0xd0 [ 275.961315][ T6981] __sys_bpf+0x233/0x730 [ 275.965590][ T6981] ? bpf_link_show_fdinfo+0x310/0x310 [ 275.970999][ T6981] ? debug_smp_processor_id+0x17/0x20 [ 275.976404][ T6981] __x64_sys_bpf+0x7c/0x90 [ 275.980829][ T6981] x64_sys_call+0x4b9/0x9a0 [ 275.985335][ T6981] do_syscall_64+0x4c/0xa0 [ 275.989756][ T6981] ? clear_bhb_loop+0x50/0xa0 [ 275.994642][ T6981] ? clear_bhb_loop+0x50/0xa0 [ 275.999333][ T6981] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 276.005257][ T6981] RIP: 0033:0x7f2781a09be9 [ 276.009866][ T6981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 276.030463][ T6981] RSP: 002b:00007f2780472038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 276.039069][ T6981] RAX: ffffffffffffffda RBX: 00007f2781c30fa0 RCX: 00007f2781a09be9 [ 276.047070][ T6981] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 276.055227][ T6981] RBP: 00007f2780472090 R08: 0000000000000000 R09: 0000000000000000 [ 276.063808][ T6981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.071897][ T6981] R13: 00007f2781c31038 R14: 00007f2781c30fa0 R15: 00007fff75023078 [ 276.079969][ T6981] [ 277.689299][ T7054] FAULT_INJECTION: forcing a failure. [ 277.689299][ T7054] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 277.715847][ T7054] CPU: 0 PID: 7054 Comm: syz.5.2473 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 277.726442][ T7054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 277.736783][ T7054] Call Trace: [ 277.740080][ T7054] [ 277.743034][ T7054] __dump_stack+0x21/0x30 [ 277.747465][ T7054] dump_stack_lvl+0xee/0x150 [ 277.752065][ T7054] ? show_regs_print_info+0x20/0x20 [ 277.757269][ T7054] ? migrate_enable+0x192/0x260 [ 277.762125][ T7054] ? migrate_disable+0x180/0x180 [ 277.767320][ T7054] dump_stack+0x15/0x20 [ 277.771508][ T7054] should_fail+0x3c1/0x510 [ 277.776029][ T7054] should_fail_usercopy+0x1a/0x20 [ 277.781163][ T7054] _copy_to_user+0x20/0x90 [ 277.785791][ T7054] generic_map_lookup_batch+0x707/0xa70 [ 277.791463][ T7054] ? security_file_permission+0x79/0xa0 [ 277.797427][ T7054] ? bpf_map_update_value+0x3e0/0x3e0 [ 277.802821][ T7054] ? bpf_map_update_value+0x3e0/0x3e0 [ 277.808284][ T7054] bpf_map_do_batch+0x2d4/0x5f0 [ 277.813424][ T7054] ? security_bpf+0x82/0xa0 [ 277.817934][ T7054] __sys_bpf+0x5e3/0x730 [ 277.822307][ T7054] ? bpf_link_show_fdinfo+0x310/0x310 [ 277.827838][ T7054] __x64_sys_bpf+0x7c/0x90 [ 277.832444][ T7054] x64_sys_call+0x4b9/0x9a0 [ 277.836959][ T7054] do_syscall_64+0x4c/0xa0 [ 277.841469][ T7054] ? clear_bhb_loop+0x50/0xa0 [ 277.846239][ T7054] ? clear_bhb_loop+0x50/0xa0 [ 277.850926][ T7054] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 277.856847][ T7054] RIP: 0033:0x7f2781a09be9 [ 277.861686][ T7054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 277.881949][ T7054] RSP: 002b:00007f2780472038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 277.890847][ T7054] RAX: ffffffffffffffda RBX: 00007f2781c30fa0 RCX: 00007f2781a09be9 [ 277.898961][ T7054] RDX: 0000000000000038 RSI: 00002000000004c0 RDI: 0000000000000018 [ 277.907164][ T7054] RBP: 00007f2780472090 R08: 0000000000000000 R09: 0000000000000000 [ 277.915340][ T7054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.923406][ T7054] R13: 00007f2781c31038 R14: 00007f2781c30fa0 R15: 00007fff75023078 [ 277.932183][ T7054] [ 278.514266][ T7078] FAULT_INJECTION: forcing a failure. [ 278.514266][ T7078] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 278.668470][ T7078] CPU: 0 PID: 7078 Comm: syz.5.2482 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 278.679145][ T7078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 278.689404][ T7078] Call Trace: [ 278.692757][ T7078] [ 278.695717][ T7078] __dump_stack+0x21/0x30 [ 278.700076][ T7078] dump_stack_lvl+0xee/0x150 [ 278.704790][ T7078] ? show_regs_print_info+0x20/0x20 [ 278.710019][ T7078] ? __kmalloc_track_caller+0x13c/0x2c0 [ 278.715773][ T7078] ? alloc_skb_with_frags+0xa8/0x620 [ 278.721087][ T7078] ? tun_chr_write_iter+0x1eb/0x2e0 [ 278.726913][ T7078] ? vfs_write+0x802/0xf70 [ 278.731404][ T7078] dump_stack+0x15/0x20 [ 278.735595][ T7078] should_fail+0x3c1/0x510 [ 278.740137][ T7078] should_fail_alloc_page+0x55/0x80 [ 278.745379][ T7078] prepare_alloc_pages+0x156/0x600 [ 278.750506][ T7078] ? __alloc_pages_bulk+0xab0/0xab0 [ 278.755722][ T7078] __alloc_pages+0x10a/0x440 [ 278.760513][ T7078] ? prep_new_page+0x110/0x110 [ 278.765304][ T7078] ? __alloc_skb+0x463/0x740 [ 278.769910][ T7078] alloc_skb_with_frags+0x20c/0x620 [ 278.775127][ T7078] sock_alloc_send_pskb+0x853/0x980 [ 278.780420][ T7078] ? __kernel_text_address+0xa0/0x100 [ 278.785802][ T7078] ? sock_kzfree_s+0x60/0x60 [ 278.790667][ T7078] ? iov_iter_advance+0x1f9/0x360 [ 278.795746][ T7078] tun_get_user+0x4e6/0x33c0 [ 278.800616][ T7078] ? ____kasan_slab_free+0x125/0x160 [ 278.806000][ T7078] ? __kasan_poison_slab+0x70/0x70 [ 278.811379][ T7078] ? slab_free_freelist_hook+0xc2/0x190 [ 278.817033][ T7078] ? kmem_cache_free+0x100/0x320 [ 278.822078][ T7078] ? __x64_sys_openat+0x136/0x160 [ 278.827204][ T7078] ? x64_sys_call+0x219/0x9a0 [ 278.832162][ T7078] ? tun_do_read+0x1c40/0x1c40 [ 278.836961][ T7078] ? kstrtouint_from_user+0x1a0/0x200 [ 278.842444][ T7078] ? kstrtol_from_user+0x260/0x260 [ 278.847574][ T7078] ? avc_policy_seqno+0x1b/0x70 [ 278.852432][ T7078] ? selinux_file_permission+0x2aa/0x510 [ 278.858386][ T7078] tun_chr_write_iter+0x1eb/0x2e0 [ 278.863790][ T7078] vfs_write+0x802/0xf70 [ 278.868080][ T7078] ? file_end_write+0x1b0/0x1b0 [ 278.873117][ T7078] ? __fget_files+0x2c4/0x320 [ 278.877992][ T7078] ? __fdget_pos+0x1f7/0x380 [ 278.882766][ T7078] ? ksys_write+0x71/0x240 [ 278.887207][ T7078] ksys_write+0x140/0x240 [ 278.891726][ T7078] ? __ia32_sys_read+0x90/0x90 [ 278.896770][ T7078] ? debug_smp_processor_id+0x17/0x20 [ 278.902151][ T7078] __x64_sys_write+0x7b/0x90 [ 278.906924][ T7078] x64_sys_call+0x8ef/0x9a0 [ 278.911980][ T7078] do_syscall_64+0x4c/0xa0 [ 278.916612][ T7078] ? clear_bhb_loop+0x50/0xa0 [ 278.921308][ T7078] ? clear_bhb_loop+0x50/0xa0 [ 278.925997][ T7078] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 278.931935][ T7078] RIP: 0033:0x7f2781a09be9 [ 278.936881][ T7078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.956856][ T7078] RSP: 002b:00007f2780472038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 278.965635][ T7078] RAX: ffffffffffffffda RBX: 00007f2781c30fa0 RCX: 00007f2781a09be9 [ 278.973665][ T7078] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000003 [ 278.981875][ T7078] RBP: 00007f2780472090 R08: 0000000000000000 R09: 0000000000000000 [ 278.990938][ T7078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.999097][ T7078] R13: 00007f2781c31038 R14: 00007f2781c30fa0 R15: 00007fff75023078 [ 279.007175][ T7078] [ 279.666232][ T7094] device wg2 left promiscuous mode [ 279.690035][ T7097] device wg2 entered promiscuous mode [ 280.626308][ T7118] device syzkaller0 entered promiscuous mode [ 280.871227][ T7130] device wg2 left promiscuous mode [ 280.939387][ T7130] device wg2 entered promiscuous mode [ 281.392275][ T7155] FAULT_INJECTION: forcing a failure. [ 281.392275][ T7155] name failslab, interval 1, probability 0, space 0, times 0 [ 281.615712][ T7155] CPU: 1 PID: 7155 Comm: syz.0.2512 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 281.626279][ T7155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 281.636518][ T7155] Call Trace: [ 281.639806][ T7155] [ 281.642834][ T7155] __dump_stack+0x21/0x30 [ 281.647228][ T7155] dump_stack_lvl+0xee/0x150 [ 281.651829][ T7155] ? show_regs_print_info+0x20/0x20 [ 281.657206][ T7155] dump_stack+0x15/0x20 [ 281.661488][ T7155] should_fail+0x3c1/0x510 [ 281.665909][ T7155] __should_failslab+0xa4/0xe0 [ 281.670765][ T7155] should_failslab+0x9/0x20 [ 281.675282][ T7155] slab_pre_alloc_hook+0x3b/0xe0 [ 281.680309][ T7155] kmem_cache_alloc_trace+0x48/0x270 [ 281.685638][ T7155] ? btf_new_fd+0x1b2/0x920 [ 281.690167][ T7155] btf_new_fd+0x1b2/0x920 [ 281.694732][ T7155] bpf_btf_load+0x6f/0x90 [ 281.699072][ T7155] __sys_bpf+0x515/0x730 [ 281.703851][ T7155] ? bpf_link_show_fdinfo+0x310/0x310 [ 281.709402][ T7155] ? debug_smp_processor_id+0x17/0x20 [ 281.715023][ T7155] __x64_sys_bpf+0x7c/0x90 [ 281.719562][ T7155] x64_sys_call+0x4b9/0x9a0 [ 281.724087][ T7155] do_syscall_64+0x4c/0xa0 [ 281.728673][ T7155] ? clear_bhb_loop+0x50/0xa0 [ 281.733376][ T7155] ? clear_bhb_loop+0x50/0xa0 [ 281.738175][ T7155] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 281.744097][ T7155] RIP: 0033:0x7f438d94dbe9 [ 281.748554][ T7155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 281.768471][ T7155] RSP: 002b:00007f438c3b6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 281.777054][ T7155] RAX: ffffffffffffffda RBX: 00007f438db74fa0 RCX: 00007f438d94dbe9 [ 281.785073][ T7155] RDX: 0000000000000020 RSI: 0000200000000380 RDI: 0000000000000012 [ 281.793067][ T7155] RBP: 00007f438c3b6090 R08: 0000000000000000 R09: 0000000000000000 [ 281.801476][ T7155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.809472][ T7155] R13: 00007f438db75038 R14: 00007f438db74fa0 R15: 00007ffd20684da8 [ 281.817483][ T7155] [ 282.166117][ T7162] FAULT_INJECTION: forcing a failure. [ 282.166117][ T7162] name failslab, interval 1, probability 0, space 0, times 0 [ 282.245836][ T7162] CPU: 0 PID: 7162 Comm: syz.4.2515 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 282.256228][ T7162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 282.266413][ T7162] Call Trace: [ 282.269943][ T7162] [ 282.272904][ T7162] __dump_stack+0x21/0x30 [ 282.277291][ T7162] dump_stack_lvl+0xee/0x150 [ 282.281987][ T7162] ? show_regs_print_info+0x20/0x20 [ 282.287231][ T7162] dump_stack+0x15/0x20 [ 282.291411][ T7162] should_fail+0x3c1/0x510 [ 282.295850][ T7162] __should_failslab+0xa4/0xe0 [ 282.300622][ T7162] should_failslab+0x9/0x20 [ 282.305145][ T7162] slab_pre_alloc_hook+0x3b/0xe0 [ 282.310093][ T7162] ? __d_alloc+0x2d/0x6a0 [ 282.314456][ T7162] kmem_cache_alloc+0x44/0x260 [ 282.319315][ T7162] __d_alloc+0x2d/0x6a0 [ 282.323734][ T7162] ? tipc_node_get_mtu+0x2b0/0x2b0 [ 282.328850][ T7162] d_alloc_pseudo+0x1d/0x70 [ 282.333378][ T7162] alloc_file_pseudo+0xc8/0x1f0 [ 282.338238][ T7162] ? alloc_empty_file_noaccount+0x80/0x80 [ 282.343965][ T7162] ? tipc_sk_finish_conn+0x571/0x7d0 [ 282.349347][ T7162] sock_alloc_file+0xba/0x260 [ 282.354024][ T7162] __sys_socketpair+0x2c3/0x590 [ 282.358967][ T7162] __x64_sys_socketpair+0x9b/0xb0 [ 282.363996][ T7162] x64_sys_call+0x36/0x9a0 [ 282.368525][ T7162] do_syscall_64+0x4c/0xa0 [ 282.372943][ T7162] ? clear_bhb_loop+0x50/0xa0 [ 282.377620][ T7162] ? clear_bhb_loop+0x50/0xa0 [ 282.382385][ T7162] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 282.388281][ T7162] RIP: 0033:0x7feb8924dbe9 [ 282.393051][ T7162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 282.413050][ T7162] RSP: 002b:00007feb87cb6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 282.421473][ T7162] RAX: ffffffffffffffda RBX: 00007feb89474fa0 RCX: 00007feb8924dbe9 [ 282.429448][ T7162] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 282.437724][ T7162] RBP: 00007feb87cb6090 R08: 0000000000000000 R09: 0000000000000000 [ 282.445697][ T7162] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.453669][ T7162] R13: 00007feb89475038 R14: 00007feb89474fa0 R15: 00007ffc19de6258 [ 282.461734][ T7162] [ 282.777935][ T7166] device syzkaller0 entered promiscuous mode [ 285.324549][ T7221] device wg2 left promiscuous mode [ 285.376582][ T7227] FAULT_INJECTION: forcing a failure. [ 285.376582][ T7227] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 285.415686][ T7227] CPU: 0 PID: 7227 Comm: syz.2.2539 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 285.425974][ T7227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 285.436069][ T7227] Call Trace: [ 285.439380][ T7227] [ 285.442377][ T7227] __dump_stack+0x21/0x30 [ 285.446949][ T7227] dump_stack_lvl+0xee/0x150 [ 285.451856][ T7227] ? show_regs_print_info+0x20/0x20 [ 285.457256][ T7227] ? format_decode+0x1bb/0x1520 [ 285.462234][ T7227] dump_stack+0x15/0x20 [ 285.466402][ T7227] should_fail+0x3c1/0x510 [ 285.470823][ T7227] should_fail_usercopy+0x1a/0x20 [ 285.476080][ T7227] _copy_from_user+0x20/0xd0 [ 285.480927][ T7227] kstrtouint_from_user+0xbe/0x200 [ 285.486526][ T7227] ? kstrtol_from_user+0x260/0x260 [ 285.491740][ T7227] ? perf_swevent_event+0xce/0x530 [ 285.497304][ T7227] ? debug_smp_processor_id+0x17/0x20 [ 285.503001][ T7227] ? perf_tp_event+0x8ae/0x990 [ 285.507793][ T7227] proc_fail_nth_write+0x85/0x1f0 [ 285.512866][ T7227] ? proc_fail_nth_read+0x210/0x210 [ 285.518102][ T7227] ? security_file_permission+0x79/0xa0 [ 285.523672][ T7227] ? security_file_permission+0x83/0xa0 [ 285.529376][ T7227] ? proc_fail_nth_read+0x210/0x210 [ 285.534796][ T7227] vfs_write+0x3ee/0xf70 [ 285.539157][ T7227] ? file_end_write+0x1b0/0x1b0 [ 285.544044][ T7227] ? __kasan_check_write+0x14/0x20 [ 285.549181][ T7227] ? mutex_lock+0x95/0x1a0 [ 285.553639][ T7227] ? wait_for_completion_killable_timeout+0x10/0x10 [ 285.560532][ T7227] ? __fget_files+0x2c4/0x320 [ 285.565499][ T7227] ? __fdget_pos+0x2d2/0x380 [ 285.570110][ T7227] ? ksys_write+0x71/0x240 [ 285.574636][ T7227] ksys_write+0x140/0x240 [ 285.579012][ T7227] ? __ia32_sys_read+0x90/0x90 [ 285.584195][ T7227] ? debug_smp_processor_id+0x17/0x20 [ 285.589647][ T7227] __x64_sys_write+0x7b/0x90 [ 285.594553][ T7227] x64_sys_call+0x8ef/0x9a0 [ 285.599339][ T7227] do_syscall_64+0x4c/0xa0 [ 285.604063][ T7227] ? clear_bhb_loop+0x50/0xa0 [ 285.608986][ T7227] ? clear_bhb_loop+0x50/0xa0 [ 285.614471][ T7227] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 285.620921][ T7227] RIP: 0033:0x7f2eb60bf69f [ 285.625444][ T7227] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 285.646247][ T7227] RSP: 002b:00007f2eb4b29030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 285.654683][ T7227] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2eb60bf69f [ 285.662935][ T7227] RDX: 0000000000000001 RSI: 00007f2eb4b290a0 RDI: 0000000000000008 [ 285.671156][ T7227] RBP: 00007f2eb4b29090 R08: 0000000000000000 R09: 0000000000000000 [ 285.679373][ T7227] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 285.687364][ T7227] R13: 00007f2eb62e8038 R14: 00007f2eb62e7fa0 R15: 00007ffeefa75698 [ 285.695382][ T7227] [ 285.709070][ T7226] device wg2 entered promiscuous mode [ 286.217570][ T7242] FAULT_INJECTION: forcing a failure. [ 286.217570][ T7242] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 286.293241][ T7242] CPU: 0 PID: 7242 Comm: syz.4.2546 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 286.303970][ T7242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 286.314216][ T7242] Call Trace: [ 286.317507][ T7242] [ 286.320447][ T7242] __dump_stack+0x21/0x30 [ 286.324788][ T7242] dump_stack_lvl+0xee/0x150 [ 286.329384][ T7242] ? show_regs_print_info+0x20/0x20 [ 286.335123][ T7242] ? vfs_write+0xc17/0xf70 [ 286.339649][ T7242] dump_stack+0x15/0x20 [ 286.344275][ T7242] should_fail+0x3c1/0x510 [ 286.349204][ T7242] should_fail_usercopy+0x1a/0x20 [ 286.355058][ T7242] _copy_from_user+0x20/0xd0 [ 286.359756][ T7242] __sys_bpf+0x233/0x730 [ 286.364282][ T7242] ? bpf_link_show_fdinfo+0x310/0x310 [ 286.369754][ T7242] ? debug_smp_processor_id+0x17/0x20 [ 286.375345][ T7242] __x64_sys_bpf+0x7c/0x90 [ 286.380343][ T7242] x64_sys_call+0x4b9/0x9a0 [ 286.385050][ T7242] do_syscall_64+0x4c/0xa0 [ 286.389566][ T7242] ? clear_bhb_loop+0x50/0xa0 [ 286.394442][ T7242] ? clear_bhb_loop+0x50/0xa0 [ 286.399217][ T7242] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 286.405299][ T7242] RIP: 0033:0x7feb8924dbe9 [ 286.409721][ T7242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.430335][ T7242] RSP: 002b:00007feb87cb6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 286.439493][ T7242] RAX: ffffffffffffffda RBX: 00007feb89474fa0 RCX: 00007feb8924dbe9 [ 286.447784][ T7242] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 286.455890][ T7242] RBP: 00007feb87cb6090 R08: 0000000000000000 R09: 0000000000000000 [ 286.463879][ T7242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.472211][ T7242] R13: 00007feb89475038 R14: 00007feb89474fa0 R15: 00007ffc19de6258 [ 286.480286][ T7242] [ 287.726959][ T7280] device syzkaller0 entered promiscuous mode [ 288.002869][ T7295] FAULT_INJECTION: forcing a failure. [ 288.002869][ T7295] name failslab, interval 1, probability 0, space 0, times 0 [ 288.055721][ T7295] CPU: 0 PID: 7295 Comm: syz.0.2566 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 288.066046][ T7295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 288.076125][ T7295] Call Trace: [ 288.079422][ T7295] [ 288.082407][ T7295] __dump_stack+0x21/0x30 [ 288.086751][ T7295] dump_stack_lvl+0xee/0x150 [ 288.091352][ T7295] ? show_regs_print_info+0x20/0x20 [ 288.096736][ T7295] dump_stack+0x15/0x20 [ 288.100900][ T7295] should_fail+0x3c1/0x510 [ 288.105334][ T7295] __should_failslab+0xa4/0xe0 [ 288.110130][ T7295] should_failslab+0x9/0x20 [ 288.114648][ T7295] slab_pre_alloc_hook+0x3b/0xe0 [ 288.119728][ T7295] kmem_cache_alloc_trace+0x48/0x270 [ 288.125018][ T7295] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 288.130834][ T7295] selinux_sk_alloc_security+0x7e/0x1a0 [ 288.136381][ T7295] security_sk_alloc+0x72/0xa0 [ 288.141164][ T7295] sk_prot_alloc+0x108/0x320 [ 288.145942][ T7295] sk_alloc+0x38/0x430 [ 288.150040][ T7295] bpf_prog_test_run_skb+0x24b/0x1150 [ 288.155720][ T7295] ? __kasan_check_write+0x14/0x20 [ 288.160878][ T7295] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 288.167148][ T7295] bpf_prog_test_run+0x3d5/0x620 [ 288.172104][ T7295] ? bpf_prog_query+0x230/0x230 [ 288.177003][ T7295] ? selinux_bpf+0xce/0xf0 [ 288.181450][ T7295] ? security_bpf+0x82/0xa0 [ 288.185969][ T7295] __sys_bpf+0x52c/0x730 [ 288.190239][ T7295] ? bpf_link_show_fdinfo+0x310/0x310 [ 288.195641][ T7295] ? debug_smp_processor_id+0x17/0x20 [ 288.201394][ T7295] __x64_sys_bpf+0x7c/0x90 [ 288.205931][ T7295] x64_sys_call+0x4b9/0x9a0 [ 288.210458][ T7295] do_syscall_64+0x4c/0xa0 [ 288.215011][ T7295] ? clear_bhb_loop+0x50/0xa0 [ 288.219698][ T7295] ? clear_bhb_loop+0x50/0xa0 [ 288.224385][ T7295] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 288.230379][ T7295] RIP: 0033:0x7f438d94dbe9 [ 288.234882][ T7295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 288.254938][ T7295] RSP: 002b:00007f438c3b6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 288.263476][ T7295] RAX: ffffffffffffffda RBX: 00007f438db74fa0 RCX: 00007f438d94dbe9 [ 288.271477][ T7295] RDX: 0000000000000048 RSI: 00002000000003c0 RDI: 000000000000000a [ 288.279452][ T7295] RBP: 00007f438c3b6090 R08: 0000000000000000 R09: 0000000000000000 [ 288.287711][ T7295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.295897][ T7295] R13: 00007f438db75038 R14: 00007f438db74fa0 R15: 00007ffd20684da8 [ 288.304358][ T7295] [ 288.586091][ T7315] device wg2 left promiscuous mode [ 288.752570][ T7321] device wg2 entered promiscuous mode [ 292.437894][ T7356] device wg2 left promiscuous mode [ 292.565725][ T7356] device wg2 entered promiscuous mode [ 294.335112][ T7379] FAULT_INJECTION: forcing a failure. [ 294.335112][ T7379] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 294.375817][ T7379] CPU: 0 PID: 7379 Comm: syz.0.2597 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 294.386251][ T7379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 294.396502][ T7379] Call Trace: [ 294.399794][ T7379] [ 294.402939][ T7379] __dump_stack+0x21/0x30 [ 294.407471][ T7379] dump_stack_lvl+0xee/0x150 [ 294.412164][ T7379] ? show_regs_print_info+0x20/0x20 [ 294.417369][ T7379] ? avc_has_perm+0x158/0x240 [ 294.422246][ T7379] dump_stack+0x15/0x20 [ 294.426424][ T7379] should_fail+0x3c1/0x510 [ 294.431235][ T7379] should_fail_alloc_page+0x55/0x80 [ 294.436587][ T7379] prepare_alloc_pages+0x156/0x600 [ 294.441814][ T7379] ? __alloc_pages_bulk+0xab0/0xab0 [ 294.447046][ T7379] ? 0xffffffffa0014c1c [ 294.451762][ T7379] ? is_bpf_text_address+0x177/0x190 [ 294.457289][ T7379] __alloc_pages+0x10a/0x440 [ 294.461979][ T7379] ? prep_new_page+0x110/0x110 [ 294.466755][ T7379] skb_page_frag_refill+0x202/0x3a0 [ 294.471994][ T7379] tun_get_user+0x785/0x33c0 [ 294.476773][ T7379] ? tun_do_read+0x1c40/0x1c40 [ 294.481571][ T7379] ? kstrtouint_from_user+0x1a0/0x200 [ 294.487536][ T7379] ? arch_irq_work_raise+0xc7/0xd0 [ 294.492690][ T7379] ? kstrtol_from_user+0x260/0x260 [ 294.497933][ T7379] ? bpf_ringbuf_discard+0x11c/0x170 [ 294.503351][ T7379] ? avc_policy_seqno+0x1b/0x70 [ 294.508324][ T7379] ? selinux_file_permission+0x2aa/0x510 [ 294.513987][ T7379] tun_chr_write_iter+0x1eb/0x2e0 [ 294.519151][ T7379] vfs_write+0x802/0xf70 [ 294.523494][ T7379] ? file_end_write+0x1b0/0x1b0 [ 294.528476][ T7379] ? __fget_files+0x2c4/0x320 [ 294.533318][ T7379] ? __fdget_pos+0x1f7/0x380 [ 294.540926][ T7379] ? ksys_write+0x71/0x240 [ 294.545374][ T7379] ksys_write+0x140/0x240 [ 294.549717][ T7379] ? __ia32_sys_read+0x90/0x90 [ 294.554499][ T7379] ? debug_smp_processor_id+0x17/0x20 [ 294.559982][ T7379] __x64_sys_write+0x7b/0x90 [ 294.564587][ T7379] x64_sys_call+0x8ef/0x9a0 [ 294.569280][ T7379] do_syscall_64+0x4c/0xa0 [ 294.573794][ T7379] ? clear_bhb_loop+0x50/0xa0 [ 294.578478][ T7379] ? clear_bhb_loop+0x50/0xa0 [ 294.583248][ T7379] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 294.589257][ T7379] RIP: 0033:0x7f438d94dbe9 [ 294.594581][ T7379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 294.614757][ T7379] RSP: 002b:00007f438c3b6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 294.623288][ T7379] RAX: ffffffffffffffda RBX: 00007f438db74fa0 RCX: 00007f438d94dbe9 [ 294.631357][ T7379] RDX: 0000000000000015 RSI: 0000200000000000 RDI: 00000000000000c8 [ 294.639473][ T7379] RBP: 00007f438c3b6090 R08: 0000000000000000 R09: 0000000000000000 [ 294.647885][ T7379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 294.656147][ T7379] R13: 00007f438db75038 R14: 00007f438db74fa0 R15: 00007ffd20684da8 [ 294.664359][ T7379] [ 294.698030][ T7388] device sit0 entered promiscuous mode [ 295.132192][ T7396] device syzkaller0 entered promiscuous mode [ 295.188003][ T7401] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 297.743998][ T7425] device syzkaller0 entered promiscuous mode [ 297.984765][ T7434] device syzkaller0 entered promiscuous mode [ 299.039677][ T7485] device wg2 entered promiscuous mode [ 299.054401][ T7495] FAULT_INJECTION: forcing a failure. [ 299.054401][ T7495] name failslab, interval 1, probability 0, space 0, times 0 [ 299.102148][ T7495] CPU: 0 PID: 7495 Comm: syz.5.2641 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 299.112354][ T7495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 299.122437][ T7495] Call Trace: [ 299.125733][ T7495] [ 299.128702][ T7495] __dump_stack+0x21/0x30 [ 299.133041][ T7495] dump_stack_lvl+0xee/0x150 [ 299.137640][ T7495] ? show_regs_print_info+0x20/0x20 [ 299.142845][ T7495] dump_stack+0x15/0x20 [ 299.147028][ T7495] should_fail+0x3c1/0x510 [ 299.151456][ T7495] __should_failslab+0xa4/0xe0 [ 299.156423][ T7495] should_failslab+0x9/0x20 [ 299.161044][ T7495] slab_pre_alloc_hook+0x3b/0xe0 [ 299.165994][ T7495] __kmalloc+0x6d/0x2c0 [ 299.170240][ T7495] ? sk_prot_alloc+0xed/0x320 [ 299.174925][ T7495] ? check_stack_object+0x81/0x140 [ 299.180047][ T7495] sk_prot_alloc+0xed/0x320 [ 299.184663][ T7495] sk_alloc+0x38/0x430 [ 299.188735][ T7495] bpf_prog_test_run_skb+0x24b/0x1150 [ 299.194283][ T7495] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 299.201250][ T7495] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 299.207274][ T7495] ? bpf_prog_test_run+0x3c7/0x620 [ 299.212659][ T7495] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 299.218555][ T7495] bpf_prog_test_run+0x3d5/0x620 [ 299.223495][ T7495] ? bpf_prog_query+0x230/0x230 [ 299.228368][ T7495] ? selinux_bpf+0xce/0xf0 [ 299.232821][ T7495] ? security_bpf+0x82/0xa0 [ 299.237512][ T7495] __sys_bpf+0x52c/0x730 [ 299.241754][ T7495] ? bpf_link_show_fdinfo+0x310/0x310 [ 299.247213][ T7495] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 299.253459][ T7495] __x64_sys_bpf+0x7c/0x90 [ 299.257882][ T7495] x64_sys_call+0x4b9/0x9a0 [ 299.262402][ T7495] do_syscall_64+0x4c/0xa0 [ 299.266853][ T7495] ? clear_bhb_loop+0x50/0xa0 [ 299.271543][ T7495] ? clear_bhb_loop+0x50/0xa0 [ 299.276573][ T7495] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 299.282497][ T7495] RIP: 0033:0x7f2781a09be9 [ 299.287022][ T7495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 299.306808][ T7495] RSP: 002b:00007f2780472038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 299.315243][ T7495] RAX: ffffffffffffffda RBX: 00007f2781c30fa0 RCX: 00007f2781a09be9 [ 299.323230][ T7495] RDX: 0000000000000048 RSI: 00002000000003c0 RDI: 000000000000000a [ 299.331217][ T7495] RBP: 00007f2780472090 R08: 0000000000000000 R09: 0000000000000000 [ 299.339305][ T7495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 299.347385][ T7495] R13: 00007f2781c31038 R14: 00007f2781c30fa0 R15: 00007fff75023078 [ 299.355406][ T7495] [ 300.112889][ T7537] FAULT_INJECTION: forcing a failure. [ 300.112889][ T7537] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 300.173077][ T7537] CPU: 0 PID: 7537 Comm: syz.4.2658 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 300.183297][ T7537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 300.193417][ T7537] Call Trace: [ 300.196735][ T7537] [ 300.199698][ T7537] __dump_stack+0x21/0x30 [ 300.204062][ T7537] dump_stack_lvl+0xee/0x150 [ 300.208812][ T7537] ? show_regs_print_info+0x20/0x20 [ 300.214202][ T7537] dump_stack+0x15/0x20 [ 300.218573][ T7537] should_fail+0x3c1/0x510 [ 300.223003][ T7537] should_fail_alloc_page+0x55/0x80 [ 300.228392][ T7537] prepare_alloc_pages+0x156/0x600 [ 300.233520][ T7537] ? __alloc_pages_bulk+0xab0/0xab0 [ 300.238926][ T7537] ? slab_post_alloc_hook+0x4f/0x2b0 [ 300.244341][ T7537] ? alloc_vmap_area+0x17a/0x1990 [ 300.249504][ T7537] ? __get_vm_area_node+0x14e/0x350 [ 300.254711][ T7537] ? __vmalloc_node_range+0xdf/0xaf0 [ 300.260186][ T7537] ? dev_map_alloc+0x24c/0x560 [ 300.265177][ T7537] __alloc_pages+0x10a/0x440 [ 300.269977][ T7537] ? prep_new_page+0x110/0x110 [ 300.274880][ T7537] ? __kasan_check_write+0x14/0x20 [ 300.280219][ T7537] __get_free_pages+0x10/0x30 [ 300.285018][ T7537] kasan_populate_vmalloc_pte+0x29/0x120 [ 300.290702][ T7537] __apply_to_page_range+0x8b0/0xbf0 [ 300.296194][ T7537] ? kasan_populate_vmalloc+0x70/0x70 [ 300.301785][ T7537] ? kasan_populate_vmalloc+0x70/0x70 [ 300.307287][ T7537] apply_to_page_range+0x3b/0x50 [ 300.312354][ T7537] kasan_populate_vmalloc+0x60/0x70 [ 300.317585][ T7537] alloc_vmap_area+0x185c/0x1990 [ 300.322728][ T7537] ? vm_map_ram+0xa60/0xa60 [ 300.327478][ T7537] ? kmem_cache_alloc_trace+0x119/0x270 [ 300.333418][ T7537] __get_vm_area_node+0x14e/0x350 [ 300.338454][ T7537] __vmalloc_node_range+0xdf/0xaf0 [ 300.343712][ T7537] ? dev_map_alloc+0x24c/0x560 [ 300.348810][ T7537] bpf_map_area_alloc+0xd5/0xe0 [ 300.353739][ T7537] ? dev_map_alloc+0x24c/0x560 [ 300.358547][ T7537] dev_map_alloc+0x24c/0x560 [ 300.363153][ T7537] map_create+0x455/0x21b0 [ 300.367598][ T7537] __sys_bpf+0x2cf/0x730 [ 300.371978][ T7537] ? bpf_link_show_fdinfo+0x310/0x310 [ 300.377488][ T7537] ? debug_smp_processor_id+0x17/0x20 [ 300.382877][ T7537] __x64_sys_bpf+0x7c/0x90 [ 300.387536][ T7537] x64_sys_call+0x4b9/0x9a0 [ 300.392526][ T7537] do_syscall_64+0x4c/0xa0 [ 300.397076][ T7537] ? clear_bhb_loop+0x50/0xa0 [ 300.401831][ T7537] ? clear_bhb_loop+0x50/0xa0 [ 300.406813][ T7537] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 300.412990][ T7537] RIP: 0033:0x7feb8924dbe9 [ 300.417555][ T7537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 300.437356][ T7537] RSP: 002b:00007feb87cb6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 300.446125][ T7537] RAX: ffffffffffffffda RBX: 00007feb89474fa0 RCX: 00007feb8924dbe9 [ 300.454341][ T7537] RDX: 0000000000000050 RSI: 0000200000000bc0 RDI: 0000000000000000 [ 300.462342][ T7537] RBP: 00007feb87cb6090 R08: 0000000000000000 R09: 0000000000000000 [ 300.470334][ T7537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 300.478620][ T7537] R13: 00007feb89475038 R14: 00007feb89474fa0 R15: 00007ffc19de6258 [ 300.486780][ T7537] [ 301.156344][ T7572] FAULT_INJECTION: forcing a failure. [ 301.156344][ T7572] name failslab, interval 1, probability 0, space 0, times 0 [ 301.169232][ T7572] CPU: 1 PID: 7572 Comm: syz.2.2672 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 301.179414][ T7572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 301.189684][ T7572] Call Trace: [ 301.192988][ T7572] [ 301.195941][ T7572] __dump_stack+0x21/0x30 [ 301.200308][ T7572] dump_stack_lvl+0xee/0x150 [ 301.205327][ T7572] ? show_regs_print_info+0x20/0x20 [ 301.210658][ T7572] dump_stack+0x15/0x20 [ 301.214884][ T7572] should_fail+0x3c1/0x510 [ 301.219440][ T7572] __should_failslab+0xa4/0xe0 [ 301.224343][ T7572] should_failslab+0x9/0x20 [ 301.228880][ T7572] slab_pre_alloc_hook+0x3b/0xe0 [ 301.234033][ T7572] ? __alloc_skb+0xe0/0x740 [ 301.238565][ T7572] kmem_cache_alloc+0x44/0x260 [ 301.243487][ T7572] __alloc_skb+0xe0/0x740 [ 301.248051][ T7572] __neigh_notify+0x84/0x130 [ 301.252770][ T7572] neigh_cleanup_and_release+0x2c/0x1a0 [ 301.258459][ T7572] neigh_flush_dev+0x6af/0x840 [ 301.263242][ T7572] neigh_changeaddr+0x30/0x40 [ 301.268070][ T7572] ndisc_netdev_event+0x10b/0x3e0 [ 301.273802][ T7572] raw_notifier_call_chain+0x90/0x100 [ 301.279180][ T7572] dev_set_mac_address+0x318/0x420 [ 301.284381][ T7572] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 301.290290][ T7572] dev_set_mac_address_user+0x31/0x50 [ 301.295944][ T7572] dev_ifsioc+0x757/0xe70 [ 301.300711][ T7572] ? dev_ioctl+0xd10/0xd10 [ 301.305215][ T7572] ? __kasan_check_write+0x14/0x20 [ 301.310557][ T7572] ? mutex_lock+0x95/0x1a0 [ 301.314978][ T7572] ? wait_for_completion_killable_timeout+0x10/0x10 [ 301.321579][ T7572] ? dev_get_by_name_rcu+0xc8/0xf0 [ 301.326699][ T7572] dev_ioctl+0x560/0xd10 [ 301.330963][ T7572] sock_do_ioctl+0x22e/0x300 [ 301.335569][ T7572] ? sock_show_fdinfo+0xa0/0xa0 [ 301.340425][ T7572] ? selinux_file_ioctl+0x377/0x480 [ 301.345670][ T7572] sock_ioctl+0x4bc/0x6b0 [ 301.350007][ T7572] ? sock_poll+0x3d0/0x3d0 [ 301.354435][ T7572] ? __fget_files+0x2c4/0x320 [ 301.359120][ T7572] ? security_file_ioctl+0x84/0xa0 [ 301.364245][ T7572] ? sock_poll+0x3d0/0x3d0 [ 301.368687][ T7572] __se_sys_ioctl+0x121/0x1a0 [ 301.373376][ T7572] __x64_sys_ioctl+0x7b/0x90 [ 301.378043][ T7572] x64_sys_call+0x2f/0x9a0 [ 301.382606][ T7572] do_syscall_64+0x4c/0xa0 [ 301.387045][ T7572] ? clear_bhb_loop+0x50/0xa0 [ 301.391734][ T7572] ? clear_bhb_loop+0x50/0xa0 [ 301.396423][ T7572] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 301.402408][ T7572] RIP: 0033:0x7f2eb60c0be9 [ 301.406826][ T7572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 301.426612][ T7572] RSP: 002b:00007f2eb4b29038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.435053][ T7572] RAX: ffffffffffffffda RBX: 00007f2eb62e7fa0 RCX: 00007f2eb60c0be9 [ 301.443117][ T7572] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 301.451299][ T7572] RBP: 00007f2eb4b29090 R08: 0000000000000000 R09: 0000000000000000 [ 301.459278][ T7572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 301.467355][ T7572] R13: 00007f2eb62e8038 R14: 00007f2eb62e7fa0 R15: 00007ffeefa75698 [ 301.475361][ T7572] [ 301.695871][ T7579] FAULT_INJECTION: forcing a failure. [ 301.695871][ T7579] name failslab, interval 1, probability 0, space 0, times 0 [ 301.776638][ T7579] CPU: 1 PID: 7579 Comm: syz.2.2676 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 301.787061][ T7579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 301.797690][ T7579] Call Trace: [ 301.801031][ T7579] [ 301.803976][ T7579] __dump_stack+0x21/0x30 [ 301.808346][ T7579] dump_stack_lvl+0xee/0x150 [ 301.812986][ T7579] ? show_regs_print_info+0x20/0x20 [ 301.818215][ T7579] dump_stack+0x15/0x20 [ 301.822681][ T7579] should_fail+0x3c1/0x510 [ 301.827431][ T7579] __should_failslab+0xa4/0xe0 [ 301.832693][ T7579] should_failslab+0x9/0x20 [ 301.837320][ T7579] slab_pre_alloc_hook+0x3b/0xe0 [ 301.842545][ T7579] kmem_cache_alloc_trace+0x48/0x270 [ 301.847964][ T7579] ? process_preds+0xc67/0x3940 [ 301.853030][ T7579] process_preds+0xc67/0x3940 [ 301.858124][ T7579] ? create_filter_start+0x2d0/0x2d0 [ 301.863445][ T7579] ? kmem_cache_alloc_trace+0x119/0x270 [ 301.869411][ T7579] ? create_filter_start+0x151/0x2d0 [ 301.874765][ T7579] ? create_filter_start+0x21b/0x2d0 [ 301.880618][ T7579] ftrace_profile_set_filter+0x108/0x2c0 [ 301.887115][ T7579] perf_ioctl+0x948/0x1e70 [ 301.892419][ T7579] ? memcpy+0x56/0x70 [ 301.896626][ T7579] ? ioctl_has_perm+0x3eb/0x4d0 [ 301.902330][ T7579] ? has_cap_mac_admin+0x330/0x330 [ 301.907861][ T7579] ? perf_poll+0x1b0/0x1b0 [ 301.912592][ T7579] ? vfs_write+0xc17/0xf70 [ 301.917076][ T7579] ? selinux_file_ioctl+0x377/0x480 [ 301.922307][ T7579] ? selinux_file_alloc_security+0x120/0x120 [ 301.928485][ T7579] ? mutex_unlock+0x89/0x220 [ 301.933195][ T7579] ? __mutex_lock_slowpath+0x10/0x10 [ 301.938706][ T7579] ? __fget_files+0x2c4/0x320 [ 301.943424][ T7579] ? security_file_ioctl+0x84/0xa0 [ 301.948656][ T7579] ? perf_poll+0x1b0/0x1b0 [ 301.953187][ T7579] __se_sys_ioctl+0x121/0x1a0 [ 301.958158][ T7579] __x64_sys_ioctl+0x7b/0x90 [ 301.962876][ T7579] x64_sys_call+0x2f/0x9a0 [ 301.967350][ T7579] do_syscall_64+0x4c/0xa0 [ 301.971893][ T7579] ? clear_bhb_loop+0x50/0xa0 [ 301.976784][ T7579] ? clear_bhb_loop+0x50/0xa0 [ 301.981561][ T7579] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 301.987582][ T7579] RIP: 0033:0x7f2eb60c0be9 [ 301.992383][ T7579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 302.012547][ T7579] RSP: 002b:00007f2eb4b29038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 302.021107][ T7579] RAX: ffffffffffffffda RBX: 00007f2eb62e7fa0 RCX: 00007f2eb60c0be9 [ 302.029196][ T7579] RDX: 00002000000001c0 RSI: 0000000040082406 RDI: 0000000000000005 [ 302.037260][ T7579] RBP: 00007f2eb4b29090 R08: 0000000000000000 R09: 0000000000000000 [ 302.045418][ T7579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 302.053511][ T7579] R13: 00007f2eb62e8038 R14: 00007f2eb62e7fa0 R15: 00007ffeefa75698 [ 302.061754][ T7579] [ 302.096709][ T7594] device wg2 left promiscuous mode [ 302.322918][ T7594] device wg2 entered promiscuous mode [ 302.554939][ T7614] device wg2 left promiscuous mode [ 302.721365][ T7617] device wg2 entered promiscuous mode [ 303.095239][ T7622] FAULT_INJECTION: forcing a failure. [ 303.095239][ T7622] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 303.129025][ T7622] CPU: 1 PID: 7622 Comm: syz.1.2691 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 303.139432][ T7622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 303.149521][ T7622] Call Trace: [ 303.152825][ T7622] [ 303.155782][ T7622] __dump_stack+0x21/0x30 [ 303.160233][ T7622] dump_stack_lvl+0xee/0x150 [ 303.164849][ T7622] ? show_regs_print_info+0x20/0x20 [ 303.170081][ T7622] dump_stack+0x15/0x20 [ 303.174280][ T7622] should_fail+0x3c1/0x510 [ 303.179026][ T7622] should_fail_usercopy+0x1a/0x20 [ 303.184224][ T7622] _copy_to_user+0x20/0x90 [ 303.188724][ T7622] simple_read_from_buffer+0xe9/0x160 [ 303.194139][ T7622] proc_fail_nth_read+0x19a/0x210 [ 303.199232][ T7622] ? proc_fault_inject_write+0x2f0/0x2f0 [ 303.205003][ T7622] ? security_file_permission+0x83/0xa0 [ 303.210672][ T7622] ? proc_fault_inject_write+0x2f0/0x2f0 [ 303.216433][ T7622] vfs_read+0x282/0xbe0 [ 303.220629][ T7622] ? kernel_read+0x1f0/0x1f0 [ 303.225256][ T7622] ? __kasan_check_write+0x14/0x20 [ 303.230665][ T7622] ? mutex_lock+0x95/0x1a0 [ 303.235285][ T7622] ? wait_for_completion_killable_timeout+0x10/0x10 [ 303.242232][ T7622] ? __fget_files+0x2c4/0x320 [ 303.246953][ T7622] ? __fdget_pos+0x2d2/0x380 [ 303.251578][ T7622] ? ksys_read+0x71/0x240 [ 303.255943][ T7622] ksys_read+0x140/0x240 [ 303.260228][ T7622] ? vfs_write+0xf70/0xf70 [ 303.264769][ T7622] ? debug_smp_processor_id+0x17/0x20 [ 303.270174][ T7622] __x64_sys_read+0x7b/0x90 [ 303.274705][ T7622] x64_sys_call+0x96d/0x9a0 [ 303.279234][ T7622] do_syscall_64+0x4c/0xa0 [ 303.283845][ T7622] ? clear_bhb_loop+0x50/0xa0 [ 303.288559][ T7622] ? clear_bhb_loop+0x50/0xa0 [ 303.293349][ T7622] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 303.299277][ T7622] RIP: 0033:0x7fa5614da5fc [ 303.303727][ T7622] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 303.324297][ T7622] RSP: 002b:00007fa55ff44030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 303.332835][ T7622] RAX: ffffffffffffffda RBX: 00007fa561702fa0 RCX: 00007fa5614da5fc [ 303.340869][ T7622] RDX: 000000000000000f RSI: 00007fa55ff440a0 RDI: 0000000000000007 [ 303.348866][ T7622] RBP: 00007fa55ff44090 R08: 0000000000000000 R09: 0000000000000000 [ 303.357132][ T7622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 303.365368][ T7622] R13: 00007fa561703038 R14: 00007fa561702fa0 R15: 00007ffdf9267898 [ 303.373604][ T7622] [ 303.726077][ T7649] device wg2 left promiscuous mode [ 304.318253][ T7649] device wg2 entered promiscuous mode [ 304.532507][ T7694] device wg2 left promiscuous mode [ 304.702194][ T7702] device wg2 left promiscuous mode [ 304.721560][ T7694] device wg2 entered promiscuous mode [ 304.806796][ T7702] device wg2 entered promiscuous mode [ 308.336100][ T7794] FAULT_INJECTION: forcing a failure. [ 308.336100][ T7794] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 308.493433][ T7794] CPU: 0 PID: 7794 Comm: syz.2.2756 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 308.503741][ T7794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 308.513825][ T7794] Call Trace: [ 308.517242][ T7794] [ 308.520374][ T7794] __dump_stack+0x21/0x30 [ 308.524730][ T7794] dump_stack_lvl+0xee/0x150 [ 308.529782][ T7794] ? show_regs_print_info+0x20/0x20 [ 308.535023][ T7794] ? __kernel_text_address+0xa0/0x100 [ 308.540881][ T7794] ? unwind_get_return_address+0x4d/0x90 [ 308.546542][ T7794] dump_stack+0x15/0x20 [ 308.550726][ T7794] should_fail+0x3c1/0x510 [ 308.555344][ T7794] should_fail_alloc_page+0x55/0x80 [ 308.560745][ T7794] prepare_alloc_pages+0x156/0x600 [ 308.565974][ T7794] ? __alloc_pages_bulk+0xab0/0xab0 [ 308.571201][ T7794] __alloc_pages+0x10a/0x440 [ 308.576056][ T7794] ? __sys_bpf+0x2cf/0x730 [ 308.580588][ T7794] ? __x64_sys_bpf+0x7c/0x90 [ 308.585386][ T7794] ? prep_new_page+0x110/0x110 [ 308.590179][ T7794] __alloc_pages_bulk+0x47f/0xab0 [ 308.595223][ T7794] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 308.600794][ T7794] ? __vmalloc_node_range+0x375/0xaf0 [ 308.606287][ T7794] __vmalloc_node_range+0x450/0xaf0 [ 308.611688][ T7794] bpf_map_area_alloc+0xd5/0xe0 [ 308.616561][ T7794] ? htab_map_alloc+0xb29/0x14f0 [ 308.621624][ T7794] htab_map_alloc+0xb29/0x14f0 [ 308.626521][ T7794] map_create+0x455/0x21b0 [ 308.631141][ T7794] __sys_bpf+0x2cf/0x730 [ 308.635474][ T7794] ? bpf_link_show_fdinfo+0x310/0x310 [ 308.640855][ T7794] ? debug_smp_processor_id+0x17/0x20 [ 308.646333][ T7794] __x64_sys_bpf+0x7c/0x90 [ 308.650863][ T7794] x64_sys_call+0x4b9/0x9a0 [ 308.655382][ T7794] do_syscall_64+0x4c/0xa0 [ 308.659838][ T7794] ? clear_bhb_loop+0x50/0xa0 [ 308.664531][ T7794] ? clear_bhb_loop+0x50/0xa0 [ 308.669398][ T7794] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 308.675467][ T7794] RIP: 0033:0x7f2eb60c0be9 [ 308.679931][ T7794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 308.699565][ T7794] RSP: 002b:00007f2eb4b29038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 308.708647][ T7794] RAX: ffffffffffffffda RBX: 00007f2eb62e7fa0 RCX: 00007f2eb60c0be9 [ 308.717115][ T7794] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 308.725184][ T7794] RBP: 00007f2eb4b29090 R08: 0000000000000000 R09: 0000000000000000 [ 308.733259][ T7794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.741362][ T7794] R13: 00007f2eb62e8038 R14: 00007f2eb62e7fa0 R15: 00007ffeefa75698 [ 308.749386][ T7794] [ 309.515442][ T7820] device wg2 entered promiscuous mode [ 311.733631][ T7843] device wg2 left promiscuous mode [ 312.013473][ T7843] device wg2 entered promiscuous mode [ 312.186665][ T7867] device wg2 left promiscuous mode [ 312.511000][ T7877] device wg2 left promiscuous mode [ 312.599018][ T7880] device wg2 left promiscuous mode [ 312.615895][ T7867] device wg2 entered promiscuous mode [ 312.908921][ T7883] device wg2 entered promiscuous mode [ 313.119007][ T7901] device wg2 left promiscuous mode [ 313.181210][ T7901] device wg2 entered promiscuous mode [ 314.400293][ T7938] device wg2 left promiscuous mode [ 314.597938][ T7938] device wg2 entered promiscuous mode [ 316.440969][ T8004] device wg2 left promiscuous mode [ 316.724997][ T8007] device wg2 entered promiscuous mode [ 316.897730][ T8014] device wg2 left promiscuous mode [ 316.937606][ T8012] device wg2 left promiscuous mode [ 317.075231][ T8017] device wg2 entered promiscuous mode [ 317.529469][ T8028] device wg2 entered promiscuous mode [ 317.777757][ T8041] device wg2 left promiscuous mode [ 317.976052][ T8041] device wg2 entered promiscuous mode [ 318.286681][ T8039] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.333076][ T8039] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.346574][ T8039] device bridge_slave_0 entered promiscuous mode [ 318.388621][ T8039] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.405619][ T8039] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.479920][ T8039] device bridge_slave_1 entered promiscuous mode [ 319.367183][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 319.385293][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.439174][ T45] device bridge_slave_1 left promiscuous mode [ 319.448161][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.467561][ T45] device bridge_slave_0 left promiscuous mode [ 319.485713][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.496692][ T45] device veth0_vlan left promiscuous mode [ 319.904310][ T8089] device wg2 left promiscuous mode [ 319.925481][ T8095] device wg2 entered promiscuous mode [ 319.988585][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.005996][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.028369][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.035672][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.044039][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.052753][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.061702][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.069152][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.120097][ T8105] device wg2 left promiscuous mode [ 320.132439][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.177049][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 320.195852][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.204231][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 320.212652][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.240168][ T8105] device wg2 entered promiscuous mode [ 320.268135][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 320.278913][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 320.349939][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 320.434160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.484010][ T8039] device veth0_vlan entered promiscuous mode [ 320.554873][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.595198][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.681342][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 320.720826][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.779751][ T8039] device veth1_macvtap entered promiscuous mode [ 320.915321][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 320.951521][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 320.971153][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 320.985974][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 320.994599][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.839662][ T8142] device wg2 left promiscuous mode [ 321.972895][ T8150] device wg2 left promiscuous mode [ 322.117619][ T8153] device wg2 entered promiscuous mode [ 322.385644][ T8142] device wg2 entered promiscuous mode [ 323.589234][ T8186] device wg2 left promiscuous mode [ 323.653239][ T8188] device wg2 entered promiscuous mode [ 323.710008][ T8194] device wg2 entered promiscuous mode [ 325.141392][ T8239] device pim6reg1 entered promiscuous mode [ 325.398837][ T8251] device wg2 entered promiscuous mode [ 326.573831][ T8295] device wg2 left promiscuous mode [ 326.665136][ T8295] device wg2 entered promiscuous mode [ 326.933064][ T8307] device syzkaller0 entered promiscuous mode [ 327.046097][ T8300] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.053292][ T8300] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.131187][ T8300] device bridge_slave_0 entered promiscuous mode [ 327.154062][ T8300] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.172255][ T8300] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.211734][ T8300] device bridge_slave_1 entered promiscuous mode [ 327.219067][ T8316] device wg2 left promiscuous mode [ 327.246788][ T8320] device wg2 entered promiscuous mode [ 327.386910][ T8327] device wg2 left promiscuous mode [ 327.516522][ T8334] device wg2 entered promiscuous mode [ 328.421193][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 328.437564][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 328.575342][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 328.593216][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 328.621705][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.628852][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.637437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 328.650249][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 328.658955][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.666102][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.767856][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.775926][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 328.784088][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.903997][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 328.924121][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 328.991763][ T1695] device bridge_slave_1 left promiscuous mode [ 328.998749][ T1695] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.042625][ T1695] device bridge_slave_0 left promiscuous mode [ 329.049155][ T1695] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.160678][ T8392] device wg2 left promiscuous mode [ 329.195838][ T8396] device wg2 entered promiscuous mode [ 329.226904][ T8300] device veth0_vlan entered promiscuous mode [ 329.235688][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 329.252487][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.336842][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.352814][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.400115][ T8407] FAULT_INJECTION: forcing a failure. [ 329.400115][ T8407] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 329.415077][ T8407] CPU: 1 PID: 8407 Comm: syz.1.2978 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 329.425585][ T8407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 329.435689][ T8407] Call Trace: [ 329.439103][ T8407] [ 329.442341][ T8407] __dump_stack+0x21/0x30 [ 329.446879][ T8407] dump_stack_lvl+0xee/0x150 [ 329.451570][ T8407] ? show_regs_print_info+0x20/0x20 [ 329.456960][ T8407] ? __kasan_check_write+0x14/0x20 [ 329.462516][ T8407] dump_stack+0x15/0x20 [ 329.467040][ T8407] should_fail+0x3c1/0x510 [ 329.471809][ T8407] should_fail_usercopy+0x1a/0x20 [ 329.476944][ T8407] copyin+0x21/0xb0 [ 329.480958][ T8407] copy_page_from_iter+0x559/0x680 [ 329.486297][ T8407] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 329.492809][ T8407] unix_stream_sendmsg+0x66b/0xc80 [ 329.498441][ T8407] ? unix_show_fdinfo+0xa0/0xa0 [ 329.504032][ T8407] ? refcount_dec_and_lock_irqsave+0xd1/0x100 [ 329.510986][ T8407] ? security_socket_sendmsg+0x82/0xa0 [ 329.517012][ T8407] ? unix_show_fdinfo+0xa0/0xa0 [ 329.522145][ T8407] ____sys_sendmsg+0x5a2/0x8c0 [ 329.527310][ T8407] ? __sys_sendmsg_sock+0x40/0x40 [ 329.532544][ T8407] ? import_iovec+0x7c/0xb0 [ 329.538006][ T8407] ___sys_sendmsg+0x1f0/0x260 [ 329.542879][ T8407] ? __sys_sendmsg+0x250/0x250 [ 329.548286][ T8407] ? __fdget+0x1a1/0x230 [ 329.552753][ T8407] __x64_sys_sendmsg+0x1e2/0x2a0 [ 329.558579][ T8407] ? ___sys_sendmsg+0x260/0x260 [ 329.563586][ T8407] ? ksys_write+0x1eb/0x240 [ 329.568214][ T8407] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 329.574912][ T8407] x64_sys_call+0x4b/0x9a0 [ 329.579439][ T8407] do_syscall_64+0x4c/0xa0 [ 329.584153][ T8407] ? clear_bhb_loop+0x50/0xa0 [ 329.588855][ T8407] ? clear_bhb_loop+0x50/0xa0 [ 329.593547][ T8407] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 329.599616][ T8407] RIP: 0033:0x7fa5614dbbe9 [ 329.604042][ T8407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 329.624125][ T8407] RSP: 002b:00007fa55ff44038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 329.632667][ T8407] RAX: ffffffffffffffda RBX: 00007fa561702fa0 RCX: 00007fa5614dbbe9 [ 329.640665][ T8407] RDX: 0000000000000000 RSI: 0000200000000980 RDI: 0000000000000006 [ 329.648648][ T8407] RBP: 00007fa55ff44090 R08: 0000000000000000 R09: 0000000000000000 [ 329.656727][ T8407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 329.664795][ T8407] R13: 00007fa561703038 R14: 00007fa561702fa0 R15: 00007ffdf9267898 [ 329.673168][ T8407] [ 329.745164][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 329.753680][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 329.842142][ T8300] device veth1_macvtap entered promiscuous mode [ 329.851128][ T8414] device wg2 left promiscuous mode [ 329.899971][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 329.944354][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 330.039406][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 330.068496][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 330.099882][ T8414] device wg2 entered promiscuous mode [ 330.516389][ T8432] device wg2 left promiscuous mode [ 330.543943][ T8434] device wg2 entered promiscuous mode [ 330.929187][ T8433] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.936812][ T8433] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.944471][ T8433] device bridge_slave_0 entered promiscuous mode [ 330.952142][ T8433] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.959805][ T8433] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.968404][ T8433] device bridge_slave_1 entered promiscuous mode [ 333.024142][ T30] audit: type=1400 audit(1754685509.644:152): avc: denied { write } for pid=8451 comm="syz.2.2993" name="cgroup.subtree_control" dev="cgroup2" ino=191 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 333.056597][ T30] audit: type=1400 audit(1754685509.674:153): avc: denied { open } for pid=8451 comm="syz.2.2993" path="" dev="cgroup2" ino=191 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 333.086679][ T30] audit: type=1400 audit(1754685509.704:154): avc: denied { ioctl } for pid=8451 comm="syz.2.2993" path="" dev="cgroup2" ino=191 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 333.497622][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 333.506485][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 333.543483][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 333.553809][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 333.562565][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.569807][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.586259][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.595086][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.603841][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.611242][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.619329][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.627689][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.746669][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.964529][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 334.005494][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 334.033454][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 334.041887][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.050758][ T8433] device veth0_vlan entered promiscuous mode [ 334.066429][ T8433] device veth1_macvtap entered promiscuous mode [ 334.123574][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 334.142454][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.185952][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 334.226348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 334.265728][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 334.296039][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 334.336076][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 334.345957][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 334.354959][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 335.199074][ T1695] GPL: port 1(erspan0) entered disabled state [ 335.223568][ T1695] device erspan0 left promiscuous mode [ 335.235600][ T1695] GPL: port 1(erspan0) entered disabled state [ 335.279065][ T1695] device gretap0 left promiscuous mode [ 335.284662][ T1695] bridge0: port 3(gretap0) entered disabled state [ 335.542858][ T1695] device macsec0 left promiscuous mode [ 335.548766][ T1695] GPL: port 2(macsec0) entered disabled state [ 335.606190][ T1695] device bridge_slave_1 left promiscuous mode [ 335.647943][ T1695] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.786204][ T1695] device bridge_slave_0 left promiscuous mode [ 335.854541][ T1695] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.982357][ T1695] device veth0_vlan left promiscuous mode [ 336.592772][ T8522] GPL: port 1(erspan0) entered blocking state [ 336.706366][ T8522] GPL: port 1(erspan0) entered disabled state [ 336.713337][ T8522] device erspan0 entered promiscuous mode [ 336.762298][ T8523] GPL: port 1(erspan0) entered blocking state [ 336.768558][ T8523] GPL: port 1(erspan0) entered forwarding state [ 338.391163][ T8563] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.440810][ T8563] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.489409][ T8563] device bridge_slave_0 entered promiscuous mode [ 338.518420][ T8579] device wg2 left promiscuous mode [ 338.578955][ T8563] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.588086][ T8563] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.596127][ T8563] device bridge_slave_1 entered promiscuous mode [ 338.931555][ T8579] device wg2 entered promiscuous mode [ 338.988532][ T8590] device veth1_macvtap left promiscuous mode [ 339.293312][ T1695] bridge0: port 3(gretap0) entered disabled state [ 339.341327][ T1695] device gretap0 left promiscuous mode [ 339.355493][ T1695] bridge0: port 3(gretap0) entered disabled state [ 339.810857][ T1695] device bridge_slave_1 left promiscuous mode [ 339.817382][ T1695] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.843709][ T8616] FAULT_INJECTION: forcing a failure. [ 339.843709][ T8616] name failslab, interval 1, probability 0, space 0, times 0 [ 339.849949][ T1695] device bridge_slave_0 left promiscuous mode [ 339.865325][ T8616] CPU: 0 PID: 8616 Comm: syz.2.3048 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 339.875655][ T8616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 339.886015][ T8616] Call Trace: [ 339.889318][ T8616] [ 339.892271][ T8616] __dump_stack+0x21/0x30 [ 339.893548][ T1695] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.896629][ T8616] dump_stack_lvl+0xee/0x150 [ 339.896654][ T8616] ? show_regs_print_info+0x20/0x20 [ 339.913494][ T8616] dump_stack+0x15/0x20 [ 339.917907][ T8616] should_fail+0x3c1/0x510 [ 339.922358][ T8616] __should_failslab+0xa4/0xe0 [ 339.927241][ T8616] should_failslab+0x9/0x20 [ 339.931777][ T8616] slab_pre_alloc_hook+0x3b/0xe0 [ 339.936752][ T8616] kmem_cache_alloc_trace+0x48/0x270 [ 339.942076][ T8616] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 339.947955][ T8616] selinux_sk_alloc_security+0x7e/0x1a0 [ 339.953534][ T8616] security_sk_alloc+0x72/0xa0 [ 339.958336][ T8616] sk_prot_alloc+0x108/0x320 [ 339.962956][ T8616] sk_alloc+0x38/0x430 [ 339.967051][ T8616] bpf_prog_test_run_skb+0x24b/0x1150 [ 339.972464][ T8616] ? __kasan_check_write+0x14/0x20 [ 339.977623][ T8616] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 339.983557][ T8616] bpf_prog_test_run+0x3d5/0x620 [ 339.988798][ T8616] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 339.994989][ T8616] ? bpf_prog_query+0x230/0x230 [ 340.000091][ T8616] ? __sys_bpf+0x51f/0x730 [ 340.004542][ T8616] __sys_bpf+0x52c/0x730 [ 340.008812][ T8616] ? bpf_link_show_fdinfo+0x310/0x310 [ 340.014221][ T8616] __x64_sys_bpf+0x7c/0x90 [ 340.018673][ T8616] x64_sys_call+0x4b9/0x9a0 [ 340.023257][ T8616] do_syscall_64+0x4c/0xa0 [ 340.027794][ T8616] ? clear_bhb_loop+0x50/0xa0 [ 340.032570][ T8616] ? clear_bhb_loop+0x50/0xa0 [ 340.037372][ T8616] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 340.043529][ T8616] RIP: 0033:0x7fd74e646be9 [ 340.048072][ T8616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.067970][ T8616] RSP: 002b:00007fd74d0af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 340.076681][ T8616] RAX: ffffffffffffffda RBX: 00007fd74e86dfa0 RCX: 00007fd74e646be9 [ 340.084741][ T8616] RDX: 0000000000000048 RSI: 00002000000003c0 RDI: 000000000000000a [ 340.092841][ T8616] RBP: 00007fd74d0af090 R08: 0000000000000000 R09: 0000000000000000 [ 340.101104][ T8616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 340.109288][ T8616] R13: 00007fd74e86e038 R14: 00007fd74e86dfa0 R15: 00007ffe494d0678 [ 340.117310][ T8616] [ 340.437473][ T8622] FAULT_INJECTION: forcing a failure. [ 340.437473][ T8622] name failslab, interval 1, probability 0, space 0, times 0 [ 340.450385][ T8622] CPU: 1 PID: 8622 Comm: syz.2.3050 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 340.460657][ T8622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 340.470741][ T8622] Call Trace: [ 340.474034][ T8622] [ 340.476978][ T8622] __dump_stack+0x21/0x30 [ 340.481340][ T8622] dump_stack_lvl+0xee/0x150 [ 340.485955][ T8622] ? show_regs_print_info+0x20/0x20 [ 340.491174][ T8622] dump_stack+0x15/0x20 [ 340.495352][ T8622] should_fail+0x3c1/0x510 [ 340.499884][ T8622] __should_failslab+0xa4/0xe0 [ 340.504669][ T8622] should_failslab+0x9/0x20 [ 340.509213][ T8622] slab_pre_alloc_hook+0x3b/0xe0 [ 340.514176][ T8622] ? __alloc_skb+0xe0/0x740 [ 340.518823][ T8622] kmem_cache_alloc+0x44/0x260 [ 340.523697][ T8622] __alloc_skb+0xe0/0x740 [ 340.528217][ T8622] tipc_msg_reverse+0x228/0x900 [ 340.533201][ T8622] ? 0xffffffffa001490c [ 340.537377][ T8622] tipc_sk_respond+0x135/0x410 [ 340.542158][ T8622] ? stack_trace_save+0xe0/0xe0 [ 340.547161][ T8622] ? tipc_sk_sock_err+0x310/0x310 [ 340.552529][ T8622] ? tipc_node_remove_conn+0x2d5/0x400 [ 340.558018][ T8622] __tipc_shutdown+0xeb9/0x1520 [ 340.563271][ T8622] ? tipc_recvstream+0xe80/0xe80 [ 340.568557][ T8622] ? __kasan_record_aux_stack+0xd2/0x100 [ 340.574412][ T8622] ? wait_woken+0x170/0x170 [ 340.579076][ T8622] ? close_fd+0x70/0x80 [ 340.583268][ T8622] ? __x64_sys_close+0x39/0x80 [ 340.588237][ T8622] ? locks_remove_posix+0x520/0x520 [ 340.593657][ T8622] tipc_release+0xc9/0x1630 [ 340.598177][ T8622] ? rwsem_write_trylock+0x130/0x300 [ 340.603508][ T8622] ? tipc_sock_destruct+0x180/0x180 [ 340.608825][ T8622] sock_close+0xe0/0x270 [ 340.613186][ T8622] ? sock_mmap+0xa0/0xa0 [ 340.617450][ T8622] __fput+0x20b/0x8b0 [ 340.621497][ T8622] ____fput+0x15/0x20 [ 340.625525][ T8622] task_work_run+0x127/0x190 [ 340.630136][ T8622] exit_to_user_mode_loop+0xd0/0xe0 [ 340.635351][ T8622] exit_to_user_mode_prepare+0x5a/0xa0 [ 340.640832][ T8622] syscall_exit_to_user_mode+0x1a/0x30 [ 340.646315][ T8622] do_syscall_64+0x58/0xa0 [ 340.650773][ T8622] ? clear_bhb_loop+0x50/0xa0 [ 340.655652][ T8622] ? clear_bhb_loop+0x50/0xa0 [ 340.660347][ T8622] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 340.666260][ T8622] RIP: 0033:0x7fd74e646be9 [ 340.670701][ T8622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.690974][ T8622] RSP: 002b:00007fd74d0af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 340.699425][ T8622] RAX: 0000000000000000 RBX: 00007fd74e86dfa0 RCX: 00007fd74e646be9 [ 340.707647][ T8622] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 340.715868][ T8622] RBP: 00007fd74d0af090 R08: 0000000000000000 R09: 0000000000000000 [ 340.723949][ T8622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 340.731947][ T8622] R13: 00007fd74e86e038 R14: 00007fd74e86dfa0 R15: 00007ffe494d0678 [ 340.740270][ T8622] [ 340.877588][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 340.885913][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.945453][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 340.954305][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.963640][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.970728][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.978428][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 340.988687][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.997372][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.004480][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.084726][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 341.093181][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 341.101771][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 341.111040][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 341.119454][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 341.194050][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 341.202922][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 341.326134][ T8563] device veth0_vlan entered promiscuous mode [ 341.345825][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 341.354093][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 341.410202][ T8563] device veth1_macvtap entered promiscuous mode [ 341.427632][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 341.435369][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 341.498479][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 341.548812][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 341.600102][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 341.642491][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 341.667583][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 341.707118][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 341.776669][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 341.833200][ T8643] device wg2 entered promiscuous mode [ 342.117054][ T8651] device veth0_vlan left promiscuous mode [ 342.123170][ T8651] device veth0_vlan entered promiscuous mode [ 342.267372][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.385176][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.393578][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.921029][ T8669] device sit0 left promiscuous mode [ 343.078259][ T8672] FAULT_INJECTION: forcing a failure. [ 343.078259][ T8672] name failslab, interval 1, probability 0, space 0, times 0 [ 343.092660][ T8672] CPU: 0 PID: 8672 Comm: syz.0.3068 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 343.102936][ T8672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 343.113089][ T8672] Call Trace: [ 343.116374][ T8672] [ 343.119457][ T8672] __dump_stack+0x21/0x30 [ 343.123815][ T8672] dump_stack_lvl+0xee/0x150 [ 343.128931][ T8672] ? show_regs_print_info+0x20/0x20 [ 343.134169][ T8672] dump_stack+0x15/0x20 [ 343.138370][ T8672] should_fail+0x3c1/0x510 [ 343.143047][ T8672] __should_failslab+0xa4/0xe0 [ 343.147947][ T8672] should_failslab+0x9/0x20 [ 343.152464][ T8672] slab_pre_alloc_hook+0x3b/0xe0 [ 343.157414][ T8672] ? security_inode_alloc+0x33/0x110 [ 343.162817][ T8672] kmem_cache_alloc+0x44/0x260 [ 343.167594][ T8672] security_inode_alloc+0x33/0x110 [ 343.172809][ T8672] inode_init_always+0x711/0x990 [ 343.177931][ T8672] new_inode_pseudo+0x91/0x210 [ 343.182704][ T8672] new_inode+0x28/0x1e0 [ 343.186887][ T8672] ? irqentry_exit+0x37/0x40 [ 343.191486][ T8672] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 343.197317][ T8672] proc_pid_make_inode+0x27/0x1d0 [ 343.202355][ T8672] proc_task_instantiate+0x50/0x2c0 [ 343.207585][ T8672] ? idr_find+0x41/0x60 [ 343.211747][ T8672] proc_task_lookup+0x213/0x330 [ 343.216786][ T8672] __lookup_slow+0x2aa/0x3e0 [ 343.221666][ T8672] ? lookup_one_len+0x2c0/0x2c0 [ 343.226539][ T8672] ? down_read+0xa5/0xf0 [ 343.230795][ T8672] ? __down_common+0x370/0x370 [ 343.235737][ T8672] ? handle_dots+0xe10/0xe10 [ 343.240351][ T8672] lookup_slow+0x57/0x70 [ 343.244829][ T8672] walk_component+0x325/0x460 [ 343.249696][ T8672] link_path_walk+0x662/0xd40 [ 343.254413][ T8672] ? handle_lookup_down+0x130/0x130 [ 343.259756][ T8672] path_openat+0x283/0x2f10 [ 343.264361][ T8672] ? hrtimer_forward+0x18f/0x2a0 [ 343.269332][ T8672] ? __kasan_slab_alloc+0xcf/0xf0 [ 343.274644][ T8672] ? slab_post_alloc_hook+0x4f/0x2b0 [ 343.280042][ T8672] ? kmem_cache_alloc+0xf7/0x260 [ 343.285196][ T8672] ? do_sys_openat2+0xd9/0x7b0 [ 343.290453][ T8672] ? do_syscall_64+0x4c/0xa0 [ 343.295056][ T8672] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 343.301380][ T8672] ? do_filp_open+0x3e0/0x3e0 [ 343.306227][ T8672] do_filp_open+0x1b3/0x3e0 [ 343.310862][ T8672] ? vfs_tmpfile+0x2d0/0x2d0 [ 343.315464][ T8672] ? noop_direct_IO+0x20/0x20 [ 343.320154][ T8672] ? do_sys_openat2+0x137/0x7b0 [ 343.325468][ T8672] ? do_filp_open+0x6/0x3e0 [ 343.329988][ T8672] do_sys_openat2+0x14c/0x7b0 [ 343.334682][ T8672] ? do_sys_open+0xe0/0xe0 [ 343.339193][ T8672] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 343.345009][ T8672] __x64_sys_openat+0x136/0x160 [ 343.349962][ T8672] x64_sys_call+0x219/0x9a0 [ 343.354469][ T8672] do_syscall_64+0x4c/0xa0 [ 343.358886][ T8672] ? clear_bhb_loop+0x50/0xa0 [ 343.363567][ T8672] ? clear_bhb_loop+0x50/0xa0 [ 343.368249][ T8672] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 343.374180][ T8672] RIP: 0033:0x7f6d7eeb6550 [ 343.378708][ T8672] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 343.398601][ T8672] RSP: 002b:00007f6d7d91ff10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 343.407143][ T8672] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f6d7eeb6550 [ 343.415207][ T8672] RDX: 0000000000000002 RSI: 00007f6d7d91ffa0 RDI: 00000000ffffff9c [ 343.423197][ T8672] RBP: 00007f6d7d91ffa0 R08: 0000000000000000 R09: 00007f6d7d91fcd6 [ 343.431315][ T8672] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 343.439491][ T8672] R13: 00007f6d7f0df038 R14: 00007f6d7f0defa0 R15: 00007ffd0e1a6998 [ 343.447752][ T8672] [ 343.481276][ T8670] device sit0 entered promiscuous mode [ 343.636397][ T8672] device wg2 left promiscuous mode [ 343.671725][ T8673] device wg2 entered promiscuous mode [ 344.407942][ T8706] GPL: port 1(erspan0) entered blocking state [ 344.455394][ T8706] GPL: port 1(erspan0) entered disabled state [ 344.506586][ T8706] device erspan0 entered promiscuous mode [ 344.514678][ T8707] GPL: port 1(erspan0) entered blocking state [ 344.521303][ T8707] GPL: port 1(erspan0) entered forwarding state [ 345.906372][ T8761] device pim6reg1 entered promiscuous mode [ 347.129168][ T8801] device wg2 entered promiscuous mode [ 347.394641][ T8814] FAULT_INJECTION: forcing a failure. [ 347.394641][ T8814] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 347.433078][ T8816] device wg2 left promiscuous mode [ 347.438574][ T8814] CPU: 0 PID: 8814 Comm: syz.4.3122 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 347.448761][ T8814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 347.459048][ T8814] Call Trace: [ 347.462355][ T8814] [ 347.465308][ T8814] __dump_stack+0x21/0x30 [ 347.469697][ T8814] dump_stack_lvl+0xee/0x150 [ 347.474321][ T8814] ? show_regs_print_info+0x20/0x20 [ 347.479554][ T8814] ? __kernel_text_address+0xa0/0x100 [ 347.485049][ T8814] ? unwind_get_return_address+0x4d/0x90 [ 347.490825][ T8814] dump_stack+0x15/0x20 [ 347.495031][ T8814] should_fail+0x3c1/0x510 [ 347.499571][ T8814] should_fail_alloc_page+0x55/0x80 [ 347.504962][ T8814] prepare_alloc_pages+0x156/0x600 [ 347.510110][ T8814] ? __alloc_pages_bulk+0xab0/0xab0 [ 347.515524][ T8814] __alloc_pages+0x10a/0x440 [ 347.520150][ T8814] ? __sys_bpf+0x2cf/0x730 [ 347.524764][ T8814] ? __x64_sys_bpf+0x7c/0x90 [ 347.529389][ T8814] ? prep_new_page+0x110/0x110 [ 347.534290][ T8814] __alloc_pages_bulk+0x47f/0xab0 [ 347.539350][ T8814] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 347.544924][ T8814] ? __vmalloc_node_range+0x375/0xaf0 [ 347.550508][ T8814] __vmalloc_node_range+0x450/0xaf0 [ 347.555759][ T8814] bpf_map_area_alloc+0xd5/0xe0 [ 347.560643][ T8814] ? htab_map_alloc+0xb29/0x14f0 [ 347.565920][ T8814] htab_map_alloc+0xb29/0x14f0 [ 347.570725][ T8814] map_create+0x455/0x21b0 [ 347.575194][ T8814] __sys_bpf+0x2cf/0x730 [ 347.579594][ T8814] ? bpf_link_show_fdinfo+0x310/0x310 [ 347.585315][ T8814] ? debug_smp_processor_id+0x17/0x20 [ 347.590825][ T8814] __x64_sys_bpf+0x7c/0x90 [ 347.595287][ T8814] x64_sys_call+0x4b9/0x9a0 [ 347.599828][ T8814] do_syscall_64+0x4c/0xa0 [ 347.604495][ T8814] ? clear_bhb_loop+0x50/0xa0 [ 347.609359][ T8814] ? clear_bhb_loop+0x50/0xa0 [ 347.614060][ T8814] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 347.620055][ T8814] RIP: 0033:0x7fed1738ebe9 [ 347.624563][ T8814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 347.644473][ T8814] RSP: 002b:00007fed15df7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 347.652898][ T8814] RAX: ffffffffffffffda RBX: 00007fed175b5fa0 RCX: 00007fed1738ebe9 [ 347.661072][ T8814] RDX: 0000000000000048 RSI: 0000200000000840 RDI: 0000000000000000 [ 347.669049][ T8814] RBP: 00007fed15df7090 R08: 0000000000000000 R09: 0000000000000000 [ 347.677119][ T8814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 347.685095][ T8814] R13: 00007fed175b6038 R14: 00007fed175b5fa0 R15: 00007ffc9fd035f8 [ 347.693263][ T8814] [ 347.743710][ T8816] device wg2 entered promiscuous mode [ 349.268052][ T8881] device wg2 entered promiscuous mode [ 349.646276][ T8903] syz.4.3156[8903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.646388][ T8903] syz.4.3156[8903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.158396][ T8962] device wg2 left promiscuous mode [ 351.389780][ T8966] device wg2 entered promiscuous mode [ 351.525472][ T8973] device pim6reg1 entered promiscuous mode [ 351.799361][ T8988] device wg2 left promiscuous mode [ 351.838032][ T8988] device wg2 entered promiscuous mode [ 351.988847][ T8991] device pim6reg1 entered promiscuous mode [ 352.181491][ T9002] device wg2 left promiscuous mode [ 352.335284][ T9002] device wg2 entered promiscuous mode [ 352.746139][ T9019] device wg2 left promiscuous mode [ 352.858072][ T9021] device wg2 entered promiscuous mode [ 353.253577][ T9041] FAULT_INJECTION: forcing a failure. [ 353.253577][ T9041] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 353.267452][ T9041] CPU: 1 PID: 9041 Comm: syz.0.3205 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 353.277656][ T9041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 353.287835][ T9041] Call Trace: [ 353.291145][ T9041] [ 353.294088][ T9041] __dump_stack+0x21/0x30 [ 353.298440][ T9041] dump_stack_lvl+0xee/0x150 [ 353.303137][ T9041] ? show_regs_print_info+0x20/0x20 [ 353.308441][ T9041] dump_stack+0x15/0x20 [ 353.312612][ T9041] should_fail+0x3c1/0x510 [ 353.317165][ T9041] should_fail_alloc_page+0x55/0x80 [ 353.322372][ T9041] prepare_alloc_pages+0x156/0x600 [ 353.327499][ T9041] ? __alloc_pages_bulk+0xab0/0xab0 [ 353.332791][ T9041] ? slab_post_alloc_hook+0x4f/0x2b0 [ 353.338083][ T9041] ? alloc_vmap_area+0x17a/0x1990 [ 353.343111][ T9041] ? __get_vm_area_node+0x14e/0x350 [ 353.348310][ T9041] ? __vmalloc_node_range+0xdf/0xaf0 [ 353.353601][ T9041] ? kvmalloc_node+0xa6/0x300 [ 353.358806][ T9041] __alloc_pages+0x10a/0x440 [ 353.363417][ T9041] ? prep_new_page+0x110/0x110 [ 353.368184][ T9041] ? __kasan_check_write+0x14/0x20 [ 353.373300][ T9041] __get_free_pages+0x10/0x30 [ 353.377981][ T9041] kasan_populate_vmalloc_pte+0x29/0x120 [ 353.383711][ T9041] __apply_to_page_range+0x8b0/0xbf0 [ 353.389087][ T9041] ? kasan_populate_vmalloc+0x70/0x70 [ 353.394466][ T9041] ? kasan_populate_vmalloc+0x70/0x70 [ 353.399844][ T9041] apply_to_page_range+0x3b/0x50 [ 353.404885][ T9041] kasan_populate_vmalloc+0x60/0x70 [ 353.410623][ T9041] alloc_vmap_area+0x185c/0x1990 [ 353.415658][ T9041] ? vm_map_ram+0xa60/0xa60 [ 353.420166][ T9041] ? __get_vm_area_node+0x11d/0x350 [ 353.425410][ T9041] __get_vm_area_node+0x14e/0x350 [ 353.430440][ T9041] __vmalloc_node_range+0xdf/0xaf0 [ 353.435856][ T9041] ? btf_new_fd+0x1ee/0x920 [ 353.440387][ T9041] ? __kasan_kmalloc_large+0x1a/0xb0 [ 353.445705][ T9041] ? kmalloc_order+0xb9/0x160 [ 353.450392][ T9041] ? kmalloc_order_trace+0x18/0xb0 [ 353.455527][ T9041] ? btf_new_fd+0x1ee/0x920 [ 353.460124][ T9041] __vmalloc_node+0x7f/0x90 [ 353.464635][ T9041] ? btf_new_fd+0x1ee/0x920 [ 353.469266][ T9041] kvmalloc_node+0xa6/0x300 [ 353.473785][ T9041] ? vm_mmap+0xb0/0xb0 [ 353.477880][ T9041] ? btf_new_fd+0x1b2/0x920 [ 353.482401][ T9041] btf_new_fd+0x1ee/0x920 [ 353.486761][ T9041] bpf_btf_load+0x6f/0x90 [ 353.491111][ T9041] __sys_bpf+0x515/0x730 [ 353.495364][ T9041] ? bpf_link_show_fdinfo+0x310/0x310 [ 353.500853][ T9041] ? debug_smp_processor_id+0x17/0x20 [ 353.506411][ T9041] __x64_sys_bpf+0x7c/0x90 [ 353.510844][ T9041] x64_sys_call+0x4b9/0x9a0 [ 353.515350][ T9041] do_syscall_64+0x4c/0xa0 [ 353.519770][ T9041] ? clear_bhb_loop+0x50/0xa0 [ 353.524478][ T9041] ? clear_bhb_loop+0x50/0xa0 [ 353.529173][ T9041] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 353.535078][ T9041] RIP: 0033:0x7f6d7eeb7be9 [ 353.539497][ T9041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.559411][ T9041] RSP: 002b:00007f6d7d920038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 353.568008][ T9041] RAX: ffffffffffffffda RBX: 00007f6d7f0defa0 RCX: 00007f6d7eeb7be9 [ 353.575991][ T9041] RDX: 0000000000000020 RSI: 0000200000000280 RDI: 0000000000000012 [ 353.584183][ T9041] RBP: 00007f6d7d920090 R08: 0000000000000000 R09: 0000000000000000 [ 353.592252][ T9041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.600446][ T9041] R13: 00007f6d7f0df038 R14: 00007f6d7f0defa0 R15: 00007ffd0e1a6998 [ 353.608573][ T9041] [ 353.670773][ T9046] FAULT_INJECTION: forcing a failure. [ 353.670773][ T9046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 353.715626][ T9046] CPU: 1 PID: 9046 Comm: syz.4.3207 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 353.725830][ T9046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 353.736178][ T9046] Call Trace: [ 353.739484][ T9046] [ 353.742461][ T9046] __dump_stack+0x21/0x30 [ 353.747036][ T9046] dump_stack_lvl+0xee/0x150 [ 353.751745][ T9046] ? show_regs_print_info+0x20/0x20 [ 353.756972][ T9046] dump_stack+0x15/0x20 [ 353.761154][ T9046] should_fail+0x3c1/0x510 [ 353.765600][ T9046] should_fail_usercopy+0x1a/0x20 [ 353.770647][ T9046] _copy_to_user+0x20/0x90 [ 353.775087][ T9046] simple_read_from_buffer+0xe9/0x160 [ 353.780481][ T9046] proc_fail_nth_read+0x19a/0x210 [ 353.785909][ T9046] ? proc_fault_inject_write+0x2f0/0x2f0 [ 353.791893][ T9046] ? security_file_permission+0x83/0xa0 [ 353.797471][ T9046] ? proc_fault_inject_write+0x2f0/0x2f0 [ 353.803222][ T9046] vfs_read+0x282/0xbe0 [ 353.807424][ T9046] ? kernel_read+0x1f0/0x1f0 [ 353.812123][ T9046] ? fd_install+0x169/0x2a0 [ 353.816921][ T9046] ? __se_sys_perf_event_open+0x19b7/0x1b80 [ 353.822846][ T9046] ? __kasan_check_write+0x14/0x20 [ 353.828082][ T9046] ? mutex_lock+0x95/0x1a0 [ 353.832521][ T9046] ? wait_for_completion_killable_timeout+0x10/0x10 [ 353.839213][ T9046] ? __fget_files+0x2c4/0x320 [ 353.844005][ T9046] ? __fdget_pos+0x2d2/0x380 [ 353.848614][ T9046] ? ksys_read+0x71/0x240 [ 353.853049][ T9046] ksys_read+0x140/0x240 [ 353.857483][ T9046] ? vfs_write+0xf70/0xf70 [ 353.861938][ T9046] ? debug_smp_processor_id+0x17/0x20 [ 353.867426][ T9046] __x64_sys_read+0x7b/0x90 [ 353.872055][ T9046] x64_sys_call+0x96d/0x9a0 [ 353.876594][ T9046] do_syscall_64+0x4c/0xa0 [ 353.881037][ T9046] ? clear_bhb_loop+0x50/0xa0 [ 353.885740][ T9046] ? clear_bhb_loop+0x50/0xa0 [ 353.890527][ T9046] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 353.896527][ T9046] RIP: 0033:0x7fed1738d5fc [ 353.900961][ T9046] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 353.920868][ T9046] RSP: 002b:00007fed15df7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 353.929526][ T9046] RAX: ffffffffffffffda RBX: 00007fed175b5fa0 RCX: 00007fed1738d5fc [ 353.937632][ T9046] RDX: 000000000000000f RSI: 00007fed15df70a0 RDI: 0000000000000008 [ 353.945711][ T9046] RBP: 00007fed15df7090 R08: 0000000000000000 R09: 0000000000000000 [ 353.953897][ T9046] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 353.962125][ T9046] R13: 00007fed175b6038 R14: 00007fed175b5fa0 R15: 00007ffc9fd035f8 [ 353.970260][ T9046] [ 354.581968][ T9069] device wg2 left promiscuous mode [ 354.601187][ T9069] device wg2 entered promiscuous mode [ 355.312973][ T9106] device wg2 left promiscuous mode [ 355.371725][ T9106] device wg2 entered promiscuous mode [ 356.721898][ T9163] FAULT_INJECTION: forcing a failure. [ 356.721898][ T9163] name failslab, interval 1, probability 0, space 0, times 0 [ 356.776071][ T9163] CPU: 0 PID: 9163 Comm: syz.5.3252 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 356.786286][ T9163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 356.796558][ T9163] Call Trace: [ 356.799866][ T9163] [ 356.802839][ T9163] __dump_stack+0x21/0x30 [ 356.807474][ T9163] dump_stack_lvl+0xee/0x150 [ 356.812298][ T9163] ? show_regs_print_info+0x20/0x20 [ 356.817820][ T9163] ? stack_trace_save+0x98/0xe0 [ 356.822714][ T9163] dump_stack+0x15/0x20 [ 356.826909][ T9163] should_fail+0x3c1/0x510 [ 356.831353][ T9163] __should_failslab+0xa4/0xe0 [ 356.836149][ T9163] should_failslab+0x9/0x20 [ 356.840680][ T9163] slab_pre_alloc_hook+0x3b/0xe0 [ 356.845648][ T9163] kmem_cache_alloc_trace+0x48/0x270 [ 356.851054][ T9163] ? __kthread_create_on_node+0x137/0x530 [ 356.856796][ T9163] ? put_cpu_map_entry+0x6f0/0x6f0 [ 356.862028][ T9163] __kthread_create_on_node+0x137/0x530 [ 356.867597][ T9163] ? kthread_create_on_node+0x120/0x120 [ 356.873172][ T9163] ? put_cpu_map_entry+0x6f0/0x6f0 [ 356.878385][ T9163] kthread_create_on_node+0xda/0x120 [ 356.883889][ T9163] ? tsk_fork_get_node+0x10/0x10 [ 356.889524][ T9163] ? bpf_map_kmalloc_node+0xf9/0x140 [ 356.895142][ T9163] cpu_map_update_elem+0x8c7/0xd50 [ 356.900571][ T9163] ? cpu_map_lookup_elem+0x100/0x100 [ 356.905868][ T9163] ? kvmalloc_node+0x231/0x300 [ 356.910644][ T9163] bpf_map_update_value+0x193/0x3e0 [ 356.915955][ T9163] map_update_elem+0x5bb/0x740 [ 356.920742][ T9163] __sys_bpf+0x40c/0x730 [ 356.924999][ T9163] ? bpf_link_show_fdinfo+0x310/0x310 [ 356.930475][ T9163] ? debug_smp_processor_id+0x17/0x20 [ 356.935868][ T9163] __x64_sys_bpf+0x7c/0x90 [ 356.940285][ T9163] x64_sys_call+0x4b9/0x9a0 [ 356.944788][ T9163] do_syscall_64+0x4c/0xa0 [ 356.949206][ T9163] ? clear_bhb_loop+0x50/0xa0 [ 356.953891][ T9163] ? clear_bhb_loop+0x50/0xa0 [ 356.958571][ T9163] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 356.964471][ T9163] RIP: 0033:0x7f2781a09be9 [ 356.968889][ T9163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 356.988502][ T9163] RSP: 002b:00007f2780472038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 356.997099][ T9163] RAX: ffffffffffffffda RBX: 00007f2781c30fa0 RCX: 00007f2781a09be9 [ 357.005078][ T9163] RDX: 0000000000000020 RSI: 0000200000000940 RDI: 0000000000000002 [ 357.013055][ T9163] RBP: 00007f2780472090 R08: 0000000000000000 R09: 0000000000000000 [ 357.021307][ T9163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.029286][ T9163] R13: 00007f2781c31038 R14: 00007f2781c30fa0 R15: 00007fff75023078 [ 357.037272][ T9163] [ 359.133712][ T9206] device wg2 left promiscuous mode [ 359.241394][ T9206] device wg2 entered promiscuous mode [ 362.824992][ T9272] FAULT_INJECTION: forcing a failure. [ 362.824992][ T9272] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 362.838838][ T9272] CPU: 0 PID: 9272 Comm: syz.0.3293 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 362.849110][ T9272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 362.859193][ T9272] Call Trace: [ 362.862523][ T9272] [ 362.865486][ T9272] __dump_stack+0x21/0x30 [ 362.869841][ T9272] dump_stack_lvl+0xee/0x150 [ 362.874533][ T9272] ? show_regs_print_info+0x20/0x20 [ 362.879841][ T9272] ? exc_page_fault+0x5e/0xb0 [ 362.884621][ T9272] ? asm_exc_page_fault+0x27/0x30 [ 362.889663][ T9272] dump_stack+0x15/0x20 [ 362.894129][ T9272] should_fail+0x3c1/0x510 [ 362.898564][ T9272] should_fail_usercopy+0x1a/0x20 [ 362.903604][ T9272] strncpy_from_user+0x24/0x2e0 [ 362.908582][ T9272] ? make_kuid+0x640/0x640 [ 362.913016][ T9272] strncpy_from_user_nofault+0x73/0x150 [ 362.918573][ T9272] bpf_probe_read_user_str+0x2a/0x70 [ 362.923957][ T9272] bpf_prog_fc0bb622e9a87770+0x3d/0xb00 [ 362.929509][ T9272] bpf_trace_run1+0xaa/0x1b0 [ 362.934233][ T9272] ? bpf_put_raw_tracepoint+0x60/0x60 [ 362.939608][ T9272] ? kfree+0xc4/0x270 [ 362.943607][ T9272] ? kfree_const+0x39/0x40 [ 362.948034][ T9272] ? __kasan_check_write+0x14/0x20 [ 362.953173][ T9272] ? kobject_put+0x1a8/0x270 [ 362.957788][ T9272] ? __bpf_trace_qdisc_enqueue+0x40/0x40 [ 362.963442][ T9272] __bpf_trace_qdisc_reset+0x1d/0x30 [ 362.968736][ T9272] __traceiter_qdisc_reset+0x68/0xb0 [ 362.974025][ T9272] qdisc_reset+0x426/0x470 [ 362.978444][ T9272] netif_set_real_num_tx_queues+0x547/0x780 [ 362.984349][ T9272] __tun_detach+0xb31/0x1450 [ 362.988952][ T9272] __tun_chr_ioctl+0xb04/0x1eb0 [ 362.993818][ T9272] ? tun_flow_create+0x320/0x320 [ 362.998758][ T9272] ? mutex_unlock+0x89/0x220 [ 363.003348][ T9272] ? __fget_files+0x2c4/0x320 [ 363.008198][ T9272] tun_chr_ioctl+0x2a/0x40 [ 363.012623][ T9272] ? tun_chr_poll+0x720/0x720 [ 363.017565][ T9272] __se_sys_ioctl+0x121/0x1a0 [ 363.022269][ T9272] __x64_sys_ioctl+0x7b/0x90 [ 363.026868][ T9272] x64_sys_call+0x2f/0x9a0 [ 363.031288][ T9272] do_syscall_64+0x4c/0xa0 [ 363.035714][ T9272] ? clear_bhb_loop+0x50/0xa0 [ 363.040498][ T9272] ? clear_bhb_loop+0x50/0xa0 [ 363.045380][ T9272] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 363.051278][ T9272] RIP: 0033:0x7f6d7eeb7be9 [ 363.055706][ T9272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 363.075402][ T9272] RSP: 002b:00007f6d7d920038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 363.083907][ T9272] RAX: ffffffffffffffda RBX: 00007f6d7f0defa0 RCX: 00007f6d7eeb7be9 [ 363.091894][ T9272] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000008 [ 363.099955][ T9272] RBP: 00007f6d7d920090 R08: 0000000000000000 R09: 0000000000000000 [ 363.107930][ T9272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 363.115936][ T9272] R13: 00007f6d7f0df038 R14: 00007f6d7f0defa0 R15: 00007ffd0e1a6998 [ 363.123937][ T9272] [ 363.290574][ T9278] device wg2 left promiscuous mode [ 363.313522][ T9281] device wg2 entered promiscuous mode [ 364.006699][ T9309] FAULT_INJECTION: forcing a failure. [ 364.006699][ T9309] name failslab, interval 1, probability 0, space 0, times 0 [ 364.019511][ T9309] CPU: 1 PID: 9309 Comm: syz.0.3304 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 364.029777][ T9309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 364.039869][ T9309] Call Trace: [ 364.043177][ T9309] [ 364.046246][ T9309] __dump_stack+0x21/0x30 [ 364.050797][ T9309] dump_stack_lvl+0xee/0x150 [ 364.055416][ T9309] ? show_regs_print_info+0x20/0x20 [ 364.060678][ T9309] dump_stack+0x15/0x20 [ 364.065135][ T9309] should_fail+0x3c1/0x510 [ 364.069935][ T9309] __should_failslab+0xa4/0xe0 [ 364.074750][ T9309] should_failslab+0x9/0x20 [ 364.079287][ T9309] slab_pre_alloc_hook+0x3b/0xe0 [ 364.084254][ T9309] ? dst_alloc+0x15c/0x1d0 [ 364.088696][ T9309] kmem_cache_alloc+0x44/0x260 [ 364.093502][ T9309] ? ipv6_sysctl_rtcache_flush+0x100/0x100 [ 364.099337][ T9309] dst_alloc+0x15c/0x1d0 [ 364.103703][ T9309] ip6_pol_route+0x960/0x1110 [ 364.108409][ T9309] ? fib6_table_lookup+0x9f0/0x9f0 [ 364.113636][ T9309] ? do_handle_mm_fault+0xf39/0x1d50 [ 364.118957][ T9309] ? prep_new_page+0x3b/0x110 [ 364.123856][ T9309] ip6_pol_route_input+0x56/0x80 [ 364.128819][ T9309] fib6_rule_lookup+0x1c6/0x560 [ 364.133754][ T9309] ? ip6_route_input_lookup+0xd0/0xd0 [ 364.139389][ T9309] ? fib6_lookup+0x2a0/0x2a0 [ 364.144108][ T9309] ? ip6t_do_table+0x12fe/0x14c0 [ 364.149169][ T9309] ip6_route_input+0x591/0x820 [ 364.153968][ T9309] ? ip6_multipath_l3_keys+0x5f0/0x5f0 [ 364.159806][ T9309] ? udp_v6_early_demux+0x1f9/0xbc0 [ 364.165250][ T9309] ? udp_lib_checksum_complete+0x230/0x230 [ 364.171135][ T9309] ? ip6table_mangle_table_init+0x60/0x60 [ 364.177139][ T9309] ip6_rcv_finish+0x156/0x360 [ 364.181848][ T9309] ipv6_rcv+0xe9/0x210 [ 364.185943][ T9309] ? irqentry_exit+0x37/0x40 [ 364.190564][ T9309] ? ip6_rcv_finish+0x360/0x360 [ 364.195595][ T9309] ? refcount_add+0x80/0x80 [ 364.200114][ T9309] ? _copy_from_iter+0x201/0x1050 [ 364.205154][ T9309] ? ip6_rcv_finish+0x360/0x360 [ 364.210145][ T9309] __netif_receive_skb+0xc8/0x280 [ 364.215192][ T9309] ? _copy_from_iter+0x4ae/0x1050 [ 364.220427][ T9309] ? __kasan_check_write+0x14/0x20 [ 364.225599][ T9309] netif_receive_skb+0x98/0x3d0 [ 364.230489][ T9309] ? netif_receive_skb_core+0x100/0x100 [ 364.236042][ T9309] ? __kernel_text_address+0xa0/0x100 [ 364.241514][ T9309] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 364.247166][ T9309] tun_rx_batched+0x5e8/0x710 [ 364.252025][ T9309] ? local_bh_enable+0x30/0x30 [ 364.256854][ T9309] tun_get_user+0x279c/0x33c0 [ 364.261537][ T9309] ? perf_event_read_local+0x580/0x710 [ 364.267014][ T9309] ? kmem_cache_free+0x100/0x320 [ 364.271967][ T9309] ? tun_do_read+0x1c40/0x1c40 [ 364.276734][ T9309] ? kstrtouint_from_user+0x1a0/0x200 [ 364.282110][ T9309] ? kstrtol_from_user+0x260/0x260 [ 364.287335][ T9309] ? putname+0x111/0x160 [ 364.291595][ T9309] ? avc_policy_seqno+0x1b/0x70 [ 364.296465][ T9309] ? selinux_file_permission+0x2aa/0x510 [ 364.302207][ T9309] tun_chr_write_iter+0x1eb/0x2e0 [ 364.307335][ T9309] vfs_write+0x802/0xf70 [ 364.311597][ T9309] ? file_end_write+0x1b0/0x1b0 [ 364.316462][ T9309] ? __fget_files+0x2c4/0x320 [ 364.321276][ T9309] ? __fdget_pos+0x1f7/0x380 [ 364.326063][ T9309] ? ksys_write+0x71/0x240 [ 364.330481][ T9309] ksys_write+0x140/0x240 [ 364.334919][ T9309] ? __ia32_sys_read+0x90/0x90 [ 364.339688][ T9309] ? debug_smp_processor_id+0x17/0x20 [ 364.345068][ T9309] __x64_sys_write+0x7b/0x90 [ 364.349662][ T9309] x64_sys_call+0x8ef/0x9a0 [ 364.354179][ T9309] do_syscall_64+0x4c/0xa0 [ 364.358692][ T9309] ? clear_bhb_loop+0x50/0xa0 [ 364.363466][ T9309] ? clear_bhb_loop+0x50/0xa0 [ 364.368168][ T9309] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 364.374243][ T9309] RIP: 0033:0x7f6d7eeb7be9 [ 364.379098][ T9309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.398811][ T9309] RSP: 002b:00007f6d7d8ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 364.407611][ T9309] RAX: ffffffffffffffda RBX: 00007f6d7f0df090 RCX: 00007f6d7eeb7be9 [ 364.415774][ T9309] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 00000000000000c8 [ 364.423959][ T9309] RBP: 00007f6d7d8ff090 R08: 0000000000000000 R09: 0000000000000000 [ 364.431941][ T9309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.440005][ T9309] R13: 00007f6d7f0df128 R14: 00007f6d7f0df090 R15: 00007ffd0e1a6998 [ 364.447989][ T9309] [ 364.743198][ T9328] FAULT_INJECTION: forcing a failure. [ 364.743198][ T9328] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 364.757815][ T9328] CPU: 0 PID: 9328 Comm: syz.0.3315 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 364.768013][ T9328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 364.778219][ T9328] Call Trace: [ 364.781515][ T9328] [ 364.784467][ T9328] __dump_stack+0x21/0x30 [ 364.788816][ T9328] dump_stack_lvl+0xee/0x150 [ 364.793440][ T9328] ? show_regs_print_info+0x20/0x20 [ 364.798724][ T9328] ? irqentry_exit+0x37/0x40 [ 364.803384][ T9328] dump_stack+0x15/0x20 [ 364.807653][ T9328] should_fail+0x3c1/0x510 [ 364.812292][ T9328] should_fail_usercopy+0x1a/0x20 [ 364.817372][ T9328] _copy_from_user+0x20/0xd0 [ 364.822471][ T9328] __sys_bpf+0x233/0x730 [ 364.827294][ T9328] ? bpf_link_show_fdinfo+0x310/0x310 [ 364.833042][ T9328] ? asm_sysvec_call_function_single+0x1b/0x20 [ 364.839301][ T9328] __x64_sys_bpf+0x7c/0x90 [ 364.843810][ T9328] x64_sys_call+0x4b9/0x9a0 [ 364.848319][ T9328] do_syscall_64+0x4c/0xa0 [ 364.853159][ T9328] ? clear_bhb_loop+0x50/0xa0 [ 364.858330][ T9328] ? clear_bhb_loop+0x50/0xa0 [ 364.863214][ T9328] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 364.869525][ T9328] RIP: 0033:0x7f6d7eeb7be9 [ 364.874146][ T9328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.894016][ T9328] RSP: 002b:00007f6d7d920038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 364.903047][ T9328] RAX: ffffffffffffffda RBX: 00007f6d7f0defa0 RCX: 00007f6d7eeb7be9 [ 364.911205][ T9328] RDX: 0000000000000080 RSI: 0000200000000280 RDI: 0000000000000005 [ 364.919193][ T9328] RBP: 00007f6d7d920090 R08: 0000000000000000 R09: 0000000000000000 [ 364.927254][ T9328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.935329][ T9328] R13: 00007f6d7f0df038 R14: 00007f6d7f0defa0 R15: 00007ffd0e1a6998 [ 364.943317][ T9328] [ 365.323203][ T30] audit: type=1400 audit(1754685541.944:155): avc: denied { create } for pid=9347 comm="syz.5.3322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 367.626417][ T9416] device veth1_macvtap left promiscuous mode [ 368.628019][ T9450] device syzkaller0 entered promiscuous mode [ 369.059742][ T9464] device syzkaller0 entered promiscuous mode [ 369.653399][ T9477] bond_slave_1: mtu less than device minimum [ 372.126014][ T9519] FAULT_INJECTION: forcing a failure. [ 372.126014][ T9519] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 372.145631][ T9519] CPU: 0 PID: 9519 Comm: syz.0.3384 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 372.155943][ T9519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 372.166228][ T9519] Call Trace: [ 372.169621][ T9519] [ 372.172653][ T9519] __dump_stack+0x21/0x30 [ 372.177008][ T9519] dump_stack_lvl+0xee/0x150 [ 372.181732][ T9519] ? show_regs_print_info+0x20/0x20 [ 372.187054][ T9519] ? avc_denied+0x1b0/0x1b0 [ 372.191594][ T9519] dump_stack+0x15/0x20 [ 372.196131][ T9519] should_fail+0x3c1/0x510 [ 372.200562][ T9519] should_fail_usercopy+0x1a/0x20 [ 372.205593][ T9519] copy_page_from_iter+0x2f6/0x680 [ 372.210712][ T9519] pipe_write+0x914/0x18d0 [ 372.215140][ T9519] ? pipe_write+0x191/0x18d0 [ 372.219737][ T9519] ? pipe_read+0xfe0/0xfe0 [ 372.224173][ T9519] ? selinux_file_permission+0x3f4/0x510 [ 372.229818][ T9519] ? memset+0x35/0x40 [ 372.233810][ T9519] ? iov_iter_init+0xbc/0x180 [ 372.238496][ T9519] vfs_write+0x802/0xf70 [ 372.242834][ T9519] ? file_end_write+0x1b0/0x1b0 [ 372.247870][ T9519] ? __fget_files+0x2c4/0x320 [ 372.252666][ T9519] ? __fdget_pos+0x1f7/0x380 [ 372.257352][ T9519] ? ksys_write+0x71/0x240 [ 372.262399][ T9519] ksys_write+0x140/0x240 [ 372.266950][ T9519] ? __ia32_sys_read+0x90/0x90 [ 372.271720][ T9519] ? debug_smp_processor_id+0x17/0x20 [ 372.277097][ T9519] __x64_sys_write+0x7b/0x90 [ 372.281697][ T9519] x64_sys_call+0x8ef/0x9a0 [ 372.286337][ T9519] do_syscall_64+0x4c/0xa0 [ 372.290759][ T9519] ? clear_bhb_loop+0x50/0xa0 [ 372.295442][ T9519] ? clear_bhb_loop+0x50/0xa0 [ 372.300121][ T9519] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 372.306016][ T9519] RIP: 0033:0x7f6d7eeb7be9 [ 372.310439][ T9519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 372.330227][ T9519] RSP: 002b:00007f6d7d920038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 372.338826][ T9519] RAX: ffffffffffffffda RBX: 00007f6d7f0defa0 RCX: 00007f6d7eeb7be9 [ 372.346811][ T9519] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 372.354786][ T9519] RBP: 00007f6d7d920090 R08: 0000000000000000 R09: 0000000000000000 [ 372.362762][ T9519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 372.370737][ T9519] R13: 00007f6d7f0df038 R14: 00007f6d7f0defa0 R15: 00007ffd0e1a6998 [ 372.378720][ T9519] [ 372.740621][ T9529] device syzkaller0 entered promiscuous mode [ 373.866266][ T9569] device veth1_macvtap left promiscuous mode [ 374.681665][ T9593] device veth1_macvtap left promiscuous mode [ 377.149899][ T9665] FAULT_INJECTION: forcing a failure. [ 377.149899][ T9665] name failslab, interval 1, probability 0, space 0, times 0 [ 377.283508][ T9665] CPU: 0 PID: 9665 Comm: syz.0.3440 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 377.294007][ T9665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 377.304188][ T9665] Call Trace: [ 377.307607][ T9665] [ 377.310578][ T9665] __dump_stack+0x21/0x30 [ 377.314949][ T9665] dump_stack_lvl+0xee/0x150 [ 377.319782][ T9665] ? show_regs_print_info+0x20/0x20 [ 377.325240][ T9665] ? do_user_addr_fault+0xa64/0x1180 [ 377.330671][ T9665] ? __kasan_check_write+0x14/0x20 [ 377.335829][ T9665] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 377.341352][ T9665] dump_stack+0x15/0x20 [ 377.345595][ T9665] should_fail+0x3c1/0x510 [ 377.350149][ T9665] __should_failslab+0xa4/0xe0 [ 377.354964][ T9665] should_failslab+0x9/0x20 [ 377.359828][ T9665] slab_pre_alloc_hook+0x3b/0xe0 [ 377.364821][ T9665] ? skb_clone+0x1cf/0x360 [ 377.369276][ T9665] kmem_cache_alloc+0x44/0x260 [ 377.374181][ T9665] skb_clone+0x1cf/0x360 [ 377.378741][ T9665] ? __kasan_check_write+0x14/0x20 [ 377.384008][ T9665] sk_psock_verdict_recv+0x53/0x800 [ 377.389672][ T9665] unix_read_sock+0x10a/0x2c0 [ 377.394492][ T9665] ? sk_psock_skb_redirect+0x440/0x440 [ 377.400000][ T9665] ? unix_stream_splice_actor+0x120/0x120 [ 377.405947][ T9665] ? copy_page_from_iter+0x2e1/0x680 [ 377.411602][ T9665] ? copy_user_enhanced_fast_string+0xe/0x40 [ 377.417977][ T9665] ? sk_psock_skb_redirect+0x440/0x440 [ 377.423487][ T9665] ? unix_set_peek_off+0xa0/0xa0 [ 377.428553][ T9665] unix_stream_read_sock+0x61/0x90 [ 377.433870][ T9665] sk_psock_verdict_data_ready+0x115/0x170 [ 377.439851][ T9665] ? sk_psock_start_verdict+0xc0/0xc0 [ 377.445263][ T9665] ? _raw_spin_lock+0x8e/0xe0 [ 377.450380][ T9665] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 377.456476][ T9665] ? skb_queue_tail+0xcb/0xf0 [ 377.461250][ T9665] unix_stream_sendmsg+0x7c4/0xc80 [ 377.466472][ T9665] ? unix_show_fdinfo+0xa0/0xa0 [ 377.471354][ T9665] ? security_socket_sendmsg+0x82/0xa0 [ 377.476866][ T9665] ? unix_show_fdinfo+0xa0/0xa0 [ 377.481859][ T9665] ____sys_sendmsg+0x5a2/0x8c0 [ 377.486637][ T9665] ? __sys_sendmsg_sock+0x40/0x40 [ 377.491847][ T9665] ? import_iovec+0x7c/0xb0 [ 377.496980][ T9665] ___sys_sendmsg+0x1f0/0x260 [ 377.502081][ T9665] ? __sys_sendmsg+0x250/0x250 [ 377.507574][ T9665] ? __fdget+0x1a1/0x230 [ 377.512038][ T9665] __x64_sys_sendmsg+0x1e2/0x2a0 [ 377.517269][ T9665] ? ___sys_sendmsg+0x260/0x260 [ 377.522138][ T9665] ? ksys_write+0x1eb/0x240 [ 377.527005][ T9665] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 377.533192][ T9665] x64_sys_call+0x4b/0x9a0 [ 377.537938][ T9665] do_syscall_64+0x4c/0xa0 [ 377.542477][ T9665] ? clear_bhb_loop+0x50/0xa0 [ 377.547525][ T9665] ? clear_bhb_loop+0x50/0xa0 [ 377.552440][ T9665] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 377.558531][ T9665] RIP: 0033:0x7f6d7eeb7be9 [ 377.563054][ T9665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 377.584291][ T9665] RSP: 002b:00007f6d7d920038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 377.592986][ T9665] RAX: ffffffffffffffda RBX: 00007f6d7f0defa0 RCX: 00007f6d7eeb7be9 [ 377.601161][ T9665] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000009 [ 377.610068][ T9665] RBP: 00007f6d7d920090 R08: 0000000000000000 R09: 0000000000000000 [ 377.619215][ T9665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 377.627744][ T9665] R13: 00007f6d7f0df038 R14: 00007f6d7f0defa0 R15: 00007ffd0e1a6998 [ 377.636089][ T9665] [ 379.942318][ T9757] device sit0 entered promiscuous mode [ 381.699785][ T9830] ÿÿÿÿÿÿ: renamed from vlan1 [ 384.365299][ T9932] FAULT_INJECTION: forcing a failure. [ 384.365299][ T9932] name failslab, interval 1, probability 0, space 0, times 0 [ 384.378555][ T9932] CPU: 0 PID: 9932 Comm: syz.2.3547 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 384.389047][ T9932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 384.399224][ T9932] Call Trace: [ 384.402533][ T9932] [ 384.405487][ T9932] __dump_stack+0x21/0x30 [ 384.409855][ T9932] dump_stack_lvl+0xee/0x150 [ 384.414580][ T9932] ? show_regs_print_info+0x20/0x20 [ 384.419814][ T9932] dump_stack+0x15/0x20 [ 384.424031][ T9932] should_fail+0x3c1/0x510 [ 384.428564][ T9932] __should_failslab+0xa4/0xe0 [ 384.433359][ T9932] should_failslab+0x9/0x20 [ 384.438071][ T9932] slab_pre_alloc_hook+0x3b/0xe0 [ 384.443039][ T9932] kmem_cache_alloc_trace+0x48/0x270 [ 384.448350][ T9932] ? sk_psock_skb_ingress_self+0x5f/0x330 [ 384.454199][ T9932] ? migrate_disable+0x180/0x180 [ 384.459265][ T9932] sk_psock_skb_ingress_self+0x5f/0x330 [ 384.464983][ T9932] ? migrate_disable+0xd6/0x180 [ 384.469872][ T9932] sk_psock_verdict_recv+0x636/0x800 [ 384.475198][ T9932] unix_read_sock+0x10a/0x2c0 [ 384.479986][ T9932] ? sk_psock_skb_redirect+0x440/0x440 [ 384.485504][ T9932] ? unix_stream_splice_actor+0x120/0x120 [ 384.491273][ T9932] ? copy_page_from_iter+0x2e1/0x680 [ 384.496722][ T9932] ? copy_user_enhanced_fast_string+0xe/0x40 [ 384.502752][ T9932] ? sk_psock_skb_redirect+0x440/0x440 [ 384.508258][ T9932] ? unix_set_peek_off+0xa0/0xa0 [ 384.513327][ T9932] unix_stream_read_sock+0x61/0x90 [ 384.518477][ T9932] sk_psock_verdict_data_ready+0x115/0x170 [ 384.524326][ T9932] ? sk_psock_start_verdict+0xc0/0xc0 [ 384.529828][ T9932] ? _raw_spin_lock+0x8e/0xe0 [ 384.534551][ T9932] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 384.540393][ T9932] ? skb_queue_tail+0xcb/0xf0 [ 384.545108][ T9932] unix_stream_sendmsg+0x7c4/0xc80 [ 384.550254][ T9932] ? unix_show_fdinfo+0xa0/0xa0 [ 384.555431][ T9932] ? bpf_bprintf_cleanup+0xc0/0xc0 [ 384.560586][ T9932] ? security_socket_sendmsg+0x82/0xa0 [ 384.566131][ T9932] ? unix_show_fdinfo+0xa0/0xa0 [ 384.571022][ T9932] ____sys_sendmsg+0x5a2/0x8c0 [ 384.575945][ T9932] ? __sys_sendmsg_sock+0x40/0x40 [ 384.581016][ T9932] ? import_iovec+0x7c/0xb0 [ 384.585777][ T9932] ___sys_sendmsg+0x1f0/0x260 [ 384.590581][ T9932] ? __sys_sendmsg+0x250/0x250 [ 384.595569][ T9932] ? __fdget+0x1a1/0x230 [ 384.599857][ T9932] __x64_sys_sendmsg+0x1e2/0x2a0 [ 384.605101][ T9932] ? ___sys_sendmsg+0x260/0x260 [ 384.610345][ T9932] ? ksys_write+0x1eb/0x240 [ 384.614903][ T9932] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 384.621013][ T9932] x64_sys_call+0x4b/0x9a0 [ 384.625815][ T9932] do_syscall_64+0x4c/0xa0 [ 384.630266][ T9932] ? clear_bhb_loop+0x50/0xa0 [ 384.635504][ T9932] ? clear_bhb_loop+0x50/0xa0 [ 384.640317][ T9932] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 384.646287][ T9932] RIP: 0033:0x7fd74e646be9 [ 384.650736][ T9932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 384.670560][ T9932] RSP: 002b:00007fd74d0af038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 384.679011][ T9932] RAX: ffffffffffffffda RBX: 00007fd74e86dfa0 RCX: 00007fd74e646be9 [ 384.687014][ T9932] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000008 [ 384.695292][ T9932] RBP: 00007fd74d0af090 R08: 0000000000000000 R09: 0000000000000000 [ 384.703736][ T9932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 384.711919][ T9932] R13: 00007fd74e86e038 R14: 00007fd74e86dfa0 R15: 00007ffe494d0678 [ 384.720021][ T9932] [ 384.852698][ T344] ------------[ cut here ]------------ [ 384.859472][ T344] kernel BUG at net/core/skbuff.c:1727! [ 384.865091][ T344] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 384.871283][ T344] CPU: 0 PID: 344 Comm: kworker/0:3 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 384.881548][ T344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 384.891928][ T344] Workqueue: events sk_psock_backlog [ 384.897322][ T344] RIP: 0010:pskb_expand_head+0x11a5/0x11d0 [ 384.903152][ T344] Code: 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c de f3 ff ff 4c 89 e7 e8 4c 06 f4 fd e9 d1 f3 ff ff e8 82 8b b5 fd 0f 0b e8 7b 8b b5 fd <0f> 0b 48 8b 4d d0 80 e1 07 80 c1 03 38 c1 0f 8c b2 fa ff ff 48 8b [ 384.922927][ T344] RSP: 0018:ffffc90007a77a08 EFLAGS: 00010293 [ 384.929115][ T344] RAX: ffffffff83b32455 RBX: dffffc0000000000 RCX: ffff88810da262c0 [ 384.937177][ T344] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 384.945251][ T344] RBP: ffffc90007a77aa8 R08: dffffc0000000000 R09: ffffed10239ffd86 [ 384.953235][ T344] R10: ffffed10239ffd86 R11: 1ffff110239ffd85 R12: 0000000000000e80 [ 384.961232][ T344] R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000008080 [ 384.969209][ T344] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 384.978431][ T344] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 384.985019][ T344] CR2: 0000000100000000 CR3: 000000013ba6e000 CR4: 00000000003506b0 [ 384.993083][ T344] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 385.001082][ T344] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 385.009615][ T344] Call Trace: [ 385.012907][ T344] [ 385.015848][ T344] __pskb_pull_tail+0xb1/0x1480 [ 385.020805][ T344] sk_psock_skb_ingress_enqueue+0x67/0x410 [ 385.026716][ T344] ? kmem_cache_alloc_trace+0x119/0x270 [ 385.032274][ T344] ? sk_psock_backlog+0x876/0x1230 [ 385.037403][ T344] sk_psock_backlog+0xa72/0x1230 [ 385.042354][ T344] ? sk_psock_init+0x6f0/0x6f0 [ 385.047127][ T344] ? wg_ratelimiter_gc_entries+0x41c/0x440 [ 385.052940][ T344] ? pwq_dec_nr_in_flight+0x18c/0x3c0 [ 385.058315][ T344] process_one_work+0x6be/0xba0 [ 385.063174][ T344] worker_thread+0xa59/0x1200 [ 385.067865][ T344] ? __kthread_parkme+0xac/0x200 [ 385.072824][ T344] kthread+0x411/0x500 [ 385.076902][ T344] ? worker_clr_flags+0x190/0x190 [ 385.081929][ T344] ? kthread_blkcg+0xd0/0xd0 [ 385.086524][ T344] ret_from_fork+0x1f/0x30 [ 385.090946][ T344] [ 385.093990][ T344] Modules linked in: [ 385.145578][ T344] ---[ end trace 0b0dde8174af4b7a ]--- [ 385.151187][ T344] RIP: 0010:pskb_expand_head+0x11a5/0x11d0 [ 385.227791][ T344] Code: 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c de f3 ff ff 4c 89 e7 e8 4c 06 f4 fd e9 d1 f3 ff ff e8 82 8b b5 fd 0f 0b e8 7b 8b b5 fd <0f> 0b 48 8b 4d d0 80 e1 07 80 c1 03 38 c1 0f 8c b2 fa ff ff 48 8b [ 385.276935][ T344] RSP: 0018:ffffc90007a77a08 EFLAGS: 00010293 [ 385.283465][ T344] RAX: ffffffff83b32455 RBX: dffffc0000000000 RCX: ffff88810da262c0 [ 385.291712][ T344] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 385.299969][ T344] RBP: ffffc90007a77aa8 R08: dffffc0000000000 R09: ffffed10239ffd86 [ 385.308836][ T344] R10: ffffed10239ffd86 R11: 1ffff110239ffd85 R12: 0000000000000e80 [ 385.317092][ T344] R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000008080 [ 385.333591][ T344] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 385.342897][ T344] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 385.349864][ T344] CR2: 00007f6d7f0ad198 CR3: 0000000120da1000 CR4: 00000000003506b0 [ 385.357980][ T344] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 385.366136][ T344] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 385.374374][ T344] Kernel panic - not syncing: Fatal exception [ 385.380682][ T344] Kernel Offset: disabled [ 385.385185][ T344] Rebooting in 86400 seconds..