last executing test programs: 6m14.971126414s ago: executing program 32 (id=374): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x20e}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5d, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x67, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x12, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r2, @fallback=0x4, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'pim6reg1\x00', 0x1}) ioctl$TUNGETVNETLE(r5, 0x800454dd, &(0x7f0000000800)) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES16=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r7}, &(0x7f0000000540), &(0x7f0000000580)=r8}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r7, &(0x7f0000000780)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)) 6m14.61520657s ago: executing program 33 (id=376): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x12, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000000000000000000000000008500000050000000180000000000000000040000000000009500000000000000846bdab3ee67f88bffb73826c5f82839a2756bd52b2f8f914b1ba42e6b0e7ed0388f8c5818adb3c980afb3f8a6efbb9ddbf3aab033ba3bd652d837bb47636b061a9b03d254b0bd9626b583eccafdb033f6"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x78) 5m13.361724323s ago: executing program 4 (id=958): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="efff000000000000b7080000000000007b8af8ff00000000bfa200000000000007060000f8ffffffb7030000f0ffffffb604000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000300)=ANY=[@ANYRES32], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1d, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54, 0x0, 0x0, 0xfffffffe}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r3, 0x0, 0xe40, 0x0, &(0x7f00000000c0)="5cdd3086ddffff6633c9bbac88a8862608dffd00139fb7a884bdfc14f4870800", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="00000000feff000000000000cc902f2856ad6a1f3b3f3fd332ba724637f9b474342681ff956582d0ded2b2d666cdef95926d7053af63596e2a1083eb9530cf96e04a64b746bc728ff6177d9f4476f8e1e57d594b78943db9c63524d36a1382d40434b9813b10ea61daa178daf9b013b66eafc3a855d125928e5d21682aa468f533867131f3e772dc4650e27be5b87c23cc1f7f7e3763eb59af74bcafdba2292f229575135a0329a99bb25b51592c7e19f0db1757003f07769ef98af7f1d5c861c7662316534c2a46af0988", @ANYRES32=0x0, @ANYRES32, @ANYRES8=r0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000005740)=ANY=[@ANYBLOB], 0x0, 0x4a}, 0x28) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(0x0) socketpair(0xf, 0x3, 0x2, &(0x7f0000000600)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0f00"/20, @ANYRES32, @ANYBLOB="0000004a056067cea9a4c8f0f3e81a70879e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) perf_event_open(&(0x7f0000000740)={0x500, 0x80, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0xc}, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000000380), 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000001b00)={0x1, &(0x7f0000001ac0)=[{0x74}]}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f00000002c0)) 5m13.099470506s ago: executing program 4 (id=960): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000ae6100000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000210085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000500)}, {0x0}, {&(0x7f0000000640)="399c76c550e9ae5ecfb11c897b5fc37d0dbc840b7a7783a8e2978abdc5ece5b2356883a031fb475ae9ae34decf88c24096e86254f7b49339d25df2eadb454b65d66123a35c627f1fb6c822cea4147484f563683c5448af33ac51541c4b7d4516945a31cc79d8b48e3063a01db593088b15ee6098a9e303a16cb779901631c363b8acd108eebde0ce29e65746e11e7c7e0e3126f5edf478ce774ba1fe442ad9a5d75e876f0d3447e5635102", 0xab}, {&(0x7f0000000700)="a3e18ec99aa024fdf7a6acfd8c7b8df653f268cb88bfd867ccbf839e4c17342804336d327ccc0fc6bb8541e373c25b43aa8e4c71beb0fce229535625655f8f203f4122c589e7470feed0a735e8f7fccc96154f1b209890fb995495306ea37feb4272be5174e4b23d1526691ec58214511aec25e272a1df9237d31f115312204d207bf56470cba432c9424ca4f79c317690eb8b501f09653b1fa9064be925ab1a608884238245804caa0a4dd40dae0beba3efb8574e25e41e51b6af1fda3225", 0xbf}], 0x4, &(0x7f0000000940)="c888f359dda90dec57fec8c7cc80890d82031840dbde892739ad59ff97ac145bac248fa47619b4b4a08178b72d02a688f661528580543fd424cd326e07d7bf323f90aa054e3987fd4c89", 0x4a, 0x4048000}, 0x4000) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0d00000007000000010003000800000007000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="ff073ebd0100000000000000000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, &(0x7f0000000240)=0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) close(r2) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r5, &(0x7f0000000600)=0xd, 0x18) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x40, 0xfd, 0x20, 0x80, 0x7602, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x1886e5ad6ab3e97, 0x2, 0x8, 0x3, 0x0, 0x4, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r6, 0x0) 5m12.590683772s ago: executing program 4 (id=965): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={0x0, r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 5m12.52717754s ago: executing program 4 (id=966): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000540)="d2ff03076003008cb89e08f088a82b9a86dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080", @ANYRES64=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffd70, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b000000000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff00"/20, @ANYRES32=0x0, @ANYBLOB], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x17) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000580)={&(0x7f0000000280)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000440)=[{&(0x7f00000002c0)="8546ceaa3dc7de8819716bd6e7524f2cd3dd4250bdf6bd8b6e5dfa8ea37ce6e96dd1cfa2c42b56cca10d378456e5ce3a537c6549ec599d5b7d70625d7cddbad1caa6837b596223b2fc2765fe7d644ef9d080b6466199579663", 0x59}, {&(0x7f0000000340)="1b594b3f49b8fa76bbde53888aba1607d9c5eb8231e836d520dbccdb390f6e5d2d1600937760ee3dc23f25c43173d4d0702b7bf744df076e8a312a4c6580cb8fc546cd291206dabbf57a1e9138080bccc726c8bb5e2d4006ba070d78ffc1e0119e2d4e7166b10ca2057aa060739560f218eec2005d0bf7f49d612c1ba1779e8a6bd23c198af018bf6fce90a0f2fe39beecec64da16966970f5c2fb0decea6ba6b9a8935afc3aee44b06134e9937c4143790a0e3a060877dabb7f74d1b30122ef3a3d2b00b73133579fc751f47fcbc3dc101e041af3856e1d1737835f2c7e24e80470c1187d905a2e608ea8", 0xeb}], 0x2, &(0x7f0000000480)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0x100}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}], 0x60}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 5m9.816230229s ago: executing program 6 (id=969): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2888, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x2, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) 5m9.785059623s ago: executing program 5 (id=970): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r0}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000000), &(0x7f0000000180)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0a00008ec502f4343cf144539ab1f39a27026f8f30d1498c7e803cc4fc2f739eb806d3d8449803af6d8d5f39a674d6cc0be5caaae28033e50a39e3740fa9920019849ac39cff42a00ec331f140e3bba4943c1ad77ff83ec37cbbfe4184", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000030000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffc4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x12, 0x2, 0x8, 0xd0eb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000b1cebe3aac31776d27fdd73c0d657f164dec867a5bf7ab817c4b78f27507988bb8f762b978196e744f7e08a24f56029ef55544ccb30d8e45710f79777687857577c1bc946c7842cd384eca0d865593c0b2477292f915612cd6609b1bf88a3205609c46cd77e6b92555e1f99023d9fcd4b082398a3ce753db26753dc6dcf7db8bb7f5cc75a117d4755c77599a2e29e1969bafe5f28d6eac5030bd2c41d278980f8002d07dd0ba31b5f8a78aafbc70"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x9, 0xa249, 0xa6c, 0x100, 0xffffffffffffffff, 0x7f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) 5m9.769880435s ago: executing program 6 (id=971): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000100"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair(0xa, 0x1, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000040000000f00000000000001000000006d0028010a00000000000001000000006d0031030900000000000007000000000600000000000e0300000000000000005f6100da1adb6d00fa626430de59fdba44cb900ee38eaf429ddab9b4f83fcc5446899e417aad375e163b787b97075dbaa53f0ec51d98"], &(0x7f0000000280)=""/153, 0x58, 0x99, 0x1}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)=ANY=[@ANYRES64=r1, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000006aebbe1849127d64fe1d0a5e6ced107a9570c13d86f08e7e03c1f8856d9900c47a521075b805079f9fa095eaaba7344068fad47640f03e4faf38f38e52af7f5468034fd1e56005987393b537187c33dd49be3bba93d848b6d6a3b8a6ebbf2d310fa52f0488e259ea74ce1cc19d5274c2917b92046fe9cdc780c80cad1c39b4034844186c", @ANYRES64=r0, @ANYRES32=0x0, @ANYRES64=r1, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRES64], 0xffffffffffffffa2) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000400000000000000000004850000006d00000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x18) r3 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x5, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xa8, &(0x7f0000000500)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r4, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x0, 0xfffffffffffffd21, 0x0, 0x0, 0x0, 0x207fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c25000000000006198a211eae5369000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3, 0x20000000000000b9, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='jbd2_handle_stats\x00', r7, 0x0, 0x3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 5m9.718910561s ago: executing program 4 (id=973): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000006000000eb00000008"], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_clone(0x1c080, &(0x7f0000001180)="7e09748ebfb224d7686102fcbbeb0a84d5d78d9b24114bbe4a7527718f48b33f136d035f6c", 0x25, 0x0, &(0x7f0000001240), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001000)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x1f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r6 = perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r5, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r7, &(0x7f0000000d40), 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r3}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002040)="6394d3488330666dbdd9950eab66acedb7d63142f2579bb5c49d6afcf733d53868f022d406603472f8fe856b8b1dec832a9e1aed59fed3cfabd3b12e55901fc713c22cf897a36932c18e9b56a1b27cd6e87f4ad3feddd6f92547771e227cd37d9d513fd0cd3064f568ad9d7d7392db22625d406496d092a39dcbb89252e3736d81263d4c2f60eaf0bdf5bf510d0d046260b1bc6fabeecf59289a42c09ce4b5488d1e094bb040ad5250952d8f7e0e9ae0b1e1dc11e940a60a902045731b520ab814026fd0fa683e994eaec41845f221df61bc", 0x0, 0x4f, r2, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 5m9.597667287s ago: executing program 0 (id=975): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x12, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000000000000000000000000008500000050000000180000000000000000100000000000009500000000000000846bdab3ee67f88bffb73826c5f82839a2756bd52b2f8f914b1ba42e6b0e7ed0388f8c5818adb3c980afb3f8a6efbb9ddbf3aab033ba3bd652d837bb47636b061a9b03d254b0bd9626b583eccafdb033f6"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x78) 5m9.471954303s ago: executing program 0 (id=977): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x3, 0x1, 0x0, 0x6, 0x4, [{0x3, 0x3}]}]}, {0x0, [0x61, 0x0, 0x2e, 0x5f]}}, &(0x7f0000000380)=""/187, 0x32, 0xbb, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000004000000040000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x18) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000000000000104000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000b5700e59803e98f008060000000000000000"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000000000000000000000104000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000b5700e59803e98f008060000000000000000"], 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r6) syz_clone(0xc4201100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0xc4201100, 0x0, 0x0, 0x0, 0x0, 0x0) 5m9.469924414s ago: executing program 2 (id=978): openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r0}, 0x8) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, r0, 0x1, 0x1}, 0x50) close(r1) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x3, &(0x7f0000000800)=ANY=[@ANYRES32=r0], &(0x7f0000000200)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000400)='devlink_trap_report\x00', r3}, 0x18) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) (async) close(r2) (async) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 5m9.367521837s ago: executing program 2 (id=979): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000e6030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) 5m9.310481914s ago: executing program 6 (id=980): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x1882a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) socketpair(0x10, 0x0, 0x14, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) 5m9.309773014s ago: executing program 2 (id=981): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2888, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x2, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) 5m9.18442578s ago: executing program 2 (id=982): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/183}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0xfd, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext, 0x800, 0x0, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2ff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000001811000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r2}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839", 0x5}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x18) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r3}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r9}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 5m8.910469136s ago: executing program 0 (id=983): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="05000000050000000200"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000002c0)={&(0x7f0000000340)="5f9ae5b024179d9e5408a026b8296060dde11fa6f19e888d269c6c66df5e798a1f28df0358485f76b06b948152b12fe5d32c1e28a899b6dcc41b2365164a9c66daef79613be75ff2812bce8c3e2d7c38fb97898f16be695d82a679f742db7652dfc54401d99f31d05b5cd38c0e9e10d89b63aaf3c8ca35d082975481e3c4f10e59a34d85aa03860aaa638551e338affddc308dc65e604c", &(0x7f0000000580)=""/162, &(0x7f0000000180)="b3d98c47f640f80898feb9c95e856949253c6c03a9af3cb077918e3c635b68cf8b8ba0efbb1cd4c42acc02827c9caf945a0fdb65c09bc78adaf654aad240787272163098492627291307db03aecfd0a9a9cbe435834b", &(0x7f0000000640), 0x80000000, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000d40)=ANY=[@ANYRESOCT, @ANYRES8, @ANYBLOB="c4793b5c1d3c756f79ab456f2c5fd80aad2ab04a8a26eb25d3bba8fa03431f4cba8d83f00488dcdecfc673698d982453bd54e321ebf007a9ba83fd023a69b051e9b069599bcdedd63ac2d7e1ca5626612747803b961479ac4fa3a4a69e94042dcd3ec6dd8fafa8dcfad5e965d4e0dd25928a163e8e991f13e94fd5ba73eea83fc8b9bd841959", @ANYRESHEX=0x0, @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={0x0, &(0x7f0000000580)=""/56, 0x0, 0x38, 0x1, 0x0, 0x10000}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x21, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc5c}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb90}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000006c0)='syzkaller\x00', 0x1, 0xdf, &(0x7f00000009c0)=""/223, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x2, 0x7, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000b00)=[{0x3, 0x1, 0x10, 0x9}], 0x10, 0x2c}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) 5m8.882916519s ago: executing program 5 (id=984): r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0xffffffffff800000, 0x12) (async) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(r1, &(0x7f00000000c0), 0x2, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1a, 0x36, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0xffffffffffffffff}, @map_val={0x18, 0xa, 0x2, 0x0, 0x1}, @generic={0x7, 0x8, 0x5, 0x5, 0x2400000}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @ringbuf_query, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x5, 0x2, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfff}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r2, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xbd, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xe4, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) socketpair(0x0, 0x800, 0x1, &(0x7f0000000740)={0xffffffffffffffff}) (async) r4 = openat$cgroup_int(r1, &(0x7f0000000780)='memory.min\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000007c0)=0x28, 0x12) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000840)='cpu.max\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000980)=[0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0xea, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x2f, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) (async) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000cc0)={r6}, 0x8) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d80)={0x6, 0x0, &(0x7f00000008c0), &(0x7f0000000900)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x10, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c40)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000c80)={0x1, 0xb, 0x7, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000d00)=[r8], &(0x7f0000000d40)=[{0x0, 0x1, 0x9, 0x3}, {0x2, 0x4, 0x9}], 0x10, 0x2}, 0x94) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000e40)={'batadv0\x00', 0x20}) (async) r10 = getpid() r11 = gettid() sendmsg$unix(r3, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000e80)="1877ba0c4b8de917150425f65f39d54391cca6c86d8740388530192a001b82120bf5141222ca9377ebae64dbdba7de90298903b7783210423e2236724209fc3ccb86d24ed55cbec081724c778ede9115d78b64d9da8edff06c1fcbedefb66fc3ed31b429e60ff1f723c16714293bed7b49945d57d838397ccf35013afbf89368f34589b323ef4aba1a41746b650230e281be1051e4e531602fec0909479fe594b019c2078f76b2dbb22f076a5105c9f2b4937624cff66f6f69577546bfa391e7", 0xc0}], 0x1, &(0x7f0000000f80)=[@cred={{0x1c, 0x1, 0x2, {r10, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xffffffffffffffff, 0xee00}}}], 0x40, 0x40000d0}, 0x4) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001000)={0x4}, 0x8) (async) openat$cgroup_int(r6, &(0x7f0000001040)='hugetlb.1GB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000013c0)={&(0x7f0000001080)="b160f572eed7205ec31dd9c02499e2ffa4d15c11cf9df424c21a6be8ed8fc71216bddd880ed0f71e691169003c23eeca5b3d0d8757e3603e30badf86e72511fa21bd677a59b2af7a9a09d6d9fd097bd35179bae9b80e9e8e58786ebadfe1", &(0x7f0000001100)=""/246, &(0x7f0000001200)="e44a2a46ddd04c053d31146776ccef3779d69a779aed40431da3fabe78c0e41d1719f5add8ebefb4fafef2a29571450e062d46245b3461123cf923ad9c8f3932774c5954e49d6a26a43c96a0cecc8118165bbcb3754c5fe840424a437c849cb369de6da3547c5f22ac18808febf3f9a571985569c7ef071fb2eb4c25bbb877f4f7f2184ec8395167e43ee317a2f6eb0356f5b7991ea2990b279bee027b8a", &(0x7f00000012c0)="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", 0x6, r8, 0x4}, 0x38) (async) perf_event_open$cgroup(&(0x7f0000001400)={0x1, 0x80, 0x7d, 0x9, 0x5, 0x7f, 0x0, 0x100000000, 0x1, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5ee, 0x4, @perf_config_ext={0x2f, 0x8}, 0x20, 0x6, 0x4, 0x9, 0x1, 0x10000, 0x0, 0x0, 0x1f7a, 0x0, 0x4}, r6, 0xb, 0xffffffffffffffff, 0x4) (async) openat$cgroup_type(r8, &(0x7f0000001480), 0x2, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000014c0)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={r9, 0xe0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000001540)=[0x0, 0x0, 0x0], &(0x7f0000001580)=[0x0], 0x0, 0xf0, &(0x7f00000015c0)=[{}, {}], 0x10, 0x10, &(0x7f0000001600), &(0x7f0000001640), 0x8, 0x42, 0x8, 0x8, &(0x7f0000001680)}}, 0x10) (async) sendmsg$tipc(r3, &(0x7f0000001b40)={&(0x7f0000001800)=@name={0x1e, 0x2, 0x2, {{0x1, 0x2}, 0x4}}, 0x10, &(0x7f0000001a40)=[{&(0x7f0000001840)="fb22f5de2f90c2604c4001e765fa6d3b7a70736f18e1b543cd2e65112a39ee62aefa187dd92bea130cd875ae07bccf8110abc7884ef282f752e3fb9098caa750a9eff1d2427462251e", 0x49}, {&(0x7f00000018c0)="585ec1c0260e5f54b0545884067085b1b59f6ecbbd718bb7bf01a4b2fa1294b1cdab42b4e07aa427baebc13b530be4927f7aeac96b8e8ee9e0dc83ff8fab133639bc8471554abd4519fa716b7022249c230eef0015cbc84b668e9cc17723c7539694236fa2c87e3ce418dbe982a1acf8f48c24e92c1987b3863f7397e5809ec0bcfe26cf70c9571a05697dc361a81a5a4abf087982821a7460b71ec5a536d607123fdf3d00368b", 0xa7}, {&(0x7f0000001980)="b21345e899dbba83eaa6f19cb685626838f0ff4862051c2d4936e038d22a21769177dd07f042a71d3983489ddccbf71c37d9a935d702687e8371394af6b7e61fc5fe06e1b857bf629852360f828de456bb5aef2ca395f842a78222aed9be0314d04d23548ef7e3e8f4f597eeaad20aa0b3fe0928c1cf", 0x76}, {&(0x7f0000001a00)="074ea7dd1c975c0cefbf54a82d0b394a6e307b7baeb428dcdb1dc698b5a92765cebe5804e3921c2d219de9ad", 0x2c}], 0x4, &(0x7f0000001a80)="924c344fd09a139d0867e9bb4e8a618fcce7dca2baa3fed1ac2e1294da9616fff73e9f26b5de61a6f68c37aab44b235e21c0d7e3b6d67e14eb353a4c9a920f29e1c6bfd2ee36bfa48443ac40104bd1b151cdd57112183723bc6eaff371ee084f1075a3bcc76edb69057063a24af5e5530139d39104be3f118d89d9b58c66ace82998788f273b538f1c26a54bbb42e7a9460a", 0x92, 0x44000}, 0x20008040) (async) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001b80)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r12, &(0x7f0000001bc0)='cgroup.threads\x00', 0x2, 0x0) (async) ioctl$TUNSETVNETBE(r8, 0x400454de, &(0x7f0000001c00)=0x1) 5m8.852118103s ago: executing program 5 (id=985): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 5m8.834920565s ago: executing program 4 (id=986): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071120e00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) r1 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f00000000c0)=[{0x8, 0x1, 0x3, 0x5}, {0x2, 0x4, 0xcc, 0x31}, {0x0, 0x2, 0x81, 0x7}, {0x9, 0x5, 0x2, 0x2}, {0x5, 0x78, 0x40, 0xb}, {0x8, 0xd, 0x7, 0x800}, {0x5, 0x0, 0x81, 0x10}]}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000700)=ANY=[@ANYBLOB='1-0:', @ANYRESDEC, @ANYBLOB='C'], 0x31) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000080), 0x2, 0x0) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) 5m8.758533435s ago: executing program 5 (id=987): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0xa, 0x1, 0x8, 0xf}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="1e0308003c5c980105006360864668f82ffdd569d2f630b5e033ff11edf1c5b1c733d2acb165fe588cd568cd1f31b87b68b00ad86558"], 0xffdd) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x4, 0x800000000000c8, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000600)={[{0x2d, 'net_cls'}, {0x2d, 'net_cls'}]}, 0x12) 5m8.758156985s ago: executing program 2 (id=988): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={0x0, r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 5m8.700714422s ago: executing program 2 (id=989): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0xa, 0x1, 0x8, 0xf}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="1e0308003c5c980105006360864668f82ffdd569d2f630b5e033ff11edf1c5b1c733d2acb165fe588cd568cd1f31b87b68b00ad86558"], 0xffdd) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x4, 0x800000000000c8, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000600)={[{0x2d, 'net_cls'}, {0x2d, 'net_cls'}]}, 0x12) 5m8.639826501s ago: executing program 0 (id=990): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffd67}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000380)='memory.swap.current\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000002000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000240)={'team_slave_0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x33}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r9, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) close(r8) recvmsg$unix(r1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001e80)={0x14, 0x0, 0x0, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x3b96795268580a22, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x2, 0xffffffff}, 0x8, 0x10, 0x0, 0x0, 0x0, r10, 0x0, 0x0, &(0x7f0000001f80), 0x10, 0x8e}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000001c0)="b15dd7cf1c000004000000000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5m8.543693753s ago: executing program 6 (id=991): close(0xffffffffffffffff) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2001, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) (async) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2d, 'pids'}, {0x2b, 'io'}, {0x2d, 'io'}, {0x2d, 'rdma'}, {0x2b, 'cpuset'}, {0x2b, 'net_cls'}]}, 0x25) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000140)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x27, &(0x7f00000001c0)=""/39, 0x41100, 0x2, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000200)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x1, 0x8}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000280)=[r3, r3], &(0x7f00000002c0)=[{0x0, 0x5, 0x2, 0x1}, {0x0, 0x2, 0xf, 0x9}, {0x0, 0x2, 0x0, 0x7}, {0x5, 0x1, 0x10, 0x7}, {0x5, 0x5, 0x1, 0x9}, {0x3, 0x4, 0x1, 0x5}, {0x2, 0x4, 0x9, 0xa}, {0x0, 0x3, 0x6, 0x5}], 0x10, 0xd1ff}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000004c0)={r4, 0x0, 0x6, 0x0, &(0x7f0000000400)="fcfe2960a9f2", 0x0, 0x5, 0x0, 0x62, 0x0, &(0x7f0000000440)="126bbfb90dd9b0f7e4128b80aaaa9304cb620fda863b0875dc174cc61c92d24ea08417917f1d2af8821490b644509b256a5f2fa71d284b671a4536843dce44d6e4caa53a77301747b5ea99d9b44df81b0fca902c72034e0a514bc1693ac78b77c077", 0x0, 0x2, 0x0, 0x2}, 0x50) (async) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x13) (async) write$cgroup_subtree(r3, &(0x7f0000000540)={[{0x2b, 'rdma'}, {0x2b, 'devices'}, {0x2b, 'memory'}, {0x2d, 'freezer'}]}, 0x20) r5 = openat$cgroup_ro(r2, &(0x7f0000000580)='rdma.current\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000005c0)={'veth1_virt_wifi\x00', 0x200}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000600)={'veth0_virt_wifi\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) (async) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000680)={'veth0_to_team\x00', @random="50540b44c638"}) (async) socketpair(0x2, 0x3, 0x6, &(0x7f00000006c0)) (async) socketpair$unix(0x1, 0xdc13369c2f6138e8, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f00000019c0)={&(0x7f0000000740)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001940)=[{&(0x7f00000007c0)="9f5d42817ca7fbf25c6c04386a073ea23d256fea4b08b94e846d0092b512134117bf77279712e10a79adbc0acadc0cf8ed888ee26093e33cb88de19f63351c70d04db92b1f815a69dab8131cdb3585eb5666bacad11ad1edf71aeb99447bc8d92d7c07c5f21bf0feda2da2cc0e0815d4859827a7a1996d626f5a22a15cfeb350d1bce96a4a8ac703629f42d4ab3d03e821264c4d805eeea37085948a9884e512a21a927dd3fef35668143842301b7ffc5f7adb2e12f630122a80a528dab5bd31ae7787154f6a6a44528fd0683d059b1bcd2fd13d61ec2094010546a2e9f663ee40204330629fe26712417b4ff7e4e5", 0xef}, {&(0x7f00000008c0)="c03ed1cbb18849e508e49dd15cfba2cb67c673e15652cdb8bdeee2e3dd56e20cee82b3c8e1bd044ac035ba9f0e3ba1668518ddfc11036b82e162a521d1cc4ef0706f0ba99d62b42341c1d52ceb", 0x4d}, {&(0x7f0000000940)="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", 0x1000}], 0x3, &(0x7f0000001980)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee00}}}], 0x20, 0x4000}, 0x40840) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001bc0)={r5, &(0x7f0000001a00)="b0c1adaab807b2315e9f2c9d0eb5617048e6d8bec6d04aeefc230741e4ef6b7c71eac5014ac95f5bd4378ec959bdf6ab0d7621529d8376bbae09252bb026b1037c24ec1b255c4df74aee9a9f5c44064fd9446e861ee7d82cbae66fa585948abd98d25332f56e373cb8f712183a411aafd4c2ded0fe33b25e86bf01c5178b172d483c31d7fed916f9859f5f8b729e95cb379418096966362e06d2033fbbd225f09ba30b369a5072110eef7af14e8ca218251bb2b908b0ca94769ba0c0f51a8b86d73b172710d996c5f395774b23853136c0ac4a31ef3c3774c0d4e39e55580fccb6c8", &(0x7f0000001b00)=""/176}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001ec0)={r3, 0xe0, &(0x7f0000001dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001c00)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000001c40)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001c80)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8f, &(0x7f0000001cc0)=[{}], 0x8, 0x10, &(0x7f0000001d00), &(0x7f0000001d40), 0x8, 0x17, 0x8, 0x8, &(0x7f0000001d80)}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001f00)=@bloom_filter={0x1e, 0x5d09, 0x6, 0x7ef21c26, 0x405, r3, 0x6, '\x00', r7, 0xffffffffffffffff, 0x4, 0x3, 0x1, 0x5}, 0x50) (async) openat$cgroup_subtree(r3, &(0x7f0000001f80), 0x2, 0x0) (async) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000021c0)={&(0x7f0000002080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xc, [@decl_tag={0x3, 0x0, 0x0, 0x11, 0x2, 0x1}]}, {0x0, [0x0, 0x5f, 0x30, 0x0, 0x5f, 0x2e, 0x61, 0x30, 0x5f, 0x30]}}, &(0x7f00000020c0)=""/238, 0x34, 0xee, 0x0, 0xffffffff}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000002280)={0x20, 0x5, &(0x7f0000001fc0)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @alu={0x7, 0x0, 0xc, 0x3, 0x9, 0x50}, @map_fd={0x18, 0x6, 0x1, 0x0, r3}], &(0x7f0000002000)='syzkaller\x00', 0xa8f3, 0x30, &(0x7f0000002040)=""/48, 0x40f00, 0x32, '\x00', 0x0, @netfilter, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002200)={0x3, 0x10, 0x8, 0x20000}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f0000002240)=[r3, r5, r8], 0x0, 0x10, 0x1}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002340)='./cgroup/syz1\x00', 0x1ff) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002680)={0xffffffffffffffff, 0xb4a4, 0x8}, 0xc) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000026c0)={&(0x7f0000002380)="3853a7125213d49bea3edc820b9b4439bc7b4232ebe7c20b7f88440f4c014097610c475eb18f679c355a6decd434f81650350a6c4b68a09e9e5ec963aa0c7aab67bcc6aed4b7eedcbe75d65cb8dbd4af361d6de7deee827f664fdc0ec63de4e19d048f4d426e3527c10688df07ad4287f91ecbbb5d2cb463ab34fd7e4f74fac1200ec96bafef39abf69635e1f243dd28c5364dc3972f03b612a7fbe9dc27408fe6c23ea80c84a59571d93aacaf9f4eaa10d7fa35a709c40ef26197174c34476a4b811de8cf2bee004dfcf1853ec0e531f7abdab64575e51acce730efafbab2368efef6397a815be45709ddcd478396", &(0x7f0000002480)=""/22, &(0x7f00000024c0)="63edf888dd983abd4b64eaa805214d0393668dbd015d03e1a1d9f1536c6938e689c8c5f7bd796abd12ad2d09875d5faf9165ad4c1f4f2993fbc63ff55f7c2dce2795dcb7758c62892c9e5d1ac0dda17b6d8ed423b2250903c118136c096953eee5e493e7ed4e7c32bb5b97fa56f01b68d0bf370097cbde1bab406a68f9f00729c87546587b03bdfd", &(0x7f0000002580)="f307dec2be66ffdb98f6d5a192c4adafb4cba3c48766bd13de471875653068eca63223edb9757d2e776eb42f1df330ce839344b7c3a8bed4e239bad715a0d379df54e90264d97d3860267f1cd5d6df955ed392b7c96a55ce6d2b528565bcc00605e52e4ef827f588c056effde03a59420a7b2f21bfef0fb88a71eebb4b45566d52373eb0ffb4b2260aab5ee9ee55fae03a4ad530b6b1414a103a656c0212404256dba7c0afaa2cf9273e54b542c1791beb10e109d5e92e8fa503e167ab9a2047ed5c8418c5654ea0cdf6a2db7c82d1000c0cca2594ce9504e1ed3471678bb05166141cbc66c380ced2c370591776f518123d", 0x200, r10, 0x4}, 0x38) 5m8.543034783s ago: executing program 5 (id=992): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2888, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x2, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) 5m8.515437966s ago: executing program 6 (id=993): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000e6030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) 5m8.514391537s ago: executing program 0 (id=994): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="b40800000000000073119b00000000008510000002000000b7000000000000009500c20000000000950000120000000079c1221a5629f87281ed8dd57a36c4bf2acc4811c8ac0ea254f2"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6978800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0600000000000000000000000000000020000000000000000000000000000900a287ffa62b5fbf60c8d28f85073f6de74eceeef7ca7b8727efd2407b5106244bc540bd5ece976e5cbc5b3a3bc345ce1d9ab2fb0448c3bf3af0180140c3406f93412093100a44419d5a87542a6350db7137ce35097eedf8807ea0d3dbece6ea99e7b9118c71690eec4f3c7c39de5c4eb8d51dd879bff4f635151f6b183ece23513ad05535ff59c25c143bc2b4d95537069b9d7ee9f9541b306f"]) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="070000000400000000e800000400000020000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="320a00000100000069106c3b292e0b88cad9d6fc0d5fea16"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21}, 0x94) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000004800"], 0x48) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000840)=ANY=[@ANYBLOB="180000005d0000000000000000001812800000007040e52f843fe823206c26802edb2e4e2406017bf4d2e6c3959a4a21f8636046be0678e26c1f5b95e117be8967f5242858e0f694616f19d66a724059e26dddc7a297dcd8", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r6, &(0x7f00000000c0), &(0x7f0000000140)=""/116}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000d400000010000000350000000000000095000000000000005727f060e0b274e73dbd0f85d0cd2a1fc5c546297f000000d870402345f4cd32986892c237bec9e7604d0ffcf86e2f89820d233697b0f0a23c7aa27429916b566f48ced9dba83f1d32743dfadedcb674e0a75cacbbc0df8d43627b0bacfed05f3df0f47d5114c516c44048712b753711651d760ccfd477785226b6e714aaa5c94145e2c8061d1b877a4831fc946568a845c36344c25056aecc0d902c9f"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x10, &(0x7f0000000200)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}, {}, {0x85, 0x0, 0x0, 0x1b}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7ff}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x18) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe43) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1b) (async) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) 5m8.48984495s ago: executing program 6 (id=995): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000500000002"], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xb8, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xb2, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0004f678ec630000000066"], 0xd) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x8202) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) 5m8.482647151s ago: executing program 0 (id=996): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000006000000eb00000008"], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_clone(0x1c080, &(0x7f0000001180)="7e09748ebfb224d7686102fcbbeb0a84d5d78d9b24114bbe4a7527718f48b33f136d035f6c", 0x25, 0x0, &(0x7f0000001240), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001000)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x1f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r6 = perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r5, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r7, &(0x7f0000000d40), 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r3}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002040)="6394d3488330666dbdd9950eab66acedb7d63142f2579bb5c49d6afcf733d53868f022d406603472f8fe856b8b1dec832a9e1aed59fed3cfabd3b12e55901fc713c22cf897a36932c18e9b56a1b27cd6e87f4ad3feddd6f92547771e227cd37d9d513fd0cd3064f568ad9d7d7392db22625d406496d092a39dcbb89252e3736d81263d4c2f60eaf0bdf5bf510d0d046260b1bc6fabeecf59289a42c09ce4b5488d1e094bb040ad5250952d8f7e0e9ae0b1e1dc11e940a60a902045731b520ab814026fd0fa683e994eaec41845f221df61bc", 0x0, 0x4f, r2, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 5m8.482017941s ago: executing program 5 (id=997): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 4m32.055943288s ago: executing program 34 (id=996): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000006000000eb00000008"], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_clone(0x1c080, &(0x7f0000001180)="7e09748ebfb224d7686102fcbbeb0a84d5d78d9b24114bbe4a7527718f48b33f136d035f6c", 0x25, 0x0, &(0x7f0000001240), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001000)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x1f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r6 = perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r5, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r7, &(0x7f0000000d40), 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r3}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002040)="6394d3488330666dbdd9950eab66acedb7d63142f2579bb5c49d6afcf733d53868f022d406603472f8fe856b8b1dec832a9e1aed59fed3cfabd3b12e55901fc713c22cf897a36932c18e9b56a1b27cd6e87f4ad3feddd6f92547771e227cd37d9d513fd0cd3064f568ad9d7d7392db22625d406496d092a39dcbb89252e3736d81263d4c2f60eaf0bdf5bf510d0d046260b1bc6fabeecf59289a42c09ce4b5488d1e094bb040ad5250952d8f7e0e9ae0b1e1dc11e940a60a902045731b520ab814026fd0fa683e994eaec41845f221df61bc", 0x0, 0x4f, r2, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 4m31.915089327s ago: executing program 35 (id=995): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000500000002"], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xb8, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xb2, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0004f678ec630000000066"], 0xd) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x8202) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) 4m31.899698349s ago: executing program 36 (id=989): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0xa, 0x1, 0x8, 0xf}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="1e0308003c5c980105006360864668f82ffdd569d2f630b5e033ff11edf1c5b1c733d2acb165fe588cd568cd1f31b87b68b00ad86558"], 0xffdd) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x4, 0x800000000000c8, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000600)={[{0x2d, 'net_cls'}, {0x2d, 'net_cls'}]}, 0x12) 4m31.877953621s ago: executing program 37 (id=997): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90a"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 4m31.831798517s ago: executing program 38 (id=986): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071120e00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) r1 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f00000000c0)=[{0x8, 0x1, 0x3, 0x5}, {0x2, 0x4, 0xcc, 0x31}, {0x0, 0x2, 0x81, 0x7}, {0x9, 0x5, 0x2, 0x2}, {0x5, 0x78, 0x40, 0xb}, {0x8, 0xd, 0x7, 0x800}, {0x5, 0x0, 0x81, 0x10}]}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000700)=ANY=[@ANYBLOB='1-0:', @ANYRESDEC, @ANYBLOB='C'], 0x31) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000080), 0x2, 0x0) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) 5.028778994s ago: executing program 1 (id=3985): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000025ad462f803c7c372b0783cd86da98b19ac631f21b08663078ba4bf500627f356faab31c0f7b3819", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003640)={&(0x7f0000000400)=@nameseq={0x1e, 0x1, 0x2, {0x4e10a0c769da82f1, 0x2, 0x3}}, 0x6, 0x0}, 0xc040) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x0, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r1, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 3.755373818s ago: executing program 1 (id=3992): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000040000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x1ffff, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x10, 0xffffffffffffffff, 0x5) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000a000000020000000000000102000000100000010800000001000084090000000400000001000000010000000061615f5f0000305f"], &(0x7f00000000c0)=""/138, 0x4a, 0x8a, 0x1}, 0x28) 3.527760847s ago: executing program 9 (id=3993): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200"/45], 0x0, 0x37}, 0x28) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0a00000008000000010000004000000042000000", @ANYRES32, @ANYBLOB="000000000000ef25b0852a09d0da3e5a6b00"/31, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000440)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)=@generic={&(0x7f0000000240)='./file0\x00', r2}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000009c0)="01426f8ca514ab5bb6b7b05aa061bda3e15c2ed4313fce0a2ba79839a2a6c60f954e5f89648c4f2d2b3cc4bc7af2cd9e1dae61ca7cf1d0aeff20ca6343af593f2651b7b241172aa46123d2aca26016156f01909f5689ac62ca9c255a8f97da1b847a3a801ae13abd32425a99c5d8d411aacee5ab681fbf8b9bf80f1d7c7022a2ed3e0a3d665cd73fcd6885", &(0x7f0000000140), 0x1403, r1, 0x4}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xf, 0x4, 0x4, 0x7}, 0x48) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xec1a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x12, 0x300, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x300, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x2000000}, 0x28) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2.9583994s ago: executing program 1 (id=4001): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="07000000040000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000e6030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) 2.904157027s ago: executing program 1 (id=4002): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="11000000040000000400000009"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000000000000b7040000000000008500000033000000850000000700000095"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r6, 0x0, 0xf00000000000000}, 0x38) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) r8 = getpid() sendmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="41aebaea5c337a9aeee623bc2c0338071320a534f9eff038f491e8885f6bd9987358757827613e15c2fb089ce9eea91916b8266571c2d2f4224ef75e9287ee5be0c7a8428d9920a092f58c9b5e6a21ea42ae6446c6209e78b4360ed5e72ae38f356d9a385adcd41753f21906a1df6206186bc7b945259143d68d7c3a0f848b737bc8be5d9b3467d6360df35c034ed503c1a203959045522b22562129a13739d3507586b1", 0xa4}], 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="8e59b40d3a51ea022fc7db2ad88f640ced73325491f381fe67a3d2f26155500b0cf7bf827d28b5"], 0x38, 0x4008014}, 0x4000014) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@map=r7, 0x38, 0x1, 0x7, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r12 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r2}, 0x8) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r13}, 0x10) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000000080)={'nr0\x00', 0x2}) ioctl$TUNATTACHFILTER(r14, 0x401054d5, &(0x7f0000000380)={0x2, &(0x7f00000003c0)=[{0x50, 0x0, 0x0, 0x4}, {0x6, 0x8}]}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)=ANY=[@ANYRES32=r12, @ANYRES32=r9, @ANYBLOB="1700000012000000", @ANYRES32=r10, @ANYBLOB, @ANYRES32=r10, @ANYBLOB="7e0cfb193bddf90daa639cfe53b5f63587461005a2c6a8dee2c8cfa3f3c65710bc65194bc3291b6ab8d8e979327035042e7a31fcf3", @ANYRES64=r11], 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r15, &(0x7f0000000980), 0x20000992) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={@cgroup=r15, 0x24, 0x0, 0x200, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f00000006c0)=[0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0]}, 0x40) r16 = getpid() getpid() sendmsg$unix(r1, &(0x7f0000005380)={&(0x7f0000003e80)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000005340)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, 0xee00}}}], 0x20, 0x4000004}, 0x0) 2.609003665s ago: executing program 8 (id=4003): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x5, 0x1, 0x9, 0x2, 0x0, 0x1}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4, 0x0, r0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x5, &(0x7f00000002c0)=@framed={{}, [@map_fd={0x18, 0x0, 0x2, 0x0, r1}]}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x19}, 0x80) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r2}, 0x10) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) write$cgroup_int(r4, &(0x7f00000001c0), 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.562744511s ago: executing program 9 (id=4004): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d00000000"], &(0x7f0000000100)='GPL\x00'}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000340), 0x9) recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000880)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000900)=""/158, 0x9e}], 0x1, &(0x7f00000009c0)=""/214, 0xd6}, 0x81) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xb73f5987ebd071f0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$inet(r2, 0x0, 0x40) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) 2.283291827s ago: executing program 3 (id=4006): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000080000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0xbd5c, 0xfff, 0xb131, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x8000000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 1.855748591s ago: executing program 3 (id=4008): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x184, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043000000"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r2}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x200, 0x40830, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={0x0}, 0x100004, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x4, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000580)}, 0x8040) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000001280), 0x4) recvmsg(r5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/234, 0xea}, 0x140) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0000000005000000020000000200000005000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000d78e6984eb890c0e21ea7f34b8b5d966655c89d8f338347062f8d3b423c48eae01c3f7714bcd71d286d8e9faf9ea4ded4be81bb3e2c2c2509e02dbba125830d9afe39cd79919bc874e8a77d95ea0672f58d05c2b734b092b24a55f009ff2dc7f478e16726bf5c43123b81c46b8edbb4d345e7dba0af2b0572ef27f93", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) close(r3) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.811377408s ago: executing program 7 (id=4009): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/20], 0x48) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x6) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) close(r7) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1a1102, 0x0) (async) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYRESOCT=r4, @ANYRESHEX, @ANYRES64=r6, @ANYRES32=r0], 0x50) (async) ioctl$TUNGETVNETLE(r7, 0x40047451, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r10}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r12}, 0x10) 1.652067358s ago: executing program 8 (id=4010): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x7}, 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000140)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018300000", @ANYRES32, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000180900002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70200000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222}, 0x23) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1ff8d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002706870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a83984e68a6d80a5f5222ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0007000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1f6428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e1700000000000000000a034000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1ebbb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa5210b16eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d6"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x7000000}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) recvmsg(r3, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) 1.600246534s ago: executing program 7 (id=4011): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="100b9c8800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000005b758365433c5e9198205555", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x18) (async) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x4004743d, 0x110e22fff6) (async) write$cgroup_type(r6, &(0x7f0000000280), 0xfffffeed) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='fib6_table_lookup\x00', r3}, 0x18) (async) socketpair(0x1, 0x1, 0x0, 0x0) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80000000, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r7}, 0x10) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x3c126, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0xffffffffffffffff}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) 1.599350835s ago: executing program 9 (id=4012): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="07000000040000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000e6030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) 1.538157453s ago: executing program 9 (id=4013): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xe730f9b62bb7b53b) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x18) close(0x3) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2309, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x18) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 1.467472692s ago: executing program 9 (id=4016): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0xa, 0xfffffffffffffffc}, 0x10) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x200}) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000140)) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000100)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b23000d"], 0xfff8) 1.32253493s ago: executing program 9 (id=4017): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x94, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0xfa, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe2, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="9e690a5500000000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000900)=@generic={&(0x7f00000008c0)='./file0\x00', 0x0, 0x8}, 0x18) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x15, 0x5, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffff9}, [@map_fd={0x18, 0x3, 0x1, 0x0, r6}]}, &(0x7f0000000ac0)='GPL\x00', 0x2, 0x99, &(0x7f0000000b00)=""/153, 0x40f00, 0x7, '\x00', r3, @sk_reuseport=0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x3, 0xc, 0x3, 0x4}, 0x10, r4, r7, 0x0, &(0x7f0000000c80)=[r6, r8, r6, r6, 0xffffffffffffffff, r5, r6], 0x0, 0x10, 0xdbc}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001080)={r11, 0xe0, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000d80)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000000dc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000e40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x23, &(0x7f0000000e80)=[{}], 0x8, 0x10, &(0x7f0000000ec0), &(0x7f0000000f00), 0x8, 0x74, 0x8, 0x8, &(0x7f0000000f40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xc, 0x1, &(0x7f0000000340)=@raw=[@generic={0x97, 0x3, 0x6, 0x4, 0x9}], &(0x7f0000000380)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x4, 0x1, 0x9}, 0x10, r4, r10, 0x3, &(0x7f0000000940)=[0xffffffffffffffff], &(0x7f0000000980)=[{0x0, 0x1, 0xd, 0xb}, {0x1, 0x1, 0x8, 0x2}, {0x4, 0x1, 0xb}], 0x10, 0x3}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r13, r12, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r13}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1, 0x0, 0x0, 0x810100}, 0x0) 1.036879087s ago: executing program 3 (id=4018): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200"/45], 0x0, 0x37}, 0x28) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0a00000008000000010000004000000042000000", @ANYRES32, @ANYBLOB="000000000000ef25b0852a09d0da3e5a6b00"/31, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000440)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)=@generic={&(0x7f0000000240)='./file0\x00', r3}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000009c0)="01426f8ca514ab5bb6b7b05aa061bda3e15c2ed4313fce0a2ba79839a2a6c60f954e5f89648c4f2d2b3cc4bc7af2cd9e1dae61ca7cf1d0aeff20ca6343af593f2651b7b241172aa46123d2aca26016156f01909f5689ac62ca9c255a8f97da1b847a3a801ae13abd32425a99c5d8d411aacee5ab681fbf8b9bf80f1d7c7022a2ed3e0a3d665cd73fcd6885", &(0x7f0000000140), 0x1403, r2, 0x4}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0xec1a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x0, 0x12, 0x300, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x300, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x2000000}, 0x28) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.001237082s ago: executing program 7 (id=4019): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa1000000000000070100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45bd}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f00000003c0)=ANY=[@ANYBLOB="b40800000000000073114e00000000008510000002000000b7000000000000009500c20000000000950000120000000052000caf88e64e182de4a0c207b2efc6ac39777bb5f9d63cf41140f014499cb6086c9bb5ae13705bd54389a2a85e39d643d7b63e5f"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) close(r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000ffff000000007200ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x104, 0xc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000000000400000850000000800000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x4, 0x29, 0x7, 0x40000, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0xf}, 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r7}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x101, '\x00', 0x0, r1, 0x5, 0x2, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x19, 0x1b, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@printk={@lli}, @map_val={0x18, 0x5, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xf7}, @map_fd={0x18, 0x0, 0x1, 0x0, r7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x8, 0x37, &(0x7f00000000c0)=""/55, 0x41100, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x4, 0x5, 0x89, 0xba}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r8], 0x0, 0x10, 0x5}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) 983.804804ms ago: executing program 8 (id=4020): openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000000}}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000"], 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x18, 0x8, 0x5, 0x800, 0x20000, r2, 0x41c9, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x18) 856.64838ms ago: executing program 3 (id=4021): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000540), &(0x7f00000005c0)='%+9llu \x00'}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r5 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r4}, 0x8) close(r5) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x11, 0x3, 0x300, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0xf, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000218110000", @ANYRES32, @ANYBLOB="0000000000000000a502000014a00000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000100b7020000000000008500000084000000b70000000000000095000000000000003a81a1d36268540df737e137aaf401710f613c230cb996a39f816ff3232ef10dc19b7d806f6278e1e7119bfd3694cdf588ebef8d1a5c6f780e5fae2f84824fd90870fea4395b03ee9b19eb53239ea496c944fa5b6d"], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0xc, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1800000000000000000000000000000885000000110000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000b986c12a850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 650.815317ms ago: executing program 7 (id=4022): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=ANY=[@ANYRES32=r2, @ANYRESOCT=r4, @ANYRES8, @ANYRES32=r0, @ANYRES32, @ANYRES64=r3, @ANYRESDEC=r0, @ANYRES16=r0, @ANYRES8=r0, @ANYRESOCT=r0, @ANYRES64, @ANYRES8=r1, @ANYRESDEC=r3, @ANYRES16=r3], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r5, 0x0, 0x1ba8847c99}, 0x38) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xffffdfff00000001}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="120000000a000000040000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000d200000000000000000000000000000000000000ca6b56dea62e6b708e58f850931f17ca3ce8c623d7de8e3a6899f02b462227b1f9e2fb8df2ee5c535a381e6033fdd63424e123357fb2dab658c82ce43c244f44ab9b1e6014e9e891e80f1b0d4d910468eca290020377e144edeb"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r7, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r6}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r8}, &(0x7f0000000240), 0x0, 0x600}, 0x20) mkdir(0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x23, &(0x7f0000000e80)=ANY=[@ANYBLOB="d50a00000100000063111400404c030018600000090000000000000095a200001800000004000000000000000800000018530000020000000000000000000000b708000084c7d113d2f65d4c4bc27e161902adbf000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000010400007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a500000095000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) (async) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x9, 0x4, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3}, 0x94) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r11, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r12}, 0x18) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', r12}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180200000700000000000000000000008500000041000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) (async, rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) (rerun: 64) recvmsg$unix(r13, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r14, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r14, 0x4008240b, &(0x7f0000000740)={0x1, 0x80, 0x1, 0x2a, 0x10, 0x4, 0x0, 0x2, 0x2000, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000640), 0x1}, 0x4000, 0x8, 0x3, 0x6, 0xb, 0x4, 0xfeff, 0x0, 0xfffeffff, 0x0, 0x6}) (async, rerun: 32) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)=ANY=[@ANYRES32=r10, @ANYRES32=r9, @ANYBLOB="d347fb6c34db2ba800000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 495.816217ms ago: executing program 7 (id=4023): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d00000000"], &(0x7f0000000100)='GPL\x00'}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000340), 0x9) recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000880)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000900)=""/158, 0x9e}], 0x1, &(0x7f00000009c0)=""/214, 0xd6}, 0x81) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xb73f5987ebd071f0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$inet(r2, 0x0, 0x40) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) 448.785243ms ago: executing program 8 (id=4024): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="07000000040000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000e6030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) 351.094425ms ago: executing program 8 (id=4025): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000a4e2000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300009c0e0000850000002d000000850000000e00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='tlb_flush\x00', r1}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000540)={r2}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x50) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r5}, 0x18) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r6}, 0x3d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1, r0}, 0x38) 115.480246ms ago: executing program 3 (id=4026): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xe730f9b62bb7b53b) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc8 [ 330.445095][ T9350] device sit0 left promiscuous mode [ 330.531581][ T9353] device syzkaller0 entered promiscuous mode [ 330.540850][ T9351] device sit0 entered promiscuous mode [ 330.637765][ T9359] FAULT_INJECTION: forcing a failure. [ 330.637765][ T9359] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 330.651997][ T9359] CPU: 1 PID: 9359 Comm: syz.7.2870 Not tainted syzkaller #0 [ 330.659413][ T9359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 330.669499][ T9359] Call Trace: [ 330.672816][ T9359] [ 330.675768][ T9359] __dump_stack+0x21/0x30 [ 330.680133][ T9359] dump_stack_lvl+0x110/0x170 [ 330.684839][ T9359] ? show_regs_print_info+0x20/0x20 [ 330.690066][ T9359] ? bpf_get_stackid+0x13a/0x1c0 [ 330.695024][ T9359] dump_stack+0x15/0x20 [ 330.699208][ T9359] should_fail+0x3c1/0x510 [ 330.703656][ T9359] should_fail_alloc_page+0x55/0x80 [ 330.708890][ T9359] prepare_alloc_pages+0x156/0x610 [ 330.714242][ T9359] ? __alloc_pages_bulk+0xad0/0xad0 [ 330.719469][ T9359] ? perf_sched_cb_inc+0x240/0x240 [ 330.724607][ T9359] __alloc_pages+0x11d/0x460 [ 330.729224][ T9359] ? prep_new_page+0x110/0x110 [ 330.734011][ T9359] ? __schedule+0xb76/0x14c0 [ 330.738623][ T9359] ? release_firmware_map_entry+0x190/0x190 [ 330.744536][ T9359] pte_alloc_one+0x70/0x190 [ 330.749059][ T9359] ? pfn_modify_allowed+0x2f0/0x2f0 [ 330.754284][ T9359] ? __kasan_check_read+0x11/0x20 [ 330.759330][ T9359] ? preempt_schedule_common+0xbe/0xf0 [ 330.764823][ T9359] ? preempt_schedule+0xbc/0xd0 [ 330.769702][ T9359] __pte_alloc+0x75/0x2a0 [ 330.774324][ T9359] ? __kasan_check_write+0x14/0x20 [ 330.779467][ T9359] ? _raw_spin_lock+0x94/0xf0 [ 330.784176][ T9359] ? free_pgtables+0x280/0x280 [ 330.789103][ T9359] ? __kasan_check_write+0x14/0x20 [ 330.794245][ T9359] copy_page_range+0x237c/0x28d0 [ 330.799224][ T9359] ? pfn_valid+0x1d0/0x1d0 [ 330.803669][ T9359] copy_mm+0xbf2/0x13c0 [ 330.807954][ T9359] ? copy_signal+0x600/0x600 [ 330.812571][ T9359] ? __init_rwsem+0xfc/0x1d0 [ 330.817186][ T9359] ? copy_signal+0x4cb/0x600 [ 330.821799][ T9359] copy_process+0x117c/0x3250 [ 330.826595][ T9359] ? __kasan_check_write+0x14/0x20 [ 330.831904][ T9359] ? __pidfd_prepare+0x150/0x150 [ 330.836868][ T9359] kernel_clone+0x233/0x960 [ 330.841395][ T9359] ? create_io_thread+0x170/0x170 [ 330.846448][ T9359] ? __kasan_check_write+0x14/0x20 [ 330.851579][ T9359] ? mutex_unlock+0x8f/0x230 [ 330.856179][ T9359] __x64_sys_clone+0x198/0x210 [ 330.860944][ T9359] ? __kasan_check_write+0x14/0x20 [ 330.866052][ T9359] ? __ia32_sys_vfork+0x130/0x130 [ 330.871088][ T9359] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 330.877152][ T9359] x64_sys_call+0x41f/0x9a0 [ 330.881656][ T9359] do_syscall_64+0x4c/0xa0 [ 330.886155][ T9359] ? clear_bhb_loop+0x50/0xa0 [ 330.890834][ T9359] ? clear_bhb_loop+0x50/0xa0 [ 330.895514][ T9359] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 330.901555][ T9359] RIP: 0033:0x7f721233acb9 [ 330.905992][ T9359] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 330.925843][ T9359] RSP: 002b:00007f7210d96fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 330.934281][ T9359] RAX: ffffffffffffffda RBX: 00007f72125b5fa0 RCX: 00007f721233acb9 [ 330.942274][ T9359] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 330.950261][ T9359] RBP: 00007f7210d97090 R08: 0000000000000000 R09: 0000000000000000 [ 330.958252][ T9359] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 330.966281][ T9359] R13: 00007f72125b6038 R14: 00007f72125b5fa0 R15: 00007ffe207b8fb8 [ 330.974277][ T9359] [ 331.393009][ T30] audit: type=1400 audit(1768658470.507:158): avc: denied { write } for pid=9386 comm="syz.7.2879" name="cgroup.subtree_control" dev="cgroup2" ino=497 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 331.557459][ T30] audit: type=1400 audit(1768658470.507:159): avc: denied { open } for pid=9386 comm="syz.7.2879" path="" dev="cgroup2" ino=497 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 331.607894][ T9404] device sit0 entered promiscuous mode [ 331.694278][ T30] audit: type=1400 audit(1768658470.517:160): avc: denied { ioctl } for pid=9386 comm="syz.7.2879" path="" dev="cgroup2" ino=497 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 331.724670][ T9410] ------------[ cut here ]------------ [ 331.758826][ T9414] FAULT_INJECTION: forcing a failure. [ 331.758826][ T9414] name failslab, interval 1, probability 0, space 0, times 0 [ 331.771797][ T9410] trace type BPF program uses run-time allocation [ 331.787499][ T9410] WARNING: CPU: 0 PID: 9410 at kernel/bpf/verifier.c:11722 check_map_prog_compatibility+0x6cd/0x870 [ 331.812092][ T9414] CPU: 0 PID: 9414 Comm: syz.8.2886 Not tainted syzkaller #0 [ 331.819540][ T9414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 331.829622][ T9414] Call Trace: [ 331.832922][ T9414] [ 331.835870][ T9414] __dump_stack+0x21/0x30 [ 331.840237][ T9414] dump_stack_lvl+0x110/0x170 [ 331.844952][ T9414] ? show_regs_print_info+0x20/0x20 [ 331.850178][ T9414] ? avc_denied+0x1b0/0x1b0 [ 331.854714][ T9414] dump_stack+0x15/0x20 [ 331.858951][ T9414] should_fail+0x3c1/0x510 [ 331.863593][ T9414] __should_failslab+0xa4/0xe0 [ 331.868398][ T9414] should_failslab+0x9/0x20 [ 331.872933][ T9414] slab_pre_alloc_hook+0x3b/0xe0 [ 331.877898][ T9414] ? vm_area_dup+0x26/0x210 [ 331.882425][ T9414] kmem_cache_alloc+0x44/0x260 [ 331.887224][ T9414] vm_area_dup+0x26/0x210 [ 331.891587][ T9414] copy_mm+0x947/0x13c0 [ 331.895773][ T9414] ? copy_signal+0x600/0x600 [ 331.900390][ T9414] ? __init_rwsem+0xfc/0x1d0 [ 331.905006][ T9414] ? copy_signal+0x4cb/0x600 [ 331.909627][ T9414] copy_process+0x117c/0x3250 [ 331.914336][ T9414] ? __kasan_check_write+0x14/0x20 [ 331.919484][ T9414] ? __pidfd_prepare+0x150/0x150 [ 331.924461][ T9414] kernel_clone+0x233/0x960 [ 331.928999][ T9414] ? create_io_thread+0x170/0x170 [ 331.934054][ T9414] ? __kasan_check_write+0x14/0x20 [ 331.939198][ T9414] ? mutex_unlock+0x8f/0x230 [ 331.943815][ T9414] __x64_sys_clone+0x198/0x210 [ 331.948612][ T9414] ? __kasan_check_write+0x14/0x20 [ 331.953755][ T9414] ? __ia32_sys_vfork+0x130/0x130 [ 331.958814][ T9414] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 331.964926][ T9414] x64_sys_call+0x41f/0x9a0 [ 331.969458][ T9414] do_syscall_64+0x4c/0xa0 [ 331.973986][ T9414] ? clear_bhb_loop+0x50/0xa0 [ 331.978692][ T9414] ? clear_bhb_loop+0x50/0xa0 [ 331.983437][ T9414] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 331.989584][ T9414] RIP: 0033:0x7f4158ea0cb9 [ 331.994033][ T9414] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 332.013753][ T9414] RSP: 002b:00007f41578fcfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 332.022199][ T9414] RAX: ffffffffffffffda RBX: 00007f415911bfa0 RCX: 00007f4158ea0cb9 [ 332.030203][ T9414] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 332.038207][ T9414] RBP: 00007f41578fd090 R08: 0000000000000000 R09: 0000000000000000 [ 332.046306][ T9414] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 332.054308][ T9414] R13: 00007f415911c038 R14: 00007f415911bfa0 R15: 00007fff61441918 [ 332.062312][ T9414] [ 332.081897][ T9410] Modules linked in: [ 332.086190][ T9410] CPU: 1 PID: 9410 Comm: syz.7.2885 Not tainted syzkaller #0 [ 332.093912][ T9410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 332.104837][ T9410] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 332.115198][ T30] audit: type=1400 audit(1768658471.227:161): avc: denied { create } for pid=9427 comm="syz.1.2890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 332.139142][ T9410] Code: ee ff 48 c7 c6 00 43 48 85 4c 8b 65 d0 e9 fd fc ff ff e8 a6 1c ee ff c6 05 d4 73 6a 05 01 48 c7 c7 60 3f 48 85 e8 c3 d1 2e 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 332.161353][ T9410] RSP: 0018:ffffc90000bd7428 EFLAGS: 00010246 [ 332.171613][ T9432] device pim6reg1 entered promiscuous mode [ 332.186334][ T9410] RAX: 09805ea120940000 RBX: 0000000000000001 RCX: ffff8881117b3b40 [ 332.205943][ T9410] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 332.218769][ T9410] RBP: ffffc90000bd7470 R08: ffff8881f7032f3f R09: 1ffff1103ee065e7 [ 332.255944][ T9410] R10: dffffc0000000000 R11: ffffed103ee065e8 R12: ffff88811381c000 [ 332.267405][ T9410] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811c5ce000 [ 332.276199][ T9410] FS: 00007f7210d976c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 332.285454][ T9410] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 332.292175][ T9410] CR2: 0000001b33c24000 CR3: 000000011e8b7000 CR4: 00000000003506b0 [ 332.312804][ T9410] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000200000000300 [ 332.349544][ T9410] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 332.429168][ T9446] device sit0 left promiscuous mode [ 332.449375][ T9410] Call Trace: [ 332.452738][ T9410] [ 332.576864][ T9410] resolve_pseudo_ldimm64+0x656/0x1180 [ 332.586506][ T9449] device sit0 entered promiscuous mode [ 332.605449][ T9410] ? check_attach_btf_id+0xd70/0xd70 [ 332.610796][ T9410] ? __mark_reg_known+0x1b0/0x1b0 [ 332.647049][ T9410] ? security_capable+0x87/0xb0 [ 332.652059][ T9410] bpf_check+0x32c7/0xf370 [ 332.703334][ T9410] ? 0xffffffffa0012000 [ 332.722330][ T9410] ? is_bpf_text_address+0x177/0x190 [ 332.742712][ T9410] ? bpf_get_btf_vmlinux+0x60/0x60 [ 332.757107][ T9410] ? unwind_get_return_address+0x4d/0x90 [ 332.762866][ T9410] ? stack_trace_save+0xf0/0xf0 [ 332.767948][ T9410] ? arch_stack_walk+0xee/0x140 [ 332.773034][ T9410] ? stack_trace_save+0xa6/0xf0 [ 332.778896][ T9410] ? __stack_depot_save+0x34/0x480 [ 332.785765][ T9410] ? __kasan_slab_alloc+0x69/0xf0 [ 332.790868][ T9410] ? __kasan_kmalloc+0xec/0x110 [ 332.796430][ T9410] ? __kasan_kmalloc+0xda/0x110 [ 332.801320][ T9410] ? kmem_cache_alloc_trace+0x119/0x270 [ 332.807114][ T9410] ? selinux_bpf_prog_alloc+0x51/0x140 [ 332.812610][ T9410] ? security_bpf_prog_alloc+0x62/0x90 [ 332.818222][ T9410] ? bpf_prog_load+0x9f4/0x1640 [ 332.823250][ T9410] ? __sys_bpf+0x51d/0x7d0 [ 332.827884][ T9410] ? __x64_sys_bpf+0x7c/0x90 [ 332.832699][ T9410] ? x64_sys_call+0x4b9/0x9a0 [ 332.837746][ T9410] ? do_syscall_64+0x4c/0xa0 [ 332.842435][ T9410] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 332.848795][ T9410] ? check_stack_object+0x81/0x140 [ 332.853999][ T9410] ? memset+0x35/0x40 [ 332.858795][ T9410] ? bpf_obj_name_cpy+0x193/0x1e0 [ 332.864092][ T9410] bpf_prog_load+0x10c4/0x1640 [ 332.872011][ T9410] ? __anon_inode_getfd+0x35c/0x3d0 [ 332.891871][ T9410] ? map_freeze+0x360/0x360 [ 332.896866][ T9410] ? selinux_bpf+0xc7/0xf0 [ 332.901351][ T9410] ? security_bpf+0x82/0xa0 [ 332.906986][ T9410] __sys_bpf+0x51d/0x7d0 [ 332.924022][ T9410] ? bpf_link_show_fdinfo+0x330/0x330 [ 332.935057][ T9410] ? __kasan_check_write+0x14/0x20 [ 332.960741][ T9410] ? switch_fpu_return+0x15d/0x2c0 [ 333.004505][ T9410] __x64_sys_bpf+0x7c/0x90 [ 333.035057][ T9410] x64_sys_call+0x4b9/0x9a0 [ 333.039651][ T9410] do_syscall_64+0x4c/0xa0 [ 333.044104][ T9410] ? clear_bhb_loop+0x50/0xa0 [ 333.050269][ T9468] device syzkaller0 entered promiscuous mode [ 333.059239][ T9410] ? clear_bhb_loop+0x50/0xa0 [ 333.069377][ T9410] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 333.075666][ T9410] RIP: 0033:0x7f721233acb9 [ 333.080154][ T9410] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 333.101635][ T9410] RSP: 002b:00007f7210d97028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 333.162659][ T9478] FAULT_INJECTION: forcing a failure. [ 333.162659][ T9478] name failslab, interval 1, probability 0, space 0, times 0 [ 333.185163][ T9410] RAX: ffffffffffffffda RBX: 00007f72125b5fa0 RCX: 00007f721233acb9 [ 333.193199][ T9410] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 333.219235][ T9410] RBP: 00007f72123a8bf7 R08: 0000000000000000 R09: 0000000000000000 [ 333.236247][ T9478] CPU: 0 PID: 9478 Comm: syz.1.2906 Not tainted syzkaller #0 [ 333.243713][ T9478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 333.253794][ T9478] Call Trace: [ 333.257103][ T9478] [ 333.260061][ T9478] __dump_stack+0x21/0x30 [ 333.264423][ T9478] dump_stack_lvl+0x110/0x170 [ 333.269129][ T9478] ? show_regs_print_info+0x20/0x20 [ 333.274353][ T9478] dump_stack+0x15/0x20 [ 333.278536][ T9478] should_fail+0x3c1/0x510 [ 333.282986][ T9478] __should_failslab+0xa4/0xe0 [ 333.287776][ T9478] should_failslab+0x9/0x20 [ 333.292304][ T9478] slab_pre_alloc_hook+0x3b/0xe0 [ 333.297267][ T9478] ? vm_area_dup+0x26/0x210 [ 333.301793][ T9478] kmem_cache_alloc+0x44/0x260 [ 333.306570][ T9478] vm_area_dup+0x26/0x210 [ 333.310914][ T9478] copy_mm+0x947/0x13c0 [ 333.315110][ T9478] ? copy_signal+0x600/0x600 [ 333.319706][ T9478] ? __init_rwsem+0xfc/0x1d0 [ 333.324306][ T9478] ? copy_signal+0x4cb/0x600 [ 333.328902][ T9478] copy_process+0x117c/0x3250 [ 333.333599][ T9478] ? __kasan_check_write+0x14/0x20 [ 333.338727][ T9478] ? __pidfd_prepare+0x150/0x150 [ 333.343691][ T9478] kernel_clone+0x233/0x960 [ 333.348208][ T9478] ? create_io_thread+0x170/0x170 [ 333.353252][ T9478] ? __kasan_check_write+0x14/0x20 [ 333.358378][ T9478] ? mutex_unlock+0x8f/0x230 [ 333.362979][ T9478] __x64_sys_clone+0x198/0x210 [ 333.367852][ T9478] ? __kasan_check_write+0x14/0x20 [ 333.372975][ T9478] ? __ia32_sys_vfork+0x130/0x130 [ 333.378011][ T9478] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 333.384092][ T9478] x64_sys_call+0x41f/0x9a0 [ 333.388608][ T9478] do_syscall_64+0x4c/0xa0 [ 333.393037][ T9478] ? clear_bhb_loop+0x50/0xa0 [ 333.397722][ T9478] ? clear_bhb_loop+0x50/0xa0 [ 333.402412][ T9478] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 333.408419][ T9478] RIP: 0033:0x7fbc56b64cb9 [ 333.412860][ T9478] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 333.432489][ T9478] RSP: 002b:00007fbc555c0fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 333.440923][ T9478] RAX: ffffffffffffffda RBX: 00007fbc56ddffa0 RCX: 00007fbc56b64cb9 [ 333.448917][ T9478] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 333.456904][ T9478] RBP: 00007fbc555c1090 R08: 0000000000000000 R09: 0000000000000000 [ 333.465066][ T9478] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 333.473045][ T9478] R13: 00007fbc56de0038 R14: 00007fbc56ddffa0 R15: 00007fff5792c4a8 [ 333.481052][ T9478] [ 333.494937][ T9410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 333.505528][ T9410] R13: 00007f72125b6038 R14: 00007f72125b5fa0 R15: 00007ffe207b8fb8 [ 333.513553][ T9410] [ 333.516857][ T9410] ---[ end trace 35da7351102f0357 ]--- [ 333.580554][ T9483] device sit0 left promiscuous mode [ 333.652166][ T9483] device sit0 entered promiscuous mode [ 335.254897][ T30] audit: type=1400 audit(1768658474.367:162): avc: denied { create } for pid=9512 comm="syz.8.2918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 335.348604][ T9517] device syzkaller0 entered promiscuous mode [ 335.359755][ T9521] FAULT_INJECTION: forcing a failure. [ 335.359755][ T9521] name failslab, interval 1, probability 0, space 0, times 0 [ 335.372594][ T9521] CPU: 1 PID: 9521 Comm: syz.1.2921 Tainted: G W syzkaller #0 [ 335.381387][ T9521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 335.391548][ T9521] Call Trace: [ 335.394840][ T9521] [ 335.397783][ T9521] __dump_stack+0x21/0x30 [ 335.402129][ T9521] dump_stack_lvl+0x110/0x170 [ 335.406822][ T9521] ? show_regs_print_info+0x20/0x20 [ 335.412034][ T9521] ? rwsem_write_trylock+0x136/0x300 [ 335.417361][ T9521] dump_stack+0x15/0x20 [ 335.421815][ T9521] should_fail+0x3c1/0x510 [ 335.426250][ T9521] __should_failslab+0xa4/0xe0 [ 335.431028][ T9521] should_failslab+0x9/0x20 [ 335.435540][ T9521] slab_pre_alloc_hook+0x3b/0xe0 [ 335.440492][ T9521] ? anon_vma_fork+0xf2/0x510 [ 335.445185][ T9521] kmem_cache_alloc+0x44/0x260 [ 335.449967][ T9521] anon_vma_fork+0xf2/0x510 [ 335.454491][ T9521] copy_mm+0x9de/0x13c0 [ 335.458659][ T9521] ? copy_signal+0x600/0x600 [ 335.463266][ T9521] ? __init_rwsem+0xfc/0x1d0 [ 335.467869][ T9521] ? copy_signal+0x4cb/0x600 [ 335.472466][ T9521] copy_process+0x117c/0x3250 [ 335.477161][ T9521] ? __kasan_check_write+0x14/0x20 [ 335.482284][ T9521] ? __pidfd_prepare+0x150/0x150 [ 335.487237][ T9521] kernel_clone+0x233/0x960 [ 335.491761][ T9521] ? create_io_thread+0x170/0x170 [ 335.496803][ T9521] ? __kasan_check_write+0x14/0x20 [ 335.501936][ T9521] ? mutex_unlock+0x8f/0x230 [ 335.506541][ T9521] __x64_sys_clone+0x198/0x210 [ 335.511316][ T9521] ? __kasan_check_write+0x14/0x20 [ 335.516442][ T9521] ? __ia32_sys_vfork+0x130/0x130 [ 335.521480][ T9521] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 335.527565][ T9521] x64_sys_call+0x41f/0x9a0 [ 335.532085][ T9521] do_syscall_64+0x4c/0xa0 [ 335.536509][ T9521] ? clear_bhb_loop+0x50/0xa0 [ 335.541193][ T9521] ? clear_bhb_loop+0x50/0xa0 [ 335.545878][ T9521] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 335.551785][ T9521] RIP: 0033:0x7fbc56b64cb9 [ 335.556214][ T9521] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 335.575831][ T9521] RSP: 002b:00007fbc555c0fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 335.584261][ T9521] RAX: ffffffffffffffda RBX: 00007fbc56ddffa0 RCX: 00007fbc56b64cb9 [ 335.592238][ T9521] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 335.600214][ T9521] RBP: 00007fbc555c1090 R08: 0000000000000000 R09: 0000000000000000 [ 335.608217][ T9521] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 335.616200][ T9521] R13: 00007fbc56de0038 R14: 00007fbc56ddffa0 R15: 00007fff5792c4a8 [ 335.624187][ T9521] [ 335.852706][ T9526] device sit0 left promiscuous mode [ 335.869232][ T9527] device sit0 entered promiscuous mode [ 336.414051][ T9559] device sit0 left promiscuous mode [ 336.579070][ T9561] device sit0 entered promiscuous mode [ 336.823897][ T9566] device sit0 left promiscuous mode [ 336.844528][ T9568] device sit0 entered promiscuous mode [ 337.013835][ T9569] device syzkaller0 entered promiscuous mode [ 337.028774][ T9573] FAULT_INJECTION: forcing a failure. [ 337.028774][ T9573] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 337.046412][ T9573] CPU: 1 PID: 9573 Comm: syz.9.2936 Tainted: G W syzkaller #0 [ 337.055310][ T9573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 337.065473][ T9573] Call Trace: [ 337.068764][ T9573] [ 337.071706][ T9573] __dump_stack+0x21/0x30 [ 337.076051][ T9573] dump_stack_lvl+0x110/0x170 [ 337.080745][ T9573] ? show_regs_print_info+0x20/0x20 [ 337.085961][ T9573] ? __schedule+0xb76/0x14c0 [ 337.090571][ T9573] dump_stack+0x15/0x20 [ 337.094747][ T9573] should_fail+0x3c1/0x510 [ 337.099175][ T9573] should_fail_alloc_page+0x55/0x80 [ 337.104388][ T9573] prepare_alloc_pages+0x156/0x610 [ 337.109566][ T9573] ? __alloc_pages_bulk+0xad0/0xad0 [ 337.114794][ T9573] __alloc_pages+0x11d/0x460 [ 337.119415][ T9573] ? prep_new_page+0x110/0x110 [ 337.124202][ T9573] ? unwind_get_return_address+0x4d/0x90 [ 337.129865][ T9573] ? stack_trace_save+0xf0/0xf0 [ 337.134735][ T9573] ? arch_stack_walk+0xee/0x140 [ 337.139598][ T9573] pte_alloc_one+0x70/0x190 [ 337.144129][ T9573] ? pfn_modify_allowed+0x2f0/0x2f0 [ 337.149337][ T9573] ? stack_trace_save+0xa6/0xf0 [ 337.154199][ T9573] __pte_alloc+0x75/0x2a0 [ 337.158535][ T9573] ? __kasan_check_write+0x14/0x20 [ 337.163670][ T9573] ? _raw_spin_lock+0x94/0xf0 [ 337.168364][ T9573] ? free_pgtables+0x280/0x280 [ 337.173146][ T9573] ? __kasan_check_write+0x14/0x20 [ 337.178268][ T9573] copy_page_range+0x237c/0x28d0 [ 337.183224][ T9573] ? pfn_valid+0x1d0/0x1d0 [ 337.187651][ T9573] copy_mm+0xbf2/0x13c0 [ 337.191843][ T9573] ? copy_signal+0x600/0x600 [ 337.196446][ T9573] ? __init_rwsem+0xfc/0x1d0 [ 337.201043][ T9573] ? copy_signal+0x4cb/0x600 [ 337.205645][ T9573] copy_process+0x117c/0x3250 [ 337.210343][ T9573] ? __kasan_check_write+0x14/0x20 [ 337.215468][ T9573] ? __pidfd_prepare+0x150/0x150 [ 337.220418][ T9573] kernel_clone+0x233/0x960 [ 337.224937][ T9573] ? create_io_thread+0x170/0x170 [ 337.230001][ T9573] ? __kasan_check_write+0x14/0x20 [ 337.235125][ T9573] ? mutex_unlock+0x8f/0x230 [ 337.239728][ T9573] __x64_sys_clone+0x198/0x210 [ 337.244504][ T9573] ? __kasan_check_write+0x14/0x20 [ 337.249627][ T9573] ? __ia32_sys_vfork+0x130/0x130 [ 337.254668][ T9573] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 337.260747][ T9573] x64_sys_call+0x41f/0x9a0 [ 337.265269][ T9573] do_syscall_64+0x4c/0xa0 [ 337.269784][ T9573] ? clear_bhb_loop+0x50/0xa0 [ 337.274470][ T9573] ? clear_bhb_loop+0x50/0xa0 [ 337.279160][ T9573] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 337.285158][ T9573] RIP: 0033:0x7f8ec142fcb9 [ 337.289589][ T9573] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 337.309207][ T9573] RSP: 002b:00007f8ebfe8bfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 337.317651][ T9573] RAX: ffffffffffffffda RBX: 00007f8ec16aafa0 RCX: 00007f8ec142fcb9 [ 337.325675][ T9573] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 337.333662][ T9573] RBP: 00007f8ebfe8c090 R08: 0000000000000000 R09: 0000000000000000 [ 337.341648][ T9573] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 337.349634][ T9573] R13: 00007f8ec16ab038 R14: 00007f8ec16aafa0 R15: 00007fffc3ce5808 [ 337.357629][ T9573] [ 337.807554][ T9608] device sit0 left promiscuous mode [ 337.852976][ T9608] device sit0 entered promiscuous mode [ 338.014206][ T9611] FAULT_INJECTION: forcing a failure. [ 338.014206][ T9611] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 338.027638][ T9611] CPU: 1 PID: 9611 Comm: syz.1.2948 Tainted: G W syzkaller #0 [ 338.036437][ T9611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 338.046512][ T9611] Call Trace: [ 338.049805][ T9611] [ 338.052757][ T9611] __dump_stack+0x21/0x30 [ 338.057120][ T9611] dump_stack_lvl+0x110/0x170 [ 338.061912][ T9611] ? show_regs_print_info+0x20/0x20 [ 338.067147][ T9611] dump_stack+0x15/0x20 [ 338.071343][ T9611] should_fail+0x3c1/0x510 [ 338.075971][ T9611] should_fail_alloc_page+0x55/0x80 [ 338.081223][ T9611] prepare_alloc_pages+0x156/0x610 [ 338.086367][ T9611] ? __alloc_pages_bulk+0xad0/0xad0 [ 338.091698][ T9611] ? arch_stack_walk+0xee/0x140 [ 338.096582][ T9611] __alloc_pages+0x11d/0x460 [ 338.101197][ T9611] ? prep_new_page+0x110/0x110 [ 338.105990][ T9611] ? __kasan_slab_alloc+0xcf/0xf0 [ 338.111041][ T9611] ? __kasan_slab_alloc+0xbd/0xf0 [ 338.116087][ T9611] ? slab_post_alloc_hook+0x4f/0x2b0 [ 338.121401][ T9611] get_zeroed_page+0x1b/0x40 [ 338.126013][ T9611] __pud_alloc+0x37/0x1a0 [ 338.130371][ T9611] copy_page_range+0x2617/0x28d0 [ 338.135349][ T9611] ? vma_interval_tree_augment_rotate+0x1f0/0x1f0 [ 338.141817][ T9611] ? pfn_valid+0x1d0/0x1d0 [ 338.146266][ T9611] copy_mm+0xbf2/0x13c0 [ 338.150458][ T9611] ? copy_signal+0x600/0x600 [ 338.155084][ T9611] ? __init_rwsem+0xfc/0x1d0 [ 338.159694][ T9611] ? copy_signal+0x4cb/0x600 [ 338.164310][ T9611] copy_process+0x117c/0x3250 [ 338.169015][ T9611] ? __kasan_check_write+0x14/0x20 [ 338.174148][ T9611] ? __pidfd_prepare+0x150/0x150 [ 338.179112][ T9611] kernel_clone+0x233/0x960 [ 338.184076][ T9611] ? create_io_thread+0x170/0x170 [ 338.189122][ T9611] ? __kasan_check_write+0x14/0x20 [ 338.194254][ T9611] ? mutex_unlock+0x8f/0x230 [ 338.198879][ T9611] __x64_sys_clone+0x198/0x210 [ 338.203663][ T9611] ? __kasan_check_write+0x14/0x20 [ 338.208798][ T9611] ? __ia32_sys_vfork+0x130/0x130 [ 338.213846][ T9611] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 338.219932][ T9611] x64_sys_call+0x41f/0x9a0 [ 338.224458][ T9611] do_syscall_64+0x4c/0xa0 [ 338.228905][ T9611] ? clear_bhb_loop+0x50/0xa0 [ 338.233596][ T9611] ? clear_bhb_loop+0x50/0xa0 [ 338.238296][ T9611] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 338.244214][ T9611] RIP: 0033:0x7fbc56b64cb9 [ 338.248684][ T9611] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 338.268308][ T9611] RSP: 002b:00007fbc555c0fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 338.276750][ T9611] RAX: ffffffffffffffda RBX: 00007fbc56ddffa0 RCX: 00007fbc56b64cb9 [ 338.284744][ T9611] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 338.292730][ T9611] RBP: 00007fbc555c1090 R08: 0000000000000000 R09: 0000000000000000 [ 338.300723][ T9611] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 338.308717][ T9611] R13: 00007fbc56de0038 R14: 00007fbc56ddffa0 R15: 00007fff5792c4a8 [ 338.316726][ T9611] [ 338.923717][ T9636] device syzkaller0 entered promiscuous mode [ 339.401431][ T9663] FAULT_INJECTION: forcing a failure. [ 339.401431][ T9663] name failslab, interval 1, probability 0, space 0, times 0 [ 339.440863][ T9666] device sit0 left promiscuous mode [ 339.451503][ T9663] CPU: 0 PID: 9663 Comm: syz.3.2963 Tainted: G W syzkaller #0 [ 339.460310][ T9663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 339.470395][ T9663] Call Trace: [ 339.473679][ T9663] [ 339.476646][ T9663] __dump_stack+0x21/0x30 [ 339.481011][ T9663] dump_stack_lvl+0x110/0x170 [ 339.485712][ T9663] ? show_regs_print_info+0x20/0x20 [ 339.490939][ T9663] dump_stack+0x15/0x20 [ 339.495126][ T9663] should_fail+0x3c1/0x510 [ 339.499610][ T9663] __should_failslab+0xa4/0xe0 [ 339.504411][ T9663] should_failslab+0x9/0x20 [ 339.508941][ T9663] slab_pre_alloc_hook+0x3b/0xe0 [ 339.513909][ T9663] ? vm_area_dup+0x26/0x210 [ 339.518442][ T9663] kmem_cache_alloc+0x44/0x260 [ 339.523234][ T9663] vm_area_dup+0x26/0x210 [ 339.527595][ T9663] copy_mm+0x947/0x13c0 [ 339.531775][ T9663] ? copy_signal+0x600/0x600 [ 339.536388][ T9663] ? __init_rwsem+0xfc/0x1d0 [ 339.541227][ T9663] ? copy_signal+0x4cb/0x600 [ 339.545859][ T9663] copy_process+0x117c/0x3250 [ 339.550568][ T9663] ? __kasan_check_write+0x14/0x20 [ 339.555712][ T9663] ? __pidfd_prepare+0x150/0x150 [ 339.560687][ T9663] kernel_clone+0x233/0x960 [ 339.561805][ T9666] device sit0 entered promiscuous mode [ 339.565224][ T9663] ? create_io_thread+0x170/0x170 [ 339.565258][ T9663] ? __kasan_check_write+0x14/0x20 [ 339.565281][ T9663] ? mutex_unlock+0x8f/0x230 [ 339.565302][ T9663] __x64_sys_clone+0x198/0x210 [ 339.565323][ T9663] ? __kasan_check_write+0x14/0x20 [ 339.565345][ T9663] ? __ia32_sys_vfork+0x130/0x130 [ 339.565373][ T9663] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 339.565399][ T9663] x64_sys_call+0x41f/0x9a0 [ 339.565420][ T9663] do_syscall_64+0x4c/0xa0 [ 339.565443][ T9663] ? clear_bhb_loop+0x50/0xa0 [ 339.565461][ T9663] ? clear_bhb_loop+0x50/0xa0 [ 339.565480][ T9663] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 339.565505][ T9663] RIP: 0033:0x7fc808952cb9 [ 339.565524][ T9663] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 339.565544][ T9663] RSP: 002b:00007fc8073aefd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 339.565568][ T9663] RAX: ffffffffffffffda RBX: 00007fc808bcdfa0 RCX: 00007fc808952cb9 [ 339.565585][ T9663] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 339.565599][ T9663] RBP: 00007fc8073af090 R08: 0000000000000000 R09: 0000000000000000 [ 339.565613][ T9663] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 339.565626][ T9663] R13: 00007fc808bce038 R14: 00007fc808bcdfa0 R15: 00007ffd0b1cc758 [ 339.565646][ T9663] [ 340.452084][ T9699] device syzkaller0 entered promiscuous mode [ 340.628116][ T9707] FAULT_INJECTION: forcing a failure. [ 340.628116][ T9707] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 340.656520][ T9707] CPU: 1 PID: 9707 Comm: syz.7.2977 Tainted: G W syzkaller #0 [ 340.665607][ T9707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 340.675712][ T9707] Call Trace: [ 340.679019][ T9707] [ 340.681972][ T9707] __dump_stack+0x21/0x30 [ 340.686332][ T9707] dump_stack_lvl+0x110/0x170 [ 340.691028][ T9707] ? show_regs_print_info+0x20/0x20 [ 340.696247][ T9707] dump_stack+0x15/0x20 [ 340.700419][ T9707] should_fail+0x3c1/0x510 [ 340.704844][ T9707] should_fail_alloc_page+0x55/0x80 [ 340.710061][ T9707] prepare_alloc_pages+0x156/0x610 [ 340.715197][ T9707] ? __alloc_pages_bulk+0xad0/0xad0 [ 340.720422][ T9707] __alloc_pages+0x11d/0x460 [ 340.725049][ T9707] ? prep_new_page+0x110/0x110 [ 340.729835][ T9707] ? unwind_get_return_address+0x4d/0x90 [ 340.735481][ T9707] ? stack_trace_save+0xf0/0xf0 [ 340.740345][ T9707] ? arch_stack_walk+0xee/0x140 [ 340.745207][ T9707] pte_alloc_one+0x70/0x190 [ 340.749722][ T9707] ? pfn_modify_allowed+0x2f0/0x2f0 [ 340.754929][ T9707] ? stack_trace_save+0xa6/0xf0 [ 340.759796][ T9707] __pte_alloc+0x75/0x2a0 [ 340.764135][ T9707] ? __kasan_check_write+0x14/0x20 [ 340.769262][ T9707] ? _raw_spin_lock+0x94/0xf0 [ 340.773947][ T9707] ? free_pgtables+0x280/0x280 [ 340.778723][ T9707] ? __kasan_check_write+0x14/0x20 [ 340.783847][ T9707] copy_page_range+0x237c/0x28d0 [ 340.788810][ T9707] ? pfn_valid+0x1d0/0x1d0 [ 340.793239][ T9707] copy_mm+0xbf2/0x13c0 [ 340.797410][ T9707] ? bpf_trace_run2+0x1c0/0x1c0 [ 340.802310][ T9707] ? copy_signal+0x600/0x600 [ 340.806913][ T9707] ? __init_rwsem+0xfc/0x1d0 [ 340.811544][ T9707] ? copy_signal+0x4cb/0x600 [ 340.816160][ T9707] copy_process+0x117c/0x3250 [ 340.820851][ T9707] ? __kasan_check_write+0x14/0x20 [ 340.826061][ T9707] ? __pidfd_prepare+0x150/0x150 [ 340.831014][ T9707] kernel_clone+0x233/0x960 [ 340.835539][ T9707] ? create_io_thread+0x170/0x170 [ 340.840579][ T9707] ? __kasan_check_write+0x14/0x20 [ 340.845706][ T9707] ? mutex_unlock+0x8f/0x230 [ 340.850308][ T9707] __x64_sys_clone+0x198/0x210 [ 340.855082][ T9707] ? __kasan_check_write+0x14/0x20 [ 340.860207][ T9707] ? __ia32_sys_vfork+0x130/0x130 [ 340.865249][ T9707] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 340.871330][ T9707] x64_sys_call+0x41f/0x9a0 [ 340.876061][ T9707] do_syscall_64+0x4c/0xa0 [ 340.880518][ T9707] ? clear_bhb_loop+0x50/0xa0 [ 340.885223][ T9707] ? clear_bhb_loop+0x50/0xa0 [ 340.889921][ T9707] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 340.895839][ T9707] RIP: 0033:0x7f721233acb9 [ 340.900263][ T9707] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 340.920067][ T9707] RSP: 002b:00007f7210d96fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 340.928501][ T9707] RAX: ffffffffffffffda RBX: 00007f72125b5fa0 RCX: 00007f721233acb9 [ 340.936492][ T9707] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 340.944485][ T9707] RBP: 00007f7210d97090 R08: 0000000000000000 R09: 0000000000000000 [ 340.952479][ T9707] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 340.960469][ T9707] R13: 00007f72125b6038 R14: 00007f72125b5fa0 R15: 00007ffe207b8fb8 [ 340.968473][ T9707] [ 341.006002][ T9716] device wg2 left promiscuous mode [ 341.027609][ T9716] device wg2 entered promiscuous mode [ 341.050471][ T9729] device sit0 left promiscuous mode [ 341.083993][ T9729] device sit0 entered promiscuous mode [ 341.713376][ T9754] FAULT_INJECTION: forcing a failure. [ 341.713376][ T9754] name failslab, interval 1, probability 0, space 0, times 0 [ 341.775741][ T9754] CPU: 1 PID: 9754 Comm: syz.1.2991 Tainted: G W syzkaller #0 [ 341.784679][ T9754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 341.794768][ T9754] Call Trace: [ 341.798076][ T9754] [ 341.801148][ T9754] __dump_stack+0x21/0x30 [ 341.805515][ T9754] dump_stack_lvl+0x110/0x170 [ 341.810264][ T9754] ? show_regs_print_info+0x20/0x20 [ 341.815496][ T9754] dump_stack+0x15/0x20 [ 341.819704][ T9754] should_fail+0x3c1/0x510 [ 341.824241][ T9754] __should_failslab+0xa4/0xe0 [ 341.829040][ T9754] should_failslab+0x9/0x20 [ 341.833678][ T9754] slab_pre_alloc_hook+0x3b/0xe0 [ 341.838672][ T9754] ? vm_area_dup+0x26/0x210 [ 341.843208][ T9754] kmem_cache_alloc+0x44/0x260 [ 341.848009][ T9754] vm_area_dup+0x26/0x210 [ 341.852375][ T9754] copy_mm+0x947/0x13c0 [ 341.856559][ T9754] ? bpf_trace_run2+0x1c0/0x1c0 [ 341.861440][ T9754] ? copy_signal+0x600/0x600 [ 341.866066][ T9754] ? __init_rwsem+0xfc/0x1d0 [ 341.870684][ T9754] ? copy_signal+0x4cb/0x600 [ 341.875295][ T9754] copy_process+0x117c/0x3250 [ 341.880030][ T9754] ? __kasan_check_write+0x14/0x20 [ 341.885198][ T9754] ? __pidfd_prepare+0x150/0x150 [ 341.890169][ T9754] kernel_clone+0x233/0x960 [ 341.894709][ T9754] ? create_io_thread+0x170/0x170 [ 341.899922][ T9754] ? __kasan_check_write+0x14/0x20 [ 341.905104][ T9754] ? mutex_unlock+0x8f/0x230 [ 341.909947][ T9754] __x64_sys_clone+0x198/0x210 [ 341.914748][ T9754] ? __kasan_check_write+0x14/0x20 [ 341.919886][ T9754] ? __ia32_sys_vfork+0x130/0x130 [ 341.924943][ T9754] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 341.931036][ T9754] x64_sys_call+0x41f/0x9a0 [ 341.935567][ T9754] do_syscall_64+0x4c/0xa0 [ 341.939999][ T9754] ? clear_bhb_loop+0x50/0xa0 [ 341.944686][ T9754] ? clear_bhb_loop+0x50/0xa0 [ 341.949369][ T9754] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 341.955298][ T9754] RIP: 0033:0x7fbc56b64cb9 [ 341.959751][ T9754] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 341.979368][ T9754] RSP: 002b:00007fbc555c0fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 341.987790][ T9754] RAX: ffffffffffffffda RBX: 00007fbc56ddffa0 RCX: 00007fbc56b64cb9 [ 341.995959][ T9754] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 342.004113][ T9754] RBP: 00007fbc555c1090 R08: 0000000000000000 R09: 0000000000000000 [ 342.012096][ T9754] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 342.020086][ T9754] R13: 00007fbc56de0038 R14: 00007fbc56ddffa0 R15: 00007fff5792c4a8 [ 342.028075][ T9754] [ 342.073749][ T9757] device syzkaller0 entered promiscuous mode [ 342.476233][ T9793] device sit0 left promiscuous mode [ 342.558061][ T9798] device sit0 entered promiscuous mode [ 343.429480][ T9823] FAULT_INJECTION: forcing a failure. [ 343.429480][ T9823] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 343.479704][ T9823] CPU: 0 PID: 9823 Comm: syz.7.3011 Tainted: G W syzkaller #0 [ 343.488562][ T9823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 343.498643][ T9823] Call Trace: [ 343.501939][ T9823] [ 343.504919][ T9823] __dump_stack+0x21/0x30 [ 343.509278][ T9823] dump_stack_lvl+0x110/0x170 [ 343.514070][ T9823] ? show_regs_print_info+0x20/0x20 [ 343.519297][ T9823] dump_stack+0x15/0x20 [ 343.523482][ T9823] should_fail+0x3c1/0x510 [ 343.527927][ T9823] should_fail_alloc_page+0x55/0x80 [ 343.533154][ T9823] prepare_alloc_pages+0x156/0x610 [ 343.538296][ T9823] ? __alloc_pages_bulk+0xad0/0xad0 [ 343.543521][ T9823] __alloc_pages+0x11d/0x460 [ 343.548132][ T9823] ? prep_new_page+0x110/0x110 [ 343.552922][ T9823] ? __mod_node_page_state+0x9e/0xd0 [ 343.558243][ T9823] pte_alloc_one+0x70/0x190 [ 343.562768][ T9823] ? pfn_modify_allowed+0x2f0/0x2f0 [ 343.567993][ T9823] __pte_alloc+0x75/0x2a0 [ 343.572347][ T9823] ? __kasan_check_write+0x14/0x20 [ 343.577508][ T9823] ? _raw_spin_lock+0x94/0xf0 [ 343.582211][ T9823] ? free_pgtables+0x280/0x280 [ 343.586997][ T9823] ? __kasan_check_write+0x14/0x20 [ 343.592133][ T9823] copy_page_range+0x237c/0x28d0 [ 343.597111][ T9823] ? pfn_valid+0x1d0/0x1d0 [ 343.601545][ T9823] copy_mm+0xbf2/0x13c0 [ 343.605723][ T9823] ? copy_signal+0x600/0x600 [ 343.610323][ T9823] ? __init_rwsem+0xfc/0x1d0 [ 343.614925][ T9823] ? copy_signal+0x4cb/0x600 [ 343.619527][ T9823] copy_process+0x117c/0x3250 [ 343.624221][ T9823] ? __kasan_check_write+0x14/0x20 [ 343.629359][ T9823] ? __pidfd_prepare+0x150/0x150 [ 343.634313][ T9823] kernel_clone+0x233/0x960 [ 343.638842][ T9823] ? create_io_thread+0x170/0x170 [ 343.643883][ T9823] ? __kasan_check_write+0x14/0x20 [ 343.649101][ T9823] ? mutex_unlock+0x8f/0x230 [ 343.653712][ T9823] __x64_sys_clone+0x198/0x210 [ 343.658491][ T9823] ? __kasan_check_write+0x14/0x20 [ 343.663618][ T9823] ? __ia32_sys_vfork+0x130/0x130 [ 343.668687][ T9823] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 343.674878][ T9823] x64_sys_call+0x41f/0x9a0 [ 343.679392][ T9823] do_syscall_64+0x4c/0xa0 [ 343.683832][ T9823] ? clear_bhb_loop+0x50/0xa0 [ 343.688533][ T9823] ? clear_bhb_loop+0x50/0xa0 [ 343.693227][ T9823] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 343.699243][ T9823] RIP: 0033:0x7f721233acb9 [ 343.703685][ T9823] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 343.723308][ T9823] RSP: 002b:00007f7210d96fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 343.731825][ T9823] RAX: ffffffffffffffda RBX: 00007f72125b5fa0 RCX: 00007f721233acb9 [ 343.739824][ T9823] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 343.747819][ T9823] RBP: 00007f7210d97090 R08: 0000000000000000 R09: 0000000000000000 [ 343.756250][ T9823] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 343.764258][ T9823] R13: 00007f72125b6038 R14: 00007f72125b5fa0 R15: 00007ffe207b8fb8 [ 343.772279][ T9823] [ 344.108330][ T9825] syz.3.3012[9825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.108792][ T9825] syz.3.3012[9825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.192027][ T9827] device syzkaller0 entered promiscuous mode [ 345.866284][ T9865] device sit0 left promiscuous mode [ 345.873728][ T9867] FAULT_INJECTION: forcing a failure. [ 345.873728][ T9867] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 345.980213][ T9867] CPU: 0 PID: 9867 Comm: syz.8.3024 Tainted: G W syzkaller #0 [ 345.989039][ T9867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 345.999217][ T9867] Call Trace: [ 346.002773][ T9867] [ 346.005744][ T9867] __dump_stack+0x21/0x30 [ 346.010234][ T9867] dump_stack_lvl+0x110/0x170 [ 346.014951][ T9867] ? show_regs_print_info+0x20/0x20 [ 346.020181][ T9867] dump_stack+0x15/0x20 [ 346.024374][ T9867] should_fail+0x3c1/0x510 [ 346.028825][ T9867] should_fail_alloc_page+0x55/0x80 [ 346.034061][ T9867] prepare_alloc_pages+0x156/0x610 [ 346.039205][ T9867] ? __alloc_pages_bulk+0xad0/0xad0 [ 346.044434][ T9867] __alloc_pages+0x11d/0x460 [ 346.049052][ T9867] ? prep_new_page+0x110/0x110 [ 346.053842][ T9867] ? unwind_get_return_address+0x4d/0x90 [ 346.059588][ T9867] ? stack_trace_save+0xf0/0xf0 [ 346.064465][ T9867] ? arch_stack_walk+0xee/0x140 [ 346.069348][ T9867] pte_alloc_one+0x70/0x190 [ 346.073879][ T9867] ? pfn_modify_allowed+0x2f0/0x2f0 [ 346.079098][ T9867] ? stack_trace_save+0xa6/0xf0 [ 346.083963][ T9867] __pte_alloc+0x75/0x2a0 [ 346.088302][ T9867] ? __kasan_check_write+0x14/0x20 [ 346.093465][ T9867] ? _raw_spin_lock+0x94/0xf0 [ 346.098157][ T9867] ? free_pgtables+0x280/0x280 [ 346.102931][ T9867] ? __kasan_check_write+0x14/0x20 [ 346.108057][ T9867] copy_page_range+0x237c/0x28d0 [ 346.113016][ T9867] ? pfn_valid+0x1d0/0x1d0 [ 346.117449][ T9867] copy_mm+0xbf2/0x13c0 [ 346.121626][ T9867] ? copy_signal+0x600/0x600 [ 346.126230][ T9867] ? __init_rwsem+0xfc/0x1d0 [ 346.130839][ T9867] ? copy_signal+0x4cb/0x600 [ 346.135460][ T9867] copy_process+0x117c/0x3250 [ 346.140157][ T9867] ? __kasan_check_write+0x14/0x20 [ 346.145287][ T9867] ? __pidfd_prepare+0x150/0x150 [ 346.150266][ T9867] kernel_clone+0x233/0x960 [ 346.154787][ T9867] ? create_io_thread+0x170/0x170 [ 346.159843][ T9867] ? __kasan_check_write+0x14/0x20 [ 346.164981][ T9867] ? mutex_unlock+0x8f/0x230 [ 346.169582][ T9867] __x64_sys_clone+0x198/0x210 [ 346.174360][ T9867] ? __kasan_check_write+0x14/0x20 [ 346.179572][ T9867] ? __ia32_sys_vfork+0x130/0x130 [ 346.184618][ T9867] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 346.190715][ T9867] x64_sys_call+0x41f/0x9a0 [ 346.195233][ T9867] do_syscall_64+0x4c/0xa0 [ 346.199664][ T9867] ? clear_bhb_loop+0x50/0xa0 [ 346.204357][ T9867] ? clear_bhb_loop+0x50/0xa0 [ 346.209045][ T9867] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 346.214955][ T9867] RIP: 0033:0x7f4158ea0cb9 [ 346.219389][ T9867] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 346.239184][ T9867] RSP: 002b:00007f41578fcfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 346.247696][ T9867] RAX: ffffffffffffffda RBX: 00007f415911bfa0 RCX: 00007f4158ea0cb9 [ 346.255776][ T9867] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 346.263768][ T9867] RBP: 00007f41578fd090 R08: 0000000000000000 R09: 0000000000000000 [ 346.271759][ T9867] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 346.279749][ T9867] R13: 00007f415911c038 R14: 00007f415911bfa0 R15: 00007fff61441918 [ 346.287748][ T9867] [ 346.306000][ T9865] device sit0 entered promiscuous mode [ 347.388538][ T9883] device syzkaller0 entered promiscuous mode [ 347.700967][ T9909] device sit0 left promiscuous mode [ 347.708198][ T9911] FAULT_INJECTION: forcing a failure. [ 347.708198][ T9911] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 347.721537][ T9911] CPU: 0 PID: 9911 Comm: syz.8.3039 Tainted: G W syzkaller #0 [ 347.730336][ T9911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 347.740419][ T9911] Call Trace: [ 347.743702][ T9911] [ 347.746669][ T9911] __dump_stack+0x21/0x30 [ 347.751046][ T9911] dump_stack_lvl+0x110/0x170 [ 347.755769][ T9911] ? show_regs_print_info+0x20/0x20 [ 347.761007][ T9911] dump_stack+0x15/0x20 [ 347.765195][ T9911] should_fail+0x3c1/0x510 [ 347.769612][ T9911] should_fail_alloc_page+0x55/0x80 [ 347.775162][ T9911] prepare_alloc_pages+0x156/0x610 [ 347.780280][ T9911] ? __alloc_pages_bulk+0xad0/0xad0 [ 347.785481][ T9911] __alloc_pages+0x11d/0x460 [ 347.790074][ T9911] ? prep_new_page+0x110/0x110 [ 347.794847][ T9911] ? unwind_get_return_address+0x4d/0x90 [ 347.800481][ T9911] ? stack_trace_save+0xf0/0xf0 [ 347.805357][ T9911] ? arch_stack_walk+0xee/0x140 [ 347.810239][ T9911] pte_alloc_one+0x70/0x190 [ 347.814776][ T9911] ? pfn_modify_allowed+0x2f0/0x2f0 [ 347.820005][ T9911] ? stack_trace_save+0xa6/0xf0 [ 347.824888][ T9911] __pte_alloc+0x75/0x2a0 [ 347.829288][ T9911] ? __kasan_check_write+0x14/0x20 [ 347.834431][ T9911] ? _raw_spin_lock+0x94/0xf0 [ 347.839140][ T9911] ? free_pgtables+0x280/0x280 [ 347.843936][ T9911] ? __kasan_check_write+0x14/0x20 [ 347.849077][ T9911] copy_page_range+0x237c/0x28d0 [ 347.854054][ T9911] ? pfn_valid+0x1d0/0x1d0 [ 347.858505][ T9911] copy_mm+0xbf2/0x13c0 [ 347.862721][ T9911] ? copy_signal+0x600/0x600 [ 347.867333][ T9911] ? __init_rwsem+0xfc/0x1d0 [ 347.871930][ T9911] ? copy_signal+0x4cb/0x600 [ 347.876529][ T9911] copy_process+0x117c/0x3250 [ 347.881242][ T9911] ? __kasan_check_write+0x14/0x20 [ 347.886392][ T9911] ? __pidfd_prepare+0x150/0x150 [ 347.891366][ T9911] kernel_clone+0x233/0x960 [ 347.895902][ T9911] ? create_io_thread+0x170/0x170 [ 347.900956][ T9911] ? __kasan_check_write+0x14/0x20 [ 347.906195][ T9911] ? mutex_unlock+0x8f/0x230 [ 347.910851][ T9911] __x64_sys_clone+0x198/0x210 [ 347.915653][ T9911] ? __kasan_check_write+0x14/0x20 [ 347.920801][ T9911] ? __ia32_sys_vfork+0x130/0x130 [ 347.925945][ T9911] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 347.932046][ T9911] x64_sys_call+0x41f/0x9a0 [ 347.936578][ T9911] do_syscall_64+0x4c/0xa0 [ 347.941022][ T9911] ? clear_bhb_loop+0x50/0xa0 [ 347.945720][ T9911] ? clear_bhb_loop+0x50/0xa0 [ 347.950432][ T9911] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 347.956358][ T9911] RIP: 0033:0x7f4158ea0cb9 [ 347.960780][ T9911] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 347.980397][ T9911] RSP: 002b:00007f41578fcfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 347.988841][ T9911] RAX: ffffffffffffffda RBX: 00007f415911bfa0 RCX: 00007f4158ea0cb9 [ 347.996931][ T9911] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 348.005018][ T9911] RBP: 00007f41578fd090 R08: 0000000000000000 R09: 0000000000000000 [ 348.013021][ T9911] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 348.021017][ T9911] R13: 00007f415911c038 R14: 00007f415911bfa0 R15: 00007fff61441918 [ 348.029017][ T9911] [ 348.038403][ T9909] device sit0 entered promiscuous mode [ 348.265279][ T9923] device pim6reg1 entered promiscuous mode [ 348.398464][ T9935] device pim6reg1 entered promiscuous mode [ 348.406799][ T9935] device wg2 left promiscuous mode [ 348.414101][ T9935] device wg2 entered promiscuous mode [ 348.541054][ T9937] device syzkaller0 entered promiscuous mode [ 348.681820][ T9948] FAULT_INJECTION: forcing a failure. [ 348.681820][ T9948] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 348.695323][ T9948] CPU: 0 PID: 9948 Comm: syz.3.3050 Tainted: G W syzkaller #0 [ 348.704123][ T9948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 348.714209][ T9948] Call Trace: [ 348.717519][ T9948] [ 348.720479][ T9948] __dump_stack+0x21/0x30 [ 348.724837][ T9948] dump_stack_lvl+0x110/0x170 [ 348.729539][ T9948] ? show_regs_print_info+0x20/0x20 [ 348.734778][ T9948] dump_stack+0x15/0x20 [ 348.738966][ T9948] should_fail+0x3c1/0x510 [ 348.743411][ T9948] should_fail_alloc_page+0x55/0x80 [ 348.748643][ T9948] prepare_alloc_pages+0x156/0x610 [ 348.753793][ T9948] ? __alloc_pages_bulk+0xad0/0xad0 [ 348.759025][ T9948] __alloc_pages+0x11d/0x460 [ 348.763621][ T9948] ? prep_new_page+0x110/0x110 [ 348.768407][ T9948] ? unwind_get_return_address+0x4d/0x90 [ 348.774048][ T9948] ? stack_trace_save+0xf0/0xf0 [ 348.778905][ T9948] ? arch_stack_walk+0xee/0x140 [ 348.783773][ T9948] pte_alloc_one+0x70/0x190 [ 348.788377][ T9948] ? pfn_modify_allowed+0x2f0/0x2f0 [ 348.793824][ T9948] ? stack_trace_save+0xa6/0xf0 [ 348.798730][ T9948] __pte_alloc+0x75/0x2a0 [ 348.803068][ T9948] ? __kasan_check_write+0x14/0x20 [ 348.808187][ T9948] ? _raw_spin_lock+0x94/0xf0 [ 348.812868][ T9948] ? free_pgtables+0x280/0x280 [ 348.817637][ T9948] ? __kasan_check_write+0x14/0x20 [ 348.822782][ T9948] copy_page_range+0x237c/0x28d0 [ 348.827733][ T9948] ? pfn_valid+0x1d0/0x1d0 [ 348.832149][ T9948] copy_mm+0xbf2/0x13c0 [ 348.836307][ T9948] ? copy_signal+0x600/0x600 [ 348.840985][ T9948] ? __init_rwsem+0xfc/0x1d0 [ 348.845572][ T9948] ? copy_signal+0x4cb/0x600 [ 348.850156][ T9948] copy_process+0x117c/0x3250 [ 348.854839][ T9948] ? __kasan_check_write+0x14/0x20 [ 348.859949][ T9948] ? __pidfd_prepare+0x150/0x150 [ 348.864920][ T9948] kernel_clone+0x233/0x960 [ 348.869424][ T9948] ? create_io_thread+0x170/0x170 [ 348.874462][ T9948] ? __kasan_check_write+0x14/0x20 [ 348.879664][ T9948] ? mutex_unlock+0x8f/0x230 [ 348.884259][ T9948] __x64_sys_clone+0x198/0x210 [ 348.889025][ T9948] ? __kasan_check_write+0x14/0x20 [ 348.894140][ T9948] ? __ia32_sys_vfork+0x130/0x130 [ 348.899168][ T9948] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 348.905249][ T9948] x64_sys_call+0x41f/0x9a0 [ 348.909772][ T9948] do_syscall_64+0x4c/0xa0 [ 348.914196][ T9948] ? clear_bhb_loop+0x50/0xa0 [ 348.918867][ T9948] ? clear_bhb_loop+0x50/0xa0 [ 348.923544][ T9948] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 348.929435][ T9948] RIP: 0033:0x7fc808952cb9 [ 348.933853][ T9948] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 348.953574][ T9948] RSP: 002b:00007fc8073aefd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 348.962006][ T9948] RAX: ffffffffffffffda RBX: 00007fc808bcdfa0 RCX: 00007fc808952cb9 [ 348.970021][ T9948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 348.978110][ T9948] RBP: 00007fc8073af090 R08: 0000000000000000 R09: 0000000000000000 [ 348.986092][ T9948] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 348.994076][ T9948] R13: 00007fc808bce038 R14: 00007fc808bcdfa0 R15: 00007ffd0b1cc758 [ 349.002077][ T9948] [ 349.087906][ T9955] device sit0 left promiscuous mode [ 349.148997][ T9955] device sit0 entered promiscuous mode [ 350.173144][ T9978] device syzkaller0 entered promiscuous mode [ 350.217226][ T9989] device pim6reg1 entered promiscuous mode [ 350.263037][ T9994] FAULT_INJECTION: forcing a failure. [ 350.263037][ T9994] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 350.305057][ T9994] CPU: 1 PID: 9994 Comm: syz.9.3064 Tainted: G W syzkaller #0 [ 350.313879][ T9994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 350.324048][ T9994] Call Trace: [ 350.327352][ T9994] [ 350.330312][ T9994] __dump_stack+0x21/0x30 [ 350.334699][ T9994] dump_stack_lvl+0x110/0x170 [ 350.339402][ T9994] ? show_regs_print_info+0x20/0x20 [ 350.344626][ T9994] ? bpf_seq_printf_btf+0x1a0/0x1a0 [ 350.349854][ T9994] dump_stack+0x15/0x20 [ 350.354041][ T9994] should_fail+0x3c1/0x510 [ 350.358484][ T9994] should_fail_alloc_page+0x55/0x80 [ 350.363708][ T9994] prepare_alloc_pages+0x156/0x610 [ 350.368848][ T9994] ? __alloc_pages_bulk+0xad0/0xad0 [ 350.374072][ T9994] __alloc_pages+0x11d/0x460 [ 350.378696][ T9994] ? prep_new_page+0x110/0x110 [ 350.383489][ T9994] ? __mod_node_page_state+0x9e/0xd0 [ 350.388801][ T9994] pte_alloc_one+0x70/0x190 [ 350.393338][ T9994] ? pfn_modify_allowed+0x2f0/0x2f0 [ 350.398556][ T9994] ? _raw_spin_unlock+0x4d/0x70 [ 350.403443][ T9994] __pte_alloc+0x75/0x2a0 [ 350.407801][ T9994] ? __kasan_check_write+0x14/0x20 [ 350.412935][ T9994] ? _raw_spin_lock+0x94/0xf0 [ 350.417643][ T9994] ? free_pgtables+0x280/0x280 [ 350.422432][ T9994] ? __kasan_check_write+0x14/0x20 [ 350.427570][ T9994] copy_page_range+0x237c/0x28d0 [ 350.432541][ T9994] ? pfn_valid+0x1d0/0x1d0 [ 350.437020][ T9994] copy_mm+0xbf2/0x13c0 [ 350.441210][ T9994] ? copy_signal+0x600/0x600 [ 350.445825][ T9994] ? __init_rwsem+0xfc/0x1d0 [ 350.450433][ T9994] ? copy_signal+0x4cb/0x600 [ 350.455046][ T9994] copy_process+0x117c/0x3250 [ 350.459754][ T9994] ? __kasan_check_write+0x14/0x20 [ 350.464890][ T9994] ? __pidfd_prepare+0x150/0x150 [ 350.469861][ T9994] kernel_clone+0x233/0x960 [ 350.474401][ T9994] ? create_io_thread+0x170/0x170 [ 350.479449][ T9994] ? __kasan_check_write+0x14/0x20 [ 350.484592][ T9994] ? mutex_unlock+0x8f/0x230 [ 350.489211][ T9994] __x64_sys_clone+0x198/0x210 [ 350.493998][ T9994] ? __kasan_check_write+0x14/0x20 [ 350.499140][ T9994] ? __ia32_sys_vfork+0x130/0x130 [ 350.504198][ T9994] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 350.510289][ T9994] x64_sys_call+0x41f/0x9a0 [ 350.514815][ T9994] do_syscall_64+0x4c/0xa0 [ 350.519255][ T9994] ? clear_bhb_loop+0x50/0xa0 [ 350.523951][ T9994] ? clear_bhb_loop+0x50/0xa0 [ 350.528646][ T9994] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 350.534561][ T9994] RIP: 0033:0x7f8ec142fcb9 [ 350.539115][ T9994] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 350.558828][ T9994] RSP: 002b:00007f8ebfe8bfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 350.567269][ T9994] RAX: ffffffffffffffda RBX: 00007f8ec16aafa0 RCX: 00007f8ec142fcb9 [ 350.575264][ T9994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 350.583357][ T9994] RBP: 00007f8ebfe8c090 R08: 0000000000000000 R09: 0000000000000000 [ 350.591349][ T9994] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 350.599348][ T9994] R13: 00007f8ec16ab038 R14: 00007f8ec16aafa0 R15: 00007fffc3ce5808 [ 350.607347][ T9994] [ 350.798801][T10007] device sit0 left promiscuous mode [ 350.911574][T10017] device sit0 entered promiscuous mode [ 351.063690][T10033] FAULT_INJECTION: forcing a failure. [ 351.063690][T10033] name failslab, interval 1, probability 0, space 0, times 0 [ 351.262039][T10033] CPU: 0 PID: 10033 Comm: syz.7.3076 Tainted: G W syzkaller #0 [ 351.270971][T10033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 351.281065][T10033] Call Trace: [ 351.284370][T10033] [ 351.287330][T10033] __dump_stack+0x21/0x30 [ 351.291722][T10033] dump_stack_lvl+0x110/0x170 [ 351.296437][T10033] ? show_regs_print_info+0x20/0x20 [ 351.301671][T10033] dump_stack+0x15/0x20 [ 351.305853][T10033] should_fail+0x3c1/0x510 [ 351.310300][T10033] __should_failslab+0xa4/0xe0 [ 351.315090][T10033] should_failslab+0x9/0x20 [ 351.319625][T10033] slab_pre_alloc_hook+0x3b/0xe0 [ 351.324674][T10033] ? vm_area_dup+0x26/0x210 [ 351.329208][T10033] kmem_cache_alloc+0x44/0x260 [ 351.334000][T10033] vm_area_dup+0x26/0x210 [ 351.338353][T10033] copy_mm+0x947/0x13c0 [ 351.342533][T10033] ? copy_signal+0x600/0x600 [ 351.347145][T10033] ? __init_rwsem+0xfc/0x1d0 [ 351.351757][T10033] ? copy_signal+0x4cb/0x600 [ 351.356378][T10033] copy_process+0x117c/0x3250 [ 351.361208][T10033] ? __kasan_check_write+0x14/0x20 [ 351.366365][T10033] ? __pidfd_prepare+0x150/0x150 [ 351.371333][T10033] kernel_clone+0x233/0x960 [ 351.375874][T10033] ? create_io_thread+0x170/0x170 [ 351.380936][T10033] ? __kasan_check_write+0x14/0x20 [ 351.386079][T10033] ? mutex_unlock+0x8f/0x230 [ 351.390720][T10033] __x64_sys_clone+0x198/0x210 [ 351.395521][T10033] ? __kasan_check_write+0x14/0x20 [ 351.400666][T10033] ? __ia32_sys_vfork+0x130/0x130 [ 351.405747][T10033] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 351.411847][T10033] x64_sys_call+0x41f/0x9a0 [ 351.416399][T10033] do_syscall_64+0x4c/0xa0 [ 351.420966][T10033] ? clear_bhb_loop+0x50/0xa0 [ 351.425842][T10033] ? clear_bhb_loop+0x50/0xa0 [ 351.430650][T10033] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 351.436591][T10033] RIP: 0033:0x7f721233acb9 [ 351.441057][T10033] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 351.460865][T10033] RSP: 002b:00007f7210d96fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 351.469318][T10033] RAX: ffffffffffffffda RBX: 00007f72125b5fa0 RCX: 00007f721233acb9 [ 351.477333][T10033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 351.485335][T10033] RBP: 00007f7210d97090 R08: 0000000000000000 R09: 0000000000000000 [ 351.493339][T10033] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 351.501422][T10033] R13: 00007f72125b6038 R14: 00007f72125b5fa0 R15: 00007ffe207b8fb8 [ 351.509519][T10033] [ 351.684125][T10042] device syzkaller0 entered promiscuous mode [ 351.693807][T10043] syz.3.3077[10043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.693889][T10043] syz.3.3077[10043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.285019][T10075] device sit0 left promiscuous mode [ 352.321718][T10078] FAULT_INJECTION: forcing a failure. [ 352.321718][T10078] name failslab, interval 1, probability 0, space 0, times 0 [ 352.378022][T10075] device sit0 entered promiscuous mode [ 352.395462][T10078] CPU: 0 PID: 10078 Comm: syz.1.3090 Tainted: G W syzkaller #0 [ 352.404380][T10078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 352.414466][T10078] Call Trace: [ 352.417774][T10078] [ 352.420727][T10078] __dump_stack+0x21/0x30 [ 352.425092][T10078] dump_stack_lvl+0x110/0x170 [ 352.429798][T10078] ? show_regs_print_info+0x20/0x20 [ 352.435038][T10078] dump_stack+0x15/0x20 [ 352.439227][T10078] should_fail+0x3c1/0x510 [ 352.443674][T10078] __should_failslab+0xa4/0xe0 [ 352.448475][T10078] should_failslab+0x9/0x20 [ 352.453002][T10078] slab_pre_alloc_hook+0x3b/0xe0 [ 352.457962][T10078] ? vm_area_dup+0x26/0x210 [ 352.462492][T10078] kmem_cache_alloc+0x44/0x260 [ 352.467336][T10078] vm_area_dup+0x26/0x210 [ 352.471697][T10078] copy_mm+0x947/0x13c0 [ 352.475871][T10078] ? copy_signal+0x600/0x600 [ 352.480472][T10078] ? __init_rwsem+0xfc/0x1d0 [ 352.485080][T10078] ? copy_signal+0x4cb/0x600 [ 352.489686][T10078] copy_process+0x117c/0x3250 [ 352.494379][T10078] ? __kasan_check_write+0x14/0x20 [ 352.499507][T10078] ? __pidfd_prepare+0x150/0x150 [ 352.504466][T10078] kernel_clone+0x233/0x960 [ 352.508989][T10078] ? create_io_thread+0x170/0x170 [ 352.514131][T10078] ? __kasan_check_write+0x14/0x20 [ 352.519251][T10078] ? mutex_unlock+0x8f/0x230 [ 352.523859][T10078] __x64_sys_clone+0x198/0x210 [ 352.528663][T10078] ? __kasan_check_write+0x14/0x20 [ 352.533794][T10078] ? __ia32_sys_vfork+0x130/0x130 [ 352.538838][T10078] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 352.545012][T10078] x64_sys_call+0x41f/0x9a0 [ 352.549526][T10078] do_syscall_64+0x4c/0xa0 [ 352.554071][T10078] ? clear_bhb_loop+0x50/0xa0 [ 352.558769][T10078] ? clear_bhb_loop+0x50/0xa0 [ 352.563464][T10078] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 352.569376][T10078] RIP: 0033:0x7fbc56b64cb9 [ 352.573811][T10078] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 352.593430][T10078] RSP: 002b:00007fbc555c0fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 352.601861][T10078] RAX: ffffffffffffffda RBX: 00007fbc56ddffa0 RCX: 00007fbc56b64cb9 [ 352.609849][T10078] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 352.617946][T10078] RBP: 00007fbc555c1090 R08: 0000000000000000 R09: 0000000000000000 [ 352.625952][T10078] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 352.633960][T10078] R13: 00007fbc56de0038 R14: 00007fbc56ddffa0 R15: 00007fff5792c4a8 [ 352.641957][T10078] [ 353.124021][T10093] device syzkaller0 entered promiscuous mode [ 353.438586][T10123] FAULT_INJECTION: forcing a failure. [ 353.438586][T10123] name failslab, interval 1, probability 0, space 0, times 0 [ 353.571679][T10123] CPU: 1 PID: 10123 Comm: syz.9.3105 Tainted: G W syzkaller #0 [ 353.580598][T10123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 353.590685][T10123] Call Trace: [ 353.593993][T10123] [ 353.596949][T10123] __dump_stack+0x21/0x30 [ 353.601315][T10123] dump_stack_lvl+0x110/0x170 [ 353.606026][T10123] ? show_regs_print_info+0x20/0x20 [ 353.611273][T10123] dump_stack+0x15/0x20 [ 353.615470][T10123] should_fail+0x3c1/0x510 [ 353.619934][T10123] __should_failslab+0xa4/0xe0 [ 353.624736][T10123] should_failslab+0x9/0x20 [ 353.629309][T10123] slab_pre_alloc_hook+0x3b/0xe0 [ 353.634637][T10123] ? vm_area_dup+0x26/0x210 [ 353.639191][T10123] kmem_cache_alloc+0x44/0x260 [ 353.643991][T10123] vm_area_dup+0x26/0x210 [ 353.648350][T10123] copy_mm+0x947/0x13c0 [ 353.652570][T10123] ? copy_signal+0x600/0x600 [ 353.657199][T10123] ? __init_rwsem+0xfc/0x1d0 [ 353.661911][T10123] ? copy_signal+0x4cb/0x600 [ 353.666526][T10123] copy_process+0x117c/0x3250 [ 353.671241][T10123] ? __kasan_check_write+0x14/0x20 [ 353.676381][T10123] ? __pidfd_prepare+0x150/0x150 [ 353.681463][T10123] kernel_clone+0x233/0x960 [ 353.686139][T10123] ? create_io_thread+0x170/0x170 [ 353.691204][T10123] ? __kasan_check_write+0x14/0x20 [ 353.696479][T10123] ? mutex_unlock+0x8f/0x230 [ 353.701103][T10123] __x64_sys_clone+0x198/0x210 [ 353.705895][T10123] ? __kasan_check_write+0x14/0x20 [ 353.711036][T10123] ? __ia32_sys_vfork+0x130/0x130 [ 353.716078][T10123] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 353.722275][T10123] x64_sys_call+0x41f/0x9a0 [ 353.726816][T10123] do_syscall_64+0x4c/0xa0 [ 353.731253][T10123] ? clear_bhb_loop+0x50/0xa0 [ 353.735947][T10123] ? clear_bhb_loop+0x50/0xa0 [ 353.740639][T10123] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 353.746549][T10123] RIP: 0033:0x7f8ec142fcb9 [ 353.750980][T10123] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 353.770605][T10123] RSP: 002b:00007f8ebfe8bfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 353.779090][T10123] RAX: ffffffffffffffda RBX: 00007f8ec16aafa0 RCX: 00007f8ec142fcb9 [ 353.787081][T10123] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 353.795064][T10123] RBP: 00007f8ebfe8c090 R08: 0000000000000000 R09: 0000000000000000 [ 353.803060][T10123] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 353.811042][T10123] R13: 00007f8ec16ab038 R14: 00007f8ec16aafa0 R15: 00007fffc3ce5808 [ 353.819073][T10123] [ 354.987037][T10142] device sit0 left promiscuous mode [ 355.092243][T10143] device sit0 entered promiscuous mode [ 355.903561][T10165] FAULT_INJECTION: forcing a failure. [ 355.903561][T10165] name failslab, interval 1, probability 0, space 0, times 0 [ 355.919925][T10161] device syzkaller0 entered promiscuous mode [ 355.936349][T10165] CPU: 0 PID: 10165 Comm: syz.3.3117 Tainted: G W syzkaller #0 [ 355.945258][T10165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 355.955334][T10165] Call Trace: [ 355.958634][T10165] [ 355.961581][T10165] __dump_stack+0x21/0x30 [ 355.965935][T10165] dump_stack_lvl+0x110/0x170 [ 355.970634][T10165] ? show_regs_print_info+0x20/0x20 [ 355.975864][T10165] ? avc_denied+0x1b0/0x1b0 [ 355.980385][T10165] dump_stack+0x15/0x20 [ 355.984576][T10165] should_fail+0x3c1/0x510 [ 355.989018][T10165] __should_failslab+0xa4/0xe0 [ 355.993800][T10165] should_failslab+0x9/0x20 [ 355.998316][T10165] slab_pre_alloc_hook+0x3b/0xe0 [ 356.003271][T10165] ? vm_area_dup+0x26/0x210 [ 356.007795][T10165] kmem_cache_alloc+0x44/0x260 [ 356.012594][T10165] vm_area_dup+0x26/0x210 [ 356.016943][T10165] copy_mm+0x947/0x13c0 [ 356.021114][T10165] ? copy_signal+0x600/0x600 [ 356.025718][T10165] ? __init_rwsem+0xfc/0x1d0 [ 356.030320][T10165] ? copy_signal+0x4cb/0x600 [ 356.034948][T10165] copy_process+0x117c/0x3250 [ 356.039668][T10165] ? __kasan_check_write+0x14/0x20 [ 356.044797][T10165] ? __pidfd_prepare+0x150/0x150 [ 356.049760][T10165] kernel_clone+0x233/0x960 [ 356.054295][T10165] ? create_io_thread+0x170/0x170 [ 356.059335][T10165] ? __kasan_check_write+0x14/0x20 [ 356.064462][T10165] ? mutex_unlock+0x8f/0x230 [ 356.069066][T10165] __x64_sys_clone+0x198/0x210 [ 356.073850][T10165] ? __kasan_check_write+0x14/0x20 [ 356.079160][T10165] ? __ia32_sys_vfork+0x130/0x130 [ 356.084204][T10165] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 356.090287][T10165] x64_sys_call+0x41f/0x9a0 [ 356.094808][T10165] do_syscall_64+0x4c/0xa0 [ 356.099243][T10165] ? clear_bhb_loop+0x50/0xa0 [ 356.103932][T10165] ? clear_bhb_loop+0x50/0xa0 [ 356.108631][T10165] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 356.114542][T10165] RIP: 0033:0x7fc808952cb9 [ 356.118973][T10165] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 356.139111][T10165] RSP: 002b:00007fc8073aefd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 356.147653][T10165] RAX: ffffffffffffffda RBX: 00007fc808bcdfa0 RCX: 00007fc808952cb9 [ 356.155637][T10165] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 356.163620][T10165] RBP: 00007fc8073af090 R08: 0000000000000000 R09: 0000000000000000 [ 356.171609][T10165] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 356.179607][T10165] R13: 00007fc808bce038 R14: 00007fc808bcdfa0 R15: 00007ffd0b1cc758 [ 356.187610][T10165] [ 356.444362][T10192] device sit0 left promiscuous mode [ 356.485818][T10192] device sit0 entered promiscuous mode [ 356.828137][T10201] FAULT_INJECTION: forcing a failure. [ 356.828137][T10201] name failslab, interval 1, probability 0, space 0, times 0 [ 356.895323][T10201] CPU: 0 PID: 10201 Comm: syz.1.3129 Tainted: G W syzkaller #0 [ 356.904250][T10201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 356.914333][T10201] Call Trace: [ 356.917646][T10201] [ 356.920607][T10201] __dump_stack+0x21/0x30 [ 356.925107][T10201] dump_stack_lvl+0x110/0x170 [ 356.929821][T10201] ? show_regs_print_info+0x20/0x20 [ 356.935049][T10201] dump_stack+0x15/0x20 [ 356.939233][T10201] should_fail+0x3c1/0x510 [ 356.943814][T10201] __should_failslab+0xa4/0xe0 [ 356.948619][T10201] should_failslab+0x9/0x20 [ 356.953160][T10201] slab_pre_alloc_hook+0x3b/0xe0 [ 356.958138][T10201] ? anon_vma_clone+0xc0/0x500 [ 356.962937][T10201] kmem_cache_alloc+0x44/0x260 [ 356.967737][T10201] anon_vma_clone+0xc0/0x500 [ 356.972362][T10201] anon_vma_fork+0x8c/0x510 [ 356.976909][T10201] copy_mm+0x9de/0x13c0 [ 356.981100][T10201] ? copy_signal+0x600/0x600 [ 356.985716][T10201] ? __init_rwsem+0xfc/0x1d0 [ 356.990473][T10201] ? copy_signal+0x4cb/0x600 [ 356.995103][T10201] copy_process+0x117c/0x3250 [ 356.999824][T10201] ? __kasan_check_write+0x14/0x20 [ 357.004974][T10201] ? __pidfd_prepare+0x150/0x150 [ 357.009953][T10201] kernel_clone+0x233/0x960 [ 357.014505][T10201] ? create_io_thread+0x170/0x170 [ 357.019563][T10201] ? __kasan_check_write+0x14/0x20 [ 357.024874][T10201] ? mutex_unlock+0x8f/0x230 [ 357.029497][T10201] __x64_sys_clone+0x198/0x210 [ 357.034295][T10201] ? __kasan_check_write+0x14/0x20 [ 357.039448][T10201] ? __ia32_sys_vfork+0x130/0x130 [ 357.044516][T10201] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 357.050617][T10201] x64_sys_call+0x41f/0x9a0 [ 357.055158][T10201] do_syscall_64+0x4c/0xa0 [ 357.059608][T10201] ? clear_bhb_loop+0x50/0xa0 [ 357.064312][T10201] ? clear_bhb_loop+0x50/0xa0 [ 357.069023][T10201] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 357.074950][T10201] RIP: 0033:0x7fbc56b64cb9 [ 357.079395][T10201] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 357.099119][T10201] RSP: 002b:00007fbc555c0fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 357.107603][T10201] RAX: ffffffffffffffda RBX: 00007fbc56ddffa0 RCX: 00007fbc56b64cb9 [ 357.115668][T10201] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 357.123665][T10201] RBP: 00007fbc555c1090 R08: 0000000000000000 R09: 0000000000000000 [ 357.131667][T10201] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 357.139670][T10201] R13: 00007fbc56de0038 R14: 00007fbc56ddffa0 R15: 00007fff5792c4a8 [ 357.147800][T10201] [ 357.441751][T10210] device syzkaller0 entered promiscuous mode [ 357.945300][T10223] device syzkaller0 entered promiscuous mode [ 358.390075][T10250] device sit0 left promiscuous mode [ 358.415998][T10250] device sit0 entered promiscuous mode [ 358.498561][T10259] FAULT_INJECTION: forcing a failure. [ 358.498561][T10259] name failslab, interval 1, probability 0, space 0, times 0 [ 358.529284][T10259] CPU: 0 PID: 10259 Comm: syz.9.3146 Tainted: G W syzkaller #0 [ 358.538232][T10259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 358.548901][T10259] Call Trace: [ 358.552270][T10259] [ 358.555224][T10259] __dump_stack+0x21/0x30 [ 358.559600][T10259] dump_stack_lvl+0x110/0x170 [ 358.564320][T10259] ? show_regs_print_info+0x20/0x20 [ 358.569648][T10259] dump_stack+0x15/0x20 [ 358.573841][T10259] should_fail+0x3c1/0x510 [ 358.578345][T10259] __should_failslab+0xa4/0xe0 [ 358.583142][T10259] should_failslab+0x9/0x20 [ 358.587671][T10259] slab_pre_alloc_hook+0x3b/0xe0 [ 358.592643][T10259] ? anon_vma_clone+0xc0/0x500 [ 358.597531][T10259] kmem_cache_alloc+0x44/0x260 [ 358.602330][T10259] anon_vma_clone+0xc0/0x500 [ 358.606952][T10259] anon_vma_fork+0x8c/0x510 [ 358.611480][T10259] copy_mm+0x9de/0x13c0 [ 358.615667][T10259] ? copy_signal+0x600/0x600 [ 358.620462][T10259] ? __init_rwsem+0xfc/0x1d0 [ 358.625545][T10259] ? copy_signal+0x4cb/0x600 [ 358.630163][T10259] copy_process+0x117c/0x3250 [ 358.634884][T10259] ? __kasan_check_write+0x14/0x20 [ 358.640027][T10259] ? __pidfd_prepare+0x150/0x150 [ 358.645012][T10259] kernel_clone+0x233/0x960 [ 358.649632][T10259] ? create_io_thread+0x170/0x170 [ 358.654680][T10259] ? __kasan_check_write+0x14/0x20 [ 358.659904][T10259] ? mutex_unlock+0x8f/0x230 [ 358.664528][T10259] __x64_sys_clone+0x198/0x210 [ 358.669329][T10259] ? __kasan_check_write+0x14/0x20 [ 358.674486][T10259] ? __ia32_sys_vfork+0x130/0x130 [ 358.679548][T10259] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 358.685651][T10259] x64_sys_call+0x41f/0x9a0 [ 358.690184][T10259] do_syscall_64+0x4c/0xa0 [ 358.694658][T10259] ? clear_bhb_loop+0x50/0xa0 [ 358.699357][T10259] ? clear_bhb_loop+0x50/0xa0 [ 358.704092][T10259] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 358.710015][T10259] RIP: 0033:0x7f8ec142fcb9 [ 358.714466][T10259] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 358.734309][T10259] RSP: 002b:00007f8ebfe8bfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 358.743191][T10259] RAX: ffffffffffffffda RBX: 00007f8ec16aafa0 RCX: 00007f8ec142fcb9 [ 358.751193][T10259] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 358.759178][T10259] RBP: 00007f8ebfe8c090 R08: 0000000000000000 R09: 0000000000000000 [ 358.767184][T10259] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 358.775248][T10259] R13: 00007f8ec16ab038 R14: 00007f8ec16aafa0 R15: 00007fffc3ce5808 [ 358.783351][T10259] [ 358.879238][T10261] device syzkaller0 entered promiscuous mode [ 359.668034][T10302] FAULT_INJECTION: forcing a failure. [ 359.668034][T10302] name failslab, interval 1, probability 0, space 0, times 0 [ 359.680888][T10302] CPU: 0 PID: 10302 Comm: syz.7.3159 Tainted: G W syzkaller #0 [ 359.689773][T10302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 359.699857][T10302] Call Trace: [ 359.703161][T10302] [ 359.706118][T10302] __dump_stack+0x21/0x30 [ 359.710474][T10302] dump_stack_lvl+0x110/0x170 [ 359.715595][T10302] ? show_regs_print_info+0x20/0x20 [ 359.720810][T10302] dump_stack+0x15/0x20 [ 359.724977][T10302] should_fail+0x3c1/0x510 [ 359.729422][T10302] __should_failslab+0xa4/0xe0 [ 359.734207][T10302] should_failslab+0x9/0x20 [ 359.738793][T10302] slab_pre_alloc_hook+0x3b/0xe0 [ 359.743749][T10302] ? anon_vma_clone+0xc0/0x500 [ 359.748535][T10302] kmem_cache_alloc+0x44/0x260 [ 359.753317][T10302] anon_vma_clone+0xc0/0x500 [ 359.757930][T10302] anon_vma_fork+0x8c/0x510 [ 359.762447][T10302] copy_mm+0x9de/0x13c0 [ 359.766618][T10302] ? copy_signal+0x600/0x600 [ 359.771226][T10302] ? __init_rwsem+0xfc/0x1d0 [ 359.775948][T10302] ? copy_signal+0x4cb/0x600 [ 359.780571][T10302] copy_process+0x117c/0x3250 [ 359.785283][T10302] ? __kasan_check_write+0x14/0x20 [ 359.790420][T10302] ? __pidfd_prepare+0x150/0x150 [ 359.795378][T10302] kernel_clone+0x233/0x960 [ 359.799904][T10302] ? create_io_thread+0x170/0x170 [ 359.804944][T10302] ? __kasan_check_write+0x14/0x20 [ 359.810163][T10302] ? mutex_unlock+0x8f/0x230 [ 359.814959][T10302] __x64_sys_clone+0x198/0x210 [ 359.819749][T10302] ? __kasan_check_write+0x14/0x20 [ 359.824873][T10302] ? __ia32_sys_vfork+0x130/0x130 [ 359.829915][T10302] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 359.835999][T10302] x64_sys_call+0x41f/0x9a0 [ 359.840521][T10302] do_syscall_64+0x4c/0xa0 [ 359.844959][T10302] ? clear_bhb_loop+0x50/0xa0 [ 359.849669][T10302] ? clear_bhb_loop+0x50/0xa0 [ 359.854373][T10302] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 359.860297][T10302] RIP: 0033:0x7f721233acb9 [ 359.864731][T10302] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 359.884455][T10302] RSP: 002b:00007f7210d96fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 359.892889][T10302] RAX: ffffffffffffffda RBX: 00007f72125b5fa0 RCX: 00007f721233acb9 [ 359.901054][T10302] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 359.909037][T10302] RBP: 00007f7210d97090 R08: 0000000000000000 R09: 0000000000000000 [ 359.917021][T10302] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 359.925006][T10302] R13: 00007f72125b6038 R14: 00007f72125b5fa0 R15: 00007ffe207b8fb8 [ 359.933015][T10302] [ 360.023322][T10316] device sit0 left promiscuous mode [ 360.050785][T10313] device syzkaller0 entered promiscuous mode [ 360.073626][T10316] device sit0 entered promiscuous mode [ 360.373689][T10325] device syzkaller0 entered promiscuous mode [ 361.058356][T10368] FAULT_INJECTION: forcing a failure. [ 361.058356][T10368] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 361.075063][T10368] CPU: 1 PID: 10368 Comm: syz.7.3180 Tainted: G W syzkaller #0 [ 361.083968][T10368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 361.094160][T10368] Call Trace: [ 361.097462][T10368] [ 361.100416][T10368] __dump_stack+0x21/0x30 [ 361.104775][T10368] dump_stack_lvl+0x110/0x170 [ 361.109478][T10368] ? show_regs_print_info+0x20/0x20 [ 361.114704][T10368] ? bpf_snprintf+0x48/0x1b0 [ 361.119309][T10368] dump_stack+0x15/0x20 [ 361.123487][T10368] should_fail+0x3c1/0x510 [ 361.127934][T10368] should_fail_alloc_page+0x55/0x80 [ 361.133583][T10368] prepare_alloc_pages+0x156/0x610 [ 361.138707][T10368] ? __alloc_pages_bulk+0xad0/0xad0 [ 361.143926][T10368] __alloc_pages+0x11d/0x460 [ 361.148530][T10368] ? prep_new_page+0x110/0x110 [ 361.153335][T10368] ? unwind_get_return_address+0x4d/0x90 [ 361.158988][T10368] ? stack_trace_save+0xf0/0xf0 [ 361.163848][T10368] ? arch_stack_walk+0xee/0x140 [ 361.168712][T10368] pte_alloc_one+0x70/0x190 [ 361.173238][T10368] ? pfn_modify_allowed+0x2f0/0x2f0 [ 361.178451][T10368] ? stack_trace_save+0xa6/0xf0 [ 361.183317][T10368] __pte_alloc+0x75/0x2a0 [ 361.187667][T10368] ? __kasan_check_write+0x14/0x20 [ 361.192880][T10368] ? _raw_spin_lock+0x94/0xf0 [ 361.197574][T10368] ? free_pgtables+0x280/0x280 [ 361.202430][T10368] ? __kasan_check_write+0x14/0x20 [ 361.207554][T10368] copy_page_range+0x237c/0x28d0 [ 361.212511][T10368] ? pfn_valid+0x1d0/0x1d0 [ 361.216945][T10368] copy_mm+0xbf2/0x13c0 [ 361.221119][T10368] ? copy_signal+0x600/0x600 [ 361.225715][T10368] ? __init_rwsem+0xfc/0x1d0 [ 361.230319][T10368] ? copy_signal+0x4cb/0x600 [ 361.234920][T10368] copy_process+0x117c/0x3250 [ 361.239711][T10368] ? __kasan_check_write+0x14/0x20 [ 361.244832][T10368] ? __pidfd_prepare+0x150/0x150 [ 361.249785][T10368] kernel_clone+0x233/0x960 [ 361.254307][T10368] ? create_io_thread+0x170/0x170 [ 361.259343][T10368] ? __kasan_check_write+0x14/0x20 [ 361.264468][T10368] ? mutex_unlock+0x8f/0x230 [ 361.269082][T10368] __x64_sys_clone+0x198/0x210 [ 361.273861][T10368] ? __kasan_check_write+0x14/0x20 [ 361.278988][T10368] ? __ia32_sys_vfork+0x130/0x130 [ 361.284044][T10368] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 361.290213][T10368] x64_sys_call+0x41f/0x9a0 [ 361.294731][T10368] do_syscall_64+0x4c/0xa0 [ 361.299159][T10368] ? clear_bhb_loop+0x50/0xa0 [ 361.304070][T10368] ? clear_bhb_loop+0x50/0xa0 [ 361.308761][T10368] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 361.314671][T10368] RIP: 0033:0x7f721233acb9 [ 361.319096][T10368] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 361.338803][T10368] RSP: 002b:00007f7210d96fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 361.347237][T10368] RAX: ffffffffffffffda RBX: 00007f72125b5fa0 RCX: 00007f721233acb9 [ 361.355224][T10368] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 361.363205][T10368] RBP: 00007f7210d97090 R08: 0000000000000000 R09: 0000000000000000 [ 361.371193][T10368] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 361.379184][T10368] R13: 00007f72125b6038 R14: 00007f72125b5fa0 R15: 00007ffe207b8fb8 [ 361.387191][T10368] [ 361.427914][T10371] device syzkaller0 entered promiscuous mode [ 361.454339][T10376] device sit0 left promiscuous mode [ 361.625443][T10376] device sit0 entered promiscuous mode [ 361.641885][T10384] FAULT_INJECTION: forcing a failure. [ 361.641885][T10384] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 361.833354][T10384] CPU: 1 PID: 10384 Comm: syz.8.3184 Tainted: G W syzkaller #0 [ 361.842274][T10384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 361.852511][T10384] Call Trace: [ 361.855837][T10384] [ 361.858797][T10384] __dump_stack+0x21/0x30 [ 361.863165][T10384] dump_stack_lvl+0x110/0x170 [ 361.867879][T10384] ? show_regs_print_info+0x20/0x20 [ 361.873207][T10384] dump_stack+0x15/0x20 [ 361.877393][T10384] should_fail+0x3c1/0x510 [ 361.881839][T10384] should_fail_usercopy+0x1a/0x20 [ 361.886890][T10384] _copy_to_user+0x20/0x90 [ 361.891336][T10384] simple_read_from_buffer+0xe9/0x160 [ 361.896736][T10384] proc_fail_nth_read+0x1a6/0x220 [ 361.901806][T10384] ? proc_fault_inject_write+0x310/0x310 [ 361.907468][T10384] ? security_file_permission+0x83/0xa0 [ 361.913043][T10384] ? proc_fault_inject_write+0x310/0x310 [ 361.918711][T10384] vfs_read+0x28d/0xc40 [ 361.922904][T10384] ? kernel_read+0x1f0/0x1f0 [ 361.927534][T10384] ? __kasan_check_write+0x14/0x20 [ 361.932850][T10384] ? mutex_lock+0x9b/0x1c0 [ 361.937321][T10384] ? wait_for_completion_killable_timeout+0x10/0x10 [ 361.943938][T10384] ? __fget_files+0x2c4/0x320 [ 361.948654][T10384] ? __fdget_pos+0x2d2/0x380 [ 361.953272][T10384] ? ksys_read+0x71/0x250 [ 361.957624][T10384] ksys_read+0x149/0x250 [ 361.961899][T10384] ? vfs_write+0xfd0/0xfd0 [ 361.966359][T10384] ? debug_smp_processor_id+0x17/0x20 [ 361.971764][T10384] __x64_sys_read+0x7b/0x90 [ 361.976295][T10384] x64_sys_call+0x96d/0x9a0 [ 361.980827][T10384] do_syscall_64+0x4c/0xa0 [ 361.985271][T10384] ? clear_bhb_loop+0x50/0xa0 [ 361.989971][T10384] ? clear_bhb_loop+0x50/0xa0 [ 361.994659][T10384] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 362.000570][T10384] RIP: 0033:0x7f4158e6158e [ 362.005009][T10384] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 362.024627][T10384] RSP: 002b:00007f41578bafe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 362.033052][T10384] RAX: ffffffffffffffda RBX: 00007f41578bb6c0 RCX: 00007f4158e6158e [ 362.041034][T10384] RDX: 000000000000000f RSI: 00007f41578bb0a0 RDI: 000000000000000a [ 362.049051][T10384] RBP: 00007f41578bb090 R08: 0000000000000000 R09: 0000000000000000 [ 362.057146][T10384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 362.065135][T10384] R13: 00007f415911c218 R14: 00007f415911c180 R15: 00007fff61441918 [ 362.073594][T10384] [ 362.236363][T10387] device syzkaller0 entered promiscuous mode [ 362.627783][T10427] FAULT_INJECTION: forcing a failure. [ 362.627783][T10427] name failslab, interval 1, probability 0, space 0, times 0 [ 363.025078][T10427] CPU: 1 PID: 10427 Comm: syz.3.3195 Tainted: G W syzkaller #0 [ 363.033998][T10427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 363.044160][T10427] Call Trace: [ 363.047470][T10427] [ 363.050415][T10427] __dump_stack+0x21/0x30 [ 363.054764][T10427] dump_stack_lvl+0x110/0x170 [ 363.059463][T10427] ? show_regs_print_info+0x20/0x20 [ 363.064678][T10427] dump_stack+0x15/0x20 [ 363.068870][T10427] should_fail+0x3c1/0x510 [ 363.073387][T10427] __should_failslab+0xa4/0xe0 [ 363.078164][T10427] should_failslab+0x9/0x20 [ 363.082677][T10427] slab_pre_alloc_hook+0x3b/0xe0 [ 363.087629][T10427] ? vm_area_dup+0x26/0x210 [ 363.092272][T10427] kmem_cache_alloc+0x44/0x260 [ 363.097048][T10427] vm_area_dup+0x26/0x210 [ 363.101397][T10427] copy_mm+0x947/0x13c0 [ 363.105570][T10427] ? copy_signal+0x600/0x600 [ 363.110167][T10427] ? __init_rwsem+0xfc/0x1d0 [ 363.114774][T10427] ? copy_signal+0x4cb/0x600 [ 363.119373][T10427] copy_process+0x117c/0x3250 [ 363.124160][T10427] ? __kasan_check_write+0x14/0x20 [ 363.129283][T10427] ? __pidfd_prepare+0x150/0x150 [ 363.134235][T10427] kernel_clone+0x233/0x960 [ 363.138757][T10427] ? create_io_thread+0x170/0x170 [ 363.143798][T10427] __x64_sys_clone+0x198/0x210 [ 363.148588][T10427] ? __ia32_sys_vfork+0x130/0x130 [ 363.153658][T10427] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 363.159753][T10427] x64_sys_call+0x41f/0x9a0 [ 363.164266][T10427] do_syscall_64+0x4c/0xa0 [ 363.168698][T10427] ? clear_bhb_loop+0x50/0xa0 [ 363.173387][T10427] ? clear_bhb_loop+0x50/0xa0 [ 363.178079][T10427] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 363.183992][T10427] RIP: 0033:0x7fc808952cb9 [ 363.188427][T10427] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 363.208219][T10427] RSP: 002b:00007fc8073aefd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 363.216778][T10427] RAX: ffffffffffffffda RBX: 00007fc808bcdfa0 RCX: 00007fc808952cb9 [ 363.224806][T10427] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 363.232797][T10427] RBP: 00007fc8073af090 R08: 0000000000000000 R09: 0000000000000000 [ 363.240779][T10427] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 363.248756][T10427] R13: 00007fc808bce038 R14: 00007fc808bcdfa0 R15: 00007ffd0b1cc758 [ 363.256756][T10427] [ 363.285188][T10433] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 363.294444][T10435] device sit0 left promiscuous mode [ 363.339648][T10435] device sit0 entered promiscuous mode [ 363.508256][T10432] device syzkaller0 entered promiscuous mode [ 364.224828][T10458] device syzkaller0 entered promiscuous mode [ 364.251260][T10477] device lo entered promiscuous mode [ 364.293293][T10480] FAULT_INJECTION: forcing a failure. [ 364.293293][T10480] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 364.307515][T10480] CPU: 1 PID: 10480 Comm: syz.3.3211 Tainted: G W syzkaller #0 [ 364.316420][T10480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 364.326679][T10480] Call Trace: [ 364.329977][T10480] [ 364.332931][T10480] __dump_stack+0x21/0x30 [ 364.337266][T10480] dump_stack_lvl+0x110/0x170 [ 364.341945][T10480] ? show_regs_print_info+0x20/0x20 [ 364.347173][T10480] dump_stack+0x15/0x20 [ 364.351445][T10480] should_fail+0x3c1/0x510 [ 364.355861][T10480] should_fail_alloc_page+0x55/0x80 [ 364.361327][T10480] prepare_alloc_pages+0x156/0x610 [ 364.366527][T10480] ? __alloc_pages_bulk+0xad0/0xad0 [ 364.371733][T10480] __alloc_pages+0x11d/0x460 [ 364.376339][T10480] ? prep_new_page+0x110/0x110 [ 364.381274][T10480] ? __mod_node_page_state+0x9e/0xd0 [ 364.386568][T10480] pte_alloc_one+0x70/0x190 [ 364.391070][T10480] ? pfn_modify_allowed+0x2f0/0x2f0 [ 364.396267][T10480] __pte_alloc+0x75/0x2a0 [ 364.400598][T10480] ? __kasan_check_write+0x14/0x20 [ 364.405728][T10480] ? _raw_spin_lock+0x94/0xf0 [ 364.410417][T10480] ? free_pgtables+0x280/0x280 [ 364.415178][T10480] ? __kasan_check_write+0x14/0x20 [ 364.420294][T10480] copy_page_range+0x237c/0x28d0 [ 364.425241][T10480] ? pfn_valid+0x1d0/0x1d0 [ 364.429680][T10480] copy_mm+0xbf2/0x13c0 [ 364.433839][T10480] ? copy_signal+0x600/0x600 [ 364.438459][T10480] ? __init_rwsem+0xfc/0x1d0 [ 364.443080][T10480] ? copy_signal+0x4cb/0x600 [ 364.447691][T10480] copy_process+0x117c/0x3250 [ 364.452413][T10480] ? __kasan_check_write+0x14/0x20 [ 364.457547][T10480] ? __pidfd_prepare+0x150/0x150 [ 364.462506][T10480] kernel_clone+0x233/0x960 [ 364.467042][T10480] ? create_io_thread+0x170/0x170 [ 364.472110][T10480] ? __kasan_check_write+0x14/0x20 [ 364.477241][T10480] ? mutex_unlock+0x8f/0x230 [ 364.481871][T10480] __x64_sys_clone+0x198/0x210 [ 364.486664][T10480] ? __kasan_check_write+0x14/0x20 [ 364.491781][T10480] ? __ia32_sys_vfork+0x130/0x130 [ 364.496827][T10480] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 364.503180][T10480] x64_sys_call+0x41f/0x9a0 [ 364.507682][T10480] do_syscall_64+0x4c/0xa0 [ 364.512120][T10480] ? clear_bhb_loop+0x50/0xa0 [ 364.516799][T10480] ? clear_bhb_loop+0x50/0xa0 [ 364.521484][T10480] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 364.527392][T10480] RIP: 0033:0x7fc808952cb9 [ 364.531831][T10480] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 364.551455][T10480] RSP: 002b:00007fc8073aefd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 364.559876][T10480] RAX: ffffffffffffffda RBX: 00007fc808bcdfa0 RCX: 00007fc808952cb9 [ 364.567881][T10480] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 364.575862][T10480] RBP: 00007fc8073af090 R08: 0000000000000000 R09: 0000000000000000 [ 364.583859][T10480] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 364.591841][T10480] R13: 00007fc808bce038 R14: 00007fc808bcdfa0 R15: 00007ffd0b1cc758 [ 364.599818][T10480] [ 364.804716][T10501] device syzkaller0 entered promiscuous mode [ 365.037305][T10517] FAULT_INJECTION: forcing a failure. [ 365.037305][T10517] name failslab, interval 1, probability 0, space 0, times 0 [ 365.050172][T10517] CPU: 1 PID: 10517 Comm: syz.1.3222 Tainted: G W syzkaller #0 [ 365.059135][T10517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 365.069219][T10517] Call Trace: [ 365.072522][T10517] [ 365.075568][T10517] __dump_stack+0x21/0x30 [ 365.079964][T10517] dump_stack_lvl+0x110/0x170 [ 365.084677][T10517] ? show_regs_print_info+0x20/0x20 [ 365.089901][T10517] dump_stack+0x15/0x20 [ 365.094085][T10517] should_fail+0x3c1/0x510 [ 365.098528][T10517] __should_failslab+0xa4/0xe0 [ 365.103319][T10517] should_failslab+0x9/0x20 [ 365.107854][T10517] slab_pre_alloc_hook+0x3b/0xe0 [ 365.112829][T10517] ? anon_vma_fork+0x200/0x510 [ 365.117616][T10517] kmem_cache_alloc+0x44/0x260 [ 365.122409][T10517] anon_vma_fork+0x200/0x510 [ 365.127018][T10517] copy_mm+0x9de/0x13c0 [ 365.131198][T10517] ? copy_signal+0x600/0x600 [ 365.135803][T10517] ? __init_rwsem+0xfc/0x1d0 [ 365.140411][T10517] ? copy_signal+0x4cb/0x600 [ 365.145029][T10517] copy_process+0x117c/0x3250 [ 365.149731][T10517] ? __kasan_check_write+0x14/0x20 [ 365.154948][T10517] ? __pidfd_prepare+0x150/0x150 [ 365.159917][T10517] kernel_clone+0x233/0x960 [ 365.164437][T10517] ? create_io_thread+0x170/0x170 [ 365.169575][T10517] ? __kasan_check_write+0x14/0x20 [ 365.174716][T10517] ? mutex_unlock+0x8f/0x230 [ 365.179330][T10517] __x64_sys_clone+0x198/0x210 [ 365.184134][T10517] ? __kasan_check_write+0x14/0x20 [ 365.189277][T10517] ? __ia32_sys_vfork+0x130/0x130 [ 365.194339][T10517] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 365.200431][T10517] x64_sys_call+0x41f/0x9a0 [ 365.204963][T10517] do_syscall_64+0x4c/0xa0 [ 365.209410][T10517] ? clear_bhb_loop+0x50/0xa0 [ 365.214106][T10517] ? clear_bhb_loop+0x50/0xa0 [ 365.218799][T10517] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 365.224714][T10517] RIP: 0033:0x7fbc56b64cb9 [ 365.229147][T10517] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 365.248773][T10517] RSP: 002b:00007fbc555c0fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 365.257213][T10517] RAX: ffffffffffffffda RBX: 00007fbc56ddffa0 RCX: 00007fbc56b64cb9 [ 365.265201][T10517] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 365.273192][T10517] RBP: 00007fbc555c1090 R08: 0000000000000000 R09: 0000000000000000 [ 365.281186][T10517] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 365.289180][T10517] R13: 00007fbc56de0038 R14: 00007fbc56ddffa0 R15: 00007fff5792c4a8 [ 365.297279][T10517] [ 365.338514][T10512] device sit0 left promiscuous mode [ 365.572824][T10515] device sit0 entered promiscuous mode [ 366.631836][T10542] device syzkaller0 entered promiscuous mode [ 366.972725][T10555] FAULT_INJECTION: forcing a failure. [ 366.972725][T10555] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 367.035700][T10555] CPU: 0 PID: 10555 Comm: syz.8.3233 Tainted: G W syzkaller #0 [ 367.044641][T10555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 367.054823][T10555] Call Trace: [ 367.058131][T10555] [ 367.061078][T10555] __dump_stack+0x21/0x30 [ 367.065436][T10555] dump_stack_lvl+0x110/0x170 [ 367.070140][T10555] ? show_regs_print_info+0x20/0x20 [ 367.075372][T10555] dump_stack+0x15/0x20 [ 367.079560][T10555] should_fail+0x3c1/0x510 [ 367.084001][T10555] should_fail_alloc_page+0x55/0x80 [ 367.089229][T10555] prepare_alloc_pages+0x156/0x610 [ 367.094369][T10555] ? __alloc_pages_bulk+0xad0/0xad0 [ 367.099605][T10555] __alloc_pages+0x11d/0x460 [ 367.104224][T10555] ? prep_new_page+0x110/0x110 [ 367.109019][T10555] ? __mod_node_page_state+0x9e/0xd0 [ 367.114363][T10555] pte_alloc_one+0x70/0x190 [ 367.118902][T10555] ? pfn_modify_allowed+0x2f0/0x2f0 [ 367.124254][T10555] __pte_alloc+0x75/0x2a0 [ 367.128622][T10555] ? __kasan_check_write+0x14/0x20 [ 367.133762][T10555] ? _raw_spin_lock+0x94/0xf0 [ 367.138483][T10555] ? free_pgtables+0x280/0x280 [ 367.143283][T10555] ? __kasan_check_write+0x14/0x20 [ 367.148431][T10555] copy_page_range+0x237c/0x28d0 [ 367.153410][T10555] ? pfn_valid+0x1d0/0x1d0 [ 367.157856][T10555] copy_mm+0xbf2/0x13c0 [ 367.162040][T10555] ? copy_signal+0x600/0x600 [ 367.166651][T10555] ? __init_rwsem+0xfc/0x1d0 [ 367.171272][T10555] ? copy_signal+0x4cb/0x600 [ 367.175898][T10555] copy_process+0x117c/0x3250 [ 367.180615][T10555] ? __kasan_check_write+0x14/0x20 [ 367.185753][T10555] ? __pidfd_prepare+0x150/0x150 [ 367.190738][T10555] kernel_clone+0x233/0x960 [ 367.195269][T10555] ? create_io_thread+0x170/0x170 [ 367.200323][T10555] ? __kasan_check_write+0x14/0x20 [ 367.205466][T10555] ? mutex_unlock+0x8f/0x230 [ 367.210096][T10555] __x64_sys_clone+0x198/0x210 [ 367.214900][T10555] ? __kasan_check_write+0x14/0x20 [ 367.220040][T10555] ? __ia32_sys_vfork+0x130/0x130 [ 367.225098][T10555] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 367.231206][T10555] x64_sys_call+0x41f/0x9a0 [ 367.235821][T10555] do_syscall_64+0x4c/0xa0 [ 367.240263][T10555] ? clear_bhb_loop+0x50/0xa0 [ 367.244962][T10555] ? clear_bhb_loop+0x50/0xa0 [ 367.249673][T10555] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 367.255593][T10555] RIP: 0033:0x7f4158ea0cb9 [ 367.260050][T10555] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 367.279689][T10555] RSP: 002b:00007f41578fcfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 367.288225][T10555] RAX: ffffffffffffffda RBX: 00007f415911bfa0 RCX: 00007f4158ea0cb9 [ 367.296225][T10555] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 367.304226][T10555] RBP: 00007f41578fd090 R08: 0000000000000000 R09: 0000000000000000 [ 367.312236][T10555] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 367.320232][T10555] R13: 00007f415911c038 R14: 00007f415911bfa0 R15: 00007fff61441918 [ 367.328240][T10555] [ 368.412406][T10603] FAULT_INJECTION: forcing a failure. [ 368.412406][T10603] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 368.426026][T10603] CPU: 1 PID: 10603 Comm: syz.1.3247 Tainted: G W syzkaller #0 [ 368.434905][T10603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 368.444999][T10603] Call Trace: [ 368.448295][T10603] [ 368.451242][T10603] __dump_stack+0x21/0x30 [ 368.455592][T10603] dump_stack_lvl+0x110/0x170 [ 368.460293][T10603] ? show_regs_print_info+0x20/0x20 [ 368.465511][T10603] ? kmem_cache_alloc+0x138/0x260 [ 368.470549][T10603] dump_stack+0x15/0x20 [ 368.474716][T10603] should_fail+0x3c1/0x510 [ 368.479142][T10603] should_fail_alloc_page+0x55/0x80 [ 368.484359][T10603] prepare_alloc_pages+0x156/0x610 [ 368.489490][T10603] ? __alloc_pages_bulk+0xad0/0xad0 [ 368.494707][T10603] __alloc_pages+0x11d/0x460 [ 368.499337][T10603] ? prep_new_page+0x110/0x110 [ 368.504114][T10603] ? arch_stack_walk+0xee/0x140 [ 368.508983][T10603] pte_alloc_one+0x70/0x190 [ 368.513499][T10603] ? pfn_modify_allowed+0x2f0/0x2f0 [ 368.518724][T10603] ? stack_trace_save+0xa6/0xf0 [ 368.524024][T10603] ? __stack_depot_save+0x34/0x480 [ 368.529148][T10603] ? copy_mm+0x9de/0x13c0 [ 368.533489][T10603] __pte_alloc+0x75/0x2a0 [ 368.537924][T10603] ? __kasan_slab_alloc+0xcf/0xf0 [ 368.542958][T10603] ? free_pgtables+0x280/0x280 [ 368.547742][T10603] ? anon_vma_fork+0x200/0x510 [ 368.552515][T10603] ? copy_mm+0x9de/0x13c0 [ 368.556853][T10603] ? copy_process+0x117c/0x3250 [ 368.561727][T10603] ? kernel_clone+0x233/0x960 [ 368.566415][T10603] ? __x64_sys_clone+0x198/0x210 [ 368.571364][T10603] copy_page_range+0x237c/0x28d0 [ 368.576315][T10603] ? pfn_valid+0x1d0/0x1d0 [ 368.580743][T10603] copy_mm+0xbf2/0x13c0 [ 368.584913][T10603] ? copy_signal+0x600/0x600 [ 368.589518][T10603] ? __init_rwsem+0xfc/0x1d0 [ 368.594120][T10603] ? copy_signal+0x4cb/0x600 [ 368.598721][T10603] copy_process+0x117c/0x3250 [ 368.603411][T10603] ? __kasan_check_write+0x14/0x20 [ 368.608550][T10603] ? __pidfd_prepare+0x150/0x150 [ 368.613507][T10603] kernel_clone+0x233/0x960 [ 368.618025][T10603] ? create_io_thread+0x170/0x170 [ 368.623149][T10603] ? __kasan_check_write+0x14/0x20 [ 368.628272][T10603] ? mutex_unlock+0x8f/0x230 [ 368.632881][T10603] __x64_sys_clone+0x198/0x210 [ 368.637656][T10603] ? __kasan_check_write+0x14/0x20 [ 368.642815][T10603] ? __ia32_sys_vfork+0x130/0x130 [ 368.647941][T10603] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 368.654024][T10603] x64_sys_call+0x41f/0x9a0 [ 368.658540][T10603] do_syscall_64+0x4c/0xa0 [ 368.662969][T10603] ? clear_bhb_loop+0x50/0xa0 [ 368.667657][T10603] ? clear_bhb_loop+0x50/0xa0 [ 368.672356][T10603] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 368.678316][T10603] RIP: 0033:0x7fbc56b64cb9 [ 368.682743][T10603] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 368.702365][T10603] RSP: 002b:00007fbc555c0fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 368.710806][T10603] RAX: ffffffffffffffda RBX: 00007fbc56ddffa0 RCX: 00007fbc56b64cb9 [ 368.718999][T10603] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 368.726995][T10603] RBP: 00007fbc555c1090 R08: 0000000000000000 R09: 0000000000000000 [ 368.734983][T10603] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 368.742979][T10603] R13: 00007fbc56de0038 R14: 00007fbc56ddffa0 R15: 00007fff5792c4a8 [ 368.750985][T10603] [ 368.981960][T10614] device sit0 left promiscuous mode [ 369.084840][T10616] device sit0 entered promiscuous mode [ 369.307167][T10624] device veth1_macvtap left promiscuous mode [ 369.384661][T10625] device veth1_macvtap entered promiscuous mode [ 369.461931][T10625] device macsec0 entered promiscuous mode [ 369.837822][T10639] FAULT_INJECTION: forcing a failure. [ 369.837822][T10639] name failslab, interval 1, probability 0, space 0, times 0 [ 369.867397][T10639] CPU: 1 PID: 10639 Comm: syz.7.3258 Tainted: G W syzkaller #0 [ 369.876311][T10639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 369.886571][T10639] Call Trace: [ 369.889870][T10639] [ 369.892820][T10639] __dump_stack+0x21/0x30 [ 369.897177][T10639] dump_stack_lvl+0x110/0x170 [ 369.901910][T10639] ? show_regs_print_info+0x20/0x20 [ 369.907143][T10639] dump_stack+0x15/0x20 [ 369.911316][T10639] should_fail+0x3c1/0x510 [ 369.915750][T10639] __should_failslab+0xa4/0xe0 [ 369.920552][T10639] should_failslab+0x9/0x20 [ 369.925076][T10639] slab_pre_alloc_hook+0x3b/0xe0 [ 369.930107][T10639] ? anon_vma_clone+0xc0/0x500 [ 369.934904][T10639] kmem_cache_alloc+0x44/0x260 [ 369.939798][T10639] anon_vma_clone+0xc0/0x500 [ 369.944426][T10639] anon_vma_fork+0x8c/0x510 [ 369.948952][T10639] copy_mm+0x9de/0x13c0 [ 369.953143][T10639] ? copy_signal+0x600/0x600 [ 369.957752][T10639] ? __init_rwsem+0xfc/0x1d0 [ 369.962370][T10639] ? copy_signal+0x4cb/0x600 [ 369.966981][T10639] copy_process+0x117c/0x3250 [ 369.971687][T10639] ? putname+0x111/0x160 [ 369.975997][T10639] ? __kasan_check_write+0x14/0x20 [ 369.981134][T10639] ? __pidfd_prepare+0x150/0x150 [ 369.986111][T10639] kernel_clone+0x233/0x960 [ 369.990635][T10639] ? create_io_thread+0x170/0x170 [ 369.995690][T10639] ? __kasan_check_write+0x14/0x20 [ 370.000851][T10639] ? mutex_unlock+0x8f/0x230 [ 370.005572][T10639] __x64_sys_clone+0x198/0x210 [ 370.010353][T10639] ? __kasan_check_write+0x14/0x20 [ 370.015491][T10639] ? __ia32_sys_vfork+0x130/0x130 [ 370.020547][T10639] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 370.026638][T10639] x64_sys_call+0x41f/0x9a0 [ 370.031175][T10639] do_syscall_64+0x4c/0xa0 [ 370.035621][T10639] ? clear_bhb_loop+0x50/0xa0 [ 370.040318][T10639] ? clear_bhb_loop+0x50/0xa0 [ 370.045015][T10639] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 370.050928][T10639] RIP: 0033:0x7f721233acb9 [ 370.055374][T10639] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 370.075343][T10639] RSP: 002b:00007f7210d96fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 370.083803][T10639] RAX: ffffffffffffffda RBX: 00007f72125b5fa0 RCX: 00007f721233acb9 [ 370.091811][T10639] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 370.099823][T10639] RBP: 00007f7210d97090 R08: 0000000000000000 R09: 0000000000000000 [ 370.107815][T10639] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 370.115807][T10639] R13: 00007f72125b6038 R14: 00007f72125b5fa0 R15: 00007ffe207b8fb8 [ 370.123909][T10639] [ 370.362491][T10671] device syzkaller0 entered promiscuous mode [ 370.494118][T10680] device sit0 left promiscuous mode [ 370.521295][T10680] device sit0 entered promiscuous mode [ 370.552380][T10695] FAULT_INJECTION: forcing a failure. [ 370.552380][T10695] name failslab, interval 1, probability 0, space 0, times 0 [ 370.565817][T10695] CPU: 0 PID: 10695 Comm: syz.3.3275 Tainted: G W syzkaller #0 [ 370.574718][T10695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 370.584794][T10695] Call Trace: [ 370.588098][T10695] [ 370.591108][T10695] __dump_stack+0x21/0x30 [ 370.595473][T10695] dump_stack_lvl+0x110/0x170 [ 370.600179][T10695] ? show_regs_print_info+0x20/0x20 [ 370.605412][T10695] dump_stack+0x15/0x20 [ 370.609600][T10695] should_fail+0x3c1/0x510 [ 370.614133][T10695] __should_failslab+0xa4/0xe0 [ 370.618924][T10695] should_failslab+0x9/0x20 [ 370.623544][T10695] slab_pre_alloc_hook+0x3b/0xe0 [ 370.628606][T10695] ? vm_area_dup+0x26/0x210 [ 370.633141][T10695] kmem_cache_alloc+0x44/0x260 [ 370.637941][T10695] vm_area_dup+0x26/0x210 [ 370.642297][T10695] copy_mm+0x947/0x13c0 [ 370.646495][T10695] ? copy_signal+0x600/0x600 [ 370.651115][T10695] ? __init_rwsem+0xfc/0x1d0 [ 370.655840][T10695] ? copy_signal+0x4cb/0x600 [ 370.660551][T10695] copy_process+0x117c/0x3250 [ 370.665263][T10695] ? __kasan_check_write+0x14/0x20 [ 370.670405][T10695] ? __pidfd_prepare+0x150/0x150 [ 370.675379][T10695] kernel_clone+0x233/0x960 [ 370.679907][T10695] ? create_io_thread+0x170/0x170 [ 370.684955][T10695] ? __kasan_check_write+0x14/0x20 [ 370.690094][T10695] ? mutex_unlock+0x8f/0x230 [ 370.694699][T10695] __x64_sys_clone+0x198/0x210 [ 370.699475][T10695] ? __kasan_check_write+0x14/0x20 [ 370.704603][T10695] ? __ia32_sys_vfork+0x130/0x130 [ 370.709649][T10695] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 370.715738][T10695] x64_sys_call+0x41f/0x9a0 [ 370.720259][T10695] do_syscall_64+0x4c/0xa0 [ 370.724690][T10695] ? clear_bhb_loop+0x50/0xa0 [ 370.729376][T10695] ? clear_bhb_loop+0x50/0xa0 [ 370.734067][T10695] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 370.739974][T10695] RIP: 0033:0x7fc808952cb9 [ 370.744411][T10695] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 370.764123][T10695] RSP: 002b:00007fc8073aefd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 370.772565][T10695] RAX: ffffffffffffffda RBX: 00007fc808bcdfa0 RCX: 00007fc808952cb9 [ 370.780566][T10695] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 370.789510][T10695] RBP: 00007fc8073af090 R08: 0000000000000000 R09: 0000000000000000 [ 370.797497][T10695] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 370.805612][T10695] R13: 00007fc808bce038 R14: 00007fc808bcdfa0 R15: 00007ffd0b1cc758 [ 370.813629][T10695] [ 370.946918][T10701] device sit0 left promiscuous mode [ 370.979824][T10702] device sit0 entered promiscuous mode [ 371.298550][T10720] device syzkaller0 entered promiscuous mode [ 371.572951][T10743] FAULT_INJECTION: forcing a failure. [ 371.572951][T10743] name failslab, interval 1, probability 0, space 0, times 0 [ 371.607928][T10743] CPU: 1 PID: 10743 Comm: syz.7.3288 Tainted: G W syzkaller #0 [ 371.616861][T10743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 371.626939][T10743] Call Trace: [ 371.630232][T10743] [ 371.633212][T10743] __dump_stack+0x21/0x30 [ 371.637571][T10743] dump_stack_lvl+0x110/0x170 [ 371.642274][T10743] ? show_regs_print_info+0x20/0x20 [ 371.647496][T10743] dump_stack+0x15/0x20 [ 371.651676][T10743] should_fail+0x3c1/0x510 [ 371.656117][T10743] __should_failslab+0xa4/0xe0 [ 371.660914][T10743] should_failslab+0x9/0x20 [ 371.665451][T10743] slab_pre_alloc_hook+0x3b/0xe0 [ 371.670421][T10743] ? vm_area_dup+0x26/0x210 [ 371.674974][T10743] kmem_cache_alloc+0x44/0x260 [ 371.679769][T10743] vm_area_dup+0x26/0x210 [ 371.684132][T10743] copy_mm+0x947/0x13c0 [ 371.688312][T10743] ? bpf_trace_run2+0x1c0/0x1c0 [ 371.693199][T10743] ? copy_signal+0x600/0x600 [ 371.697807][T10743] ? __init_rwsem+0xfc/0x1d0 [ 371.702423][T10743] ? copy_signal+0x4cb/0x600 [ 371.707040][T10743] copy_process+0x117c/0x3250 [ 371.711746][T10743] ? __kasan_check_write+0x14/0x20 [ 371.716887][T10743] ? __pidfd_prepare+0x150/0x150 [ 371.721895][T10743] kernel_clone+0x233/0x960 [ 371.726458][T10743] ? create_io_thread+0x170/0x170 [ 371.731518][T10743] ? __kasan_check_write+0x14/0x20 [ 371.736661][T10743] ? mutex_unlock+0x8f/0x230 [ 371.741279][T10743] __x64_sys_clone+0x198/0x210 [ 371.746074][T10743] ? __kasan_check_write+0x14/0x20 [ 371.751321][T10743] ? __ia32_sys_vfork+0x130/0x130 [ 371.756385][T10743] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 371.762521][T10743] x64_sys_call+0x41f/0x9a0 [ 371.767051][T10743] do_syscall_64+0x4c/0xa0 [ 371.771501][T10743] ? clear_bhb_loop+0x50/0xa0 [ 371.776202][T10743] ? clear_bhb_loop+0x50/0xa0 [ 371.780918][T10743] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 371.786849][T10743] RIP: 0033:0x7f721233acb9 [ 371.791348][T10743] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 371.810987][T10743] RSP: 002b:00007f7210d96fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 371.819428][T10743] RAX: ffffffffffffffda RBX: 00007f72125b5fa0 RCX: 00007f721233acb9 [ 371.827430][T10743] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 371.835428][T10743] RBP: 00007f7210d97090 R08: 0000000000000000 R09: 0000000000000000 [ 371.843433][T10743] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 371.851468][T10743] R13: 00007f72125b6038 R14: 00007f72125b5fa0 R15: 00007ffe207b8fb8 [ 371.859957][T10743] [ 372.032110][T10752] device veth1_macvtap left promiscuous mode [ 372.044039][T10752] device macsec0 left promiscuous mode [ 372.328928][T10761] device sit0 left promiscuous mode [ 372.383256][T10762] device sit0 entered promiscuous mode [ 373.020782][T10772] device veth0_vlan left promiscuous mode [ 373.110623][T10772] device veth0_vlan entered promiscuous mode [ 373.236773][T10788] device syzkaller0 entered promiscuous mode [ 373.355572][T10796] FAULT_INJECTION: forcing a failure. [ 373.355572][T10796] name failslab, interval 1, probability 0, space 0, times 0 [ 373.407650][T10796] CPU: 0 PID: 10796 Comm: syz.9.3303 Tainted: G W syzkaller #0 [ 373.416566][T10796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 373.426648][T10796] Call Trace: [ 373.429973][T10796] [ 373.432923][T10796] __dump_stack+0x21/0x30 [ 373.437281][T10796] dump_stack_lvl+0x110/0x170 [ 373.441981][T10796] ? show_regs_print_info+0x20/0x20 [ 373.447208][T10796] dump_stack+0x15/0x20 [ 373.451396][T10796] should_fail+0x3c1/0x510 [ 373.455843][T10796] __should_failslab+0xa4/0xe0 [ 373.460650][T10796] should_failslab+0x9/0x20 [ 373.465193][T10796] slab_pre_alloc_hook+0x3b/0xe0 [ 373.470155][T10796] ? vm_area_dup+0x26/0x210 [ 373.474693][T10796] kmem_cache_alloc+0x44/0x260 [ 373.479487][T10796] vm_area_dup+0x26/0x210 [ 373.483853][T10796] copy_mm+0x947/0x13c0 [ 373.488056][T10796] ? copy_signal+0x600/0x600 [ 373.492676][T10796] ? __init_rwsem+0xfc/0x1d0 [ 373.497386][T10796] ? copy_signal+0x4cb/0x600 [ 373.502002][T10796] copy_process+0x117c/0x3250 [ 373.506720][T10796] ? __kasan_check_write+0x14/0x20 [ 373.511880][T10796] ? __pidfd_prepare+0x150/0x150 [ 373.516875][T10796] kernel_clone+0x233/0x960 [ 373.521418][T10796] ? create_io_thread+0x170/0x170 [ 373.526471][T10796] ? __kasan_check_write+0x14/0x20 [ 373.531619][T10796] ? mutex_unlock+0x8f/0x230 [ 373.536327][T10796] __x64_sys_clone+0x198/0x210 [ 373.541120][T10796] ? __kasan_check_write+0x14/0x20 [ 373.546266][T10796] ? __ia32_sys_vfork+0x130/0x130 [ 373.551429][T10796] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 373.557529][T10796] x64_sys_call+0x41f/0x9a0 [ 373.562056][T10796] do_syscall_64+0x4c/0xa0 [ 373.566500][T10796] ? clear_bhb_loop+0x50/0xa0 [ 373.571202][T10796] ? clear_bhb_loop+0x50/0xa0 [ 373.575902][T10796] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 373.581848][T10796] RIP: 0033:0x7f8ec142fcb9 [ 373.586289][T10796] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 373.605927][T10796] RSP: 002b:00007f8ebfe8bfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 373.614366][T10796] RAX: ffffffffffffffda RBX: 00007f8ec16aafa0 RCX: 00007f8ec142fcb9 [ 373.622365][T10796] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 373.630366][T10796] RBP: 00007f8ebfe8c090 R08: 0000000000000000 R09: 0000000000000000 [ 373.638370][T10796] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 373.646470][T10796] R13: 00007f8ec16ab038 R14: 00007f8ec16aafa0 R15: 00007fffc3ce5808 [ 373.654474][T10796] [ 374.022313][T10823] device syzkaller0 entered promiscuous mode [ 374.115303][T10829] device sit0 left promiscuous mode [ 374.299349][T10832] device sit0 entered promiscuous mode [ 375.460773][T10881] FAULT_INJECTION: forcing a failure. [ 375.460773][T10881] name failslab, interval 1, probability 0, space 0, times 0 [ 375.509054][T10886] device sit0 left promiscuous mode [ 375.575094][T10881] CPU: 1 PID: 10881 Comm: syz.3.3326 Tainted: G W syzkaller #0 [ 375.583999][T10881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 375.594077][T10881] Call Trace: [ 375.597377][T10881] [ 375.600329][T10881] __dump_stack+0x21/0x30 [ 375.604693][T10881] dump_stack_lvl+0x110/0x170 [ 375.609397][T10881] ? show_regs_print_info+0x20/0x20 [ 375.614615][T10881] dump_stack+0x15/0x20 [ 375.618782][T10881] should_fail+0x3c1/0x510 [ 375.623213][T10881] __should_failslab+0xa4/0xe0 [ 375.627992][T10881] should_failslab+0x9/0x20 [ 375.632596][T10881] slab_pre_alloc_hook+0x3b/0xe0 [ 375.637545][T10881] ? anon_vma_clone+0xc0/0x500 [ 375.642359][T10881] kmem_cache_alloc+0x44/0x260 [ 375.647140][T10881] anon_vma_clone+0xc0/0x500 [ 375.651743][T10881] anon_vma_fork+0x8c/0x510 [ 375.656258][T10881] copy_mm+0x9de/0x13c0 [ 375.660426][T10881] ? copy_signal+0x600/0x600 [ 375.665030][T10881] ? __init_rwsem+0xfc/0x1d0 [ 375.669733][T10881] ? copy_signal+0x4cb/0x600 [ 375.674338][T10881] copy_process+0x117c/0x3250 [ 375.679039][T10881] ? __kasan_check_write+0x14/0x20 [ 375.684174][T10881] ? __pidfd_prepare+0x150/0x150 [ 375.689135][T10881] kernel_clone+0x233/0x960 [ 375.693650][T10881] ? create_io_thread+0x170/0x170 [ 375.698692][T10881] ? __kasan_check_write+0x14/0x20 [ 375.703818][T10881] ? mutex_unlock+0x8f/0x230 [ 375.708422][T10881] __x64_sys_clone+0x198/0x210 [ 375.713205][T10881] ? __kasan_check_write+0x14/0x20 [ 375.718328][T10881] ? __ia32_sys_vfork+0x130/0x130 [ 375.723393][T10881] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 375.729476][T10881] x64_sys_call+0x41f/0x9a0 [ 375.734006][T10881] do_syscall_64+0x4c/0xa0 [ 375.738428][T10881] ? clear_bhb_loop+0x50/0xa0 [ 375.743118][T10881] ? clear_bhb_loop+0x50/0xa0 [ 375.747810][T10881] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 375.753860][T10881] RIP: 0033:0x7fc808952cb9 [ 375.758302][T10881] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 375.778072][T10881] RSP: 002b:00007fc8073aefd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 375.786612][T10881] RAX: ffffffffffffffda RBX: 00007fc808bcdfa0 RCX: 00007fc808952cb9 [ 375.794607][T10881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 375.802591][T10881] RBP: 00007fc8073af090 R08: 0000000000000000 R09: 0000000000000000 [ 375.810598][T10881] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 375.818582][T10881] R13: 00007fc808bce038 R14: 00007fc808bcdfa0 R15: 00007ffd0b1cc758 [ 375.826584][T10881] [ 375.883779][T10887] device sit0 entered promiscuous mode [ 376.915799][T10926] device syzkaller0 entered promiscuous mode [ 377.130585][T10942] device sit0 left promiscuous mode [ 377.164280][T10942] device sit0 entered promiscuous mode [ 377.419794][T10963] device veth0_vlan left promiscuous mode [ 377.447753][T10963] device veth0_vlan entered promiscuous mode [ 377.633787][T10971] device syzkaller0 entered promiscuous mode [ 379.848038][T11021] device sit0 left promiscuous mode [ 379.936612][T11021] device sit0 entered promiscuous mode [ 380.131711][T11029] device syzkaller0 entered promiscuous mode [ 381.188144][T11065] device pim6reg1 entered promiscuous mode [ 381.417266][T11083] device sit0 left promiscuous mode [ 381.470585][T11083] device sit0 entered promiscuous mode [ 383.951696][T11148] device sit0 left promiscuous mode [ 384.012123][T11148] device sit0 entered promiscuous mode [ 385.277366][T11202] device syzkaller0 entered promiscuous mode [ 385.549121][T11228] device sit0 left promiscuous mode [ 385.617003][T11228] device sit0 entered promiscuous mode [ 386.637572][T11266] device syzkaller0 entered promiscuous mode [ 387.135058][T11279] ªªªªªª: renamed from vlan0 [ 387.871043][T11301] device pim6reg1 entered promiscuous mode [ 388.082155][T11303] device sit0 left promiscuous mode [ 388.142552][T11303] device sit0 entered promiscuous mode [ 388.858174][T11326] GPL: port 1(erspan0) entered disabled state [ 388.981241][T11334] device syzkaller0 entered promiscuous mode [ 389.951483][T11376] device sit0 left promiscuous mode [ 389.975532][T11380] device sit0 left promiscuous mode [ 389.991624][T11376] device sit0 entered promiscuous mode [ 390.043335][T11389] device sit0 left promiscuous mode [ 390.063218][T11380] device sit0 entered promiscuous mode [ 390.303277][T11389] device sit0 entered promiscuous mode [ 390.691125][T11396] device sit0 left promiscuous mode [ 391.017075][T11399] device sit0 left promiscuous mode [ 391.071637][T11399] device sit0 entered promiscuous mode [ 391.952443][T11414] device sit0 entered promiscuous mode [ 392.592146][T11431] GPL: port 1(erspan0) entered blocking state [ 392.614281][T11431] GPL: port 1(erspan0) entered disabled state [ 392.680187][T11431] device erspan0 entered promiscuous mode [ 392.925396][T11441] GPL: port 1(erspan0) entered blocking state [ 392.931543][T11441] GPL: port 1(erspan0) entered forwarding state [ 393.041704][T11450] device syzkaller0 entered promiscuous mode [ 393.070385][T11456] device sit0 left promiscuous mode [ 393.198364][T11456] device sit0 entered promiscuous mode [ 393.769774][T11473] device syzkaller0 entered promiscuous mode [ 394.038796][T11481] device sit0 left promiscuous mode [ 394.483765][T11493] device sit0 left promiscuous mode [ 394.569660][T11495] device sit0 entered promiscuous mode [ 395.558581][T11520] device syzkaller0 entered promiscuous mode [ 396.221730][T11538] device sit0 left promiscuous mode [ 396.614351][T11548] device syzkaller0 entered promiscuous mode [ 397.182446][T11562] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 397.551080][T11571] device syzkaller0 entered promiscuous mode [ 397.743789][T11584] device syzkaller0 entered promiscuous mode [ 398.012592][T11589] device sit0 left promiscuous mode [ 398.025820][T11591] device sit0 entered promiscuous mode [ 398.333319][T11599] device sit0 left promiscuous mode [ 399.245067][T11613] device sit0 left promiscuous mode [ 399.475147][T11613] device sit0 entered promiscuous mode [ 399.641923][T11623] device sit0 entered promiscuous mode [ 399.793772][T11629] device syzkaller0 entered promiscuous mode [ 401.003347][T11672] device sit0 left promiscuous mode [ 401.064578][T11672] device sit0 entered promiscuous mode [ 401.315343][T11687] device sit0 entered promiscuous mode [ 402.134816][T11699] device syzkaller0 entered promiscuous mode [ 403.018418][T11737] device sit0 left promiscuous mode [ 403.030811][T11736] device sit0 left promiscuous mode [ 403.084468][T11740] device sit0 entered promiscuous mode [ 403.198245][T11737] device sit0 entered promiscuous mode [ 403.901821][T11755] device syzkaller0 entered promiscuous mode [ 403.965171][T11759] device sit0 left promiscuous mode [ 404.019952][T11763] device sit0 entered promiscuous mode [ 404.707712][T11778] device syzkaller0 entered promiscuous mode [ 405.016115][T11792] device sit0 left promiscuous mode [ 405.331721][T11792] device sit0 entered promiscuous mode [ 405.616852][T11805] device sit0 left promiscuous mode [ 405.688191][T11806] device sit0 entered promiscuous mode [ 406.359313][T11823] device sit0 left promiscuous mode [ 406.514692][T11824] device sit0 entered promiscuous mode [ 407.649332][T11843] device sit0 entered promiscuous mode [ 407.945348][T11849] device sit0 left promiscuous mode [ 409.159474][T11882] device sit0 left promiscuous mode [ 409.229090][T11884] device sit0 entered promiscuous mode [ 411.789295][T11920] device sit0 left promiscuous mode [ 411.845081][T11920] device sit0 entered promiscuous mode [ 412.051060][T11926] device sit0 left promiscuous mode [ 412.139185][T11927] device sit0 entered promiscuous mode [ 413.223670][T11952] device sit0 entered promiscuous mode [ 414.605764][T11992] device sit0 left promiscuous mode [ 415.032171][T11999] device sit0 left promiscuous mode [ 415.164908][T11999] device sit0 entered promiscuous mode [ 417.053360][T12069] device sit0 left promiscuous mode [ 418.239043][T12102] device syzkaller0 entered promiscuous mode [ 419.344659][T12137] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.353854][T12137] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.361860][T12137] device bridge_slave_0 entered promiscuous mode [ 419.369299][T12137] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.376558][T12137] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.384236][T12137] device bridge_slave_1 entered promiscuous mode [ 419.635757][T12137] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.642897][T12137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.650227][T12137] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.657300][T12137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.666184][ T1805] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.675596][ T1805] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.731148][T12176] device syzkaller0 entered promiscuous mode [ 419.753625][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 419.782380][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 419.970812][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 419.985446][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 419.993846][ T1805] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.000942][ T1805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 420.010359][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 420.019113][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 420.027543][ T1805] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.034657][ T1805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 420.072514][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 420.175347][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 420.244688][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 420.259219][ T30] audit: type=1400 audit(1768658559.377:163): avc: denied { create } for pid=12203 comm="syz.1.3705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 420.299365][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 420.368204][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 420.376720][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 420.394007][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 420.402359][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 420.411247][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 420.432838][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 420.611196][T12137] device veth0_vlan entered promiscuous mode [ 420.667255][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 420.676723][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 420.696728][T12137] device veth1_macvtap entered promiscuous mode [ 420.714452][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 420.723516][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 420.754733][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 420.767843][ T1805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 420.824761][T12238] device syzkaller0 entered promiscuous mode [ 421.971455][T12301] device sit0 entered promiscuous mode [ 422.130616][T12323] device syzkaller0 entered promiscuous mode [ 423.386836][ T8] device bridge_slave_1 left promiscuous mode [ 423.401657][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.485776][ T8] device bridge_slave_0 left promiscuous mode [ 423.491986][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.411762][T12423] device syzkaller0 entered promiscuous mode [ 424.768168][T12444] device syzkaller0 entered promiscuous mode [ 428.113715][T12638] device syzkaller0 entered promiscuous mode [ 429.687243][T12690] device veth0_vlan left promiscuous mode [ 429.806500][T12690] device veth0_vlan entered promiscuous mode [ 430.015121][T12695] device veth1_macvtap left promiscuous mode [ 430.793165][T12704] device syzkaller0 entered promiscuous mode [ 431.788082][T12730] device macsec0 entered promiscuous mode [ 432.386393][T12753] device syzkaller0 entered promiscuous mode [ 433.676762][T12794] device syzkaller0 entered promiscuous mode [ 434.066031][T12810] device syzkaller0 entered promiscuous mode [ 434.803542][T12831] device veth0_vlan left promiscuous mode [ 434.849787][T12831] device veth0_vlan entered promiscuous mode [ 435.697647][T12867] device sit0 left promiscuous mode [ 435.850805][T12872] device syzkaller0 entered promiscuous mode [ 436.302870][T12886] syz.9.3908[12886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.302976][T12886] syz.9.3908[12886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.260663][T12930] device syzkaller0 entered promiscuous mode [ 437.348614][T12938] device sit0 left promiscuous mode [ 438.690934][T12988] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.489769][T13034] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.525228][T13034] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.532821][T13034] device bridge_slave_0 entered promiscuous mode [ 440.629559][T13034] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.663301][T13034] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.705535][T13034] device bridge_slave_1 entered promiscuous mode [ 441.217278][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 441.245944][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 441.276971][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 441.286881][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 441.295375][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.302495][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.388989][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 441.415680][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 441.429064][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 441.437736][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.445057][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.468504][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 441.537878][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 441.566241][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 442.444073][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 442.457919][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 442.466240][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 442.601058][T13034] device veth0_vlan entered promiscuous mode [ 442.635064][T13034] device veth1_macvtap entered promiscuous mode [ 442.661797][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 442.674837][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 442.703778][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 442.765806][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 442.811471][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 442.888171][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 442.896792][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 443.471403][ T8] device erspan0 left promiscuous mode [ 443.502009][ T8] GPL: port 1(erspan0) entered disabled state [ 444.120670][ T8] device bridge_slave_1 left promiscuous mode [ 444.131423][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.148258][ T8] device bridge_slave_0 left promiscuous mode [ 444.162822][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.213704][ T8] device veth1_macvtap left promiscuous mode [ 444.231140][ T8] device veth0_vlan left promiscuous mode [ 444.703511][T13168] device sit0 left promiscuous mode [ 449.716365][T13264] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 449.728114][T13264] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 449.736538][T13264] CPU: 0 PID: 13264 Comm: syz.9.4017 Tainted: G W syzkaller #0 [ 449.745491][T13264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 449.755638][T13264] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 449.761285][T13264] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 be 4e 38 ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 9b 4e 38 ff 41 f6 45 00 01 48 89 [ 449.781346][T13264] RSP: 0018:ffffc90000c4f7c0 EFLAGS: 00010246 [ 449.787417][T13264] RAX: dffffc0000000000 RBX: ffff8881431e4880 RCX: 1ffff1102863c910 [ 449.795390][T13264] RDX: ffffffff819c9b50 RSI: 1ffff110223bde4a RDI: ffff8881431e4870 [ 449.803371][T13264] RBP: ffffc90000c4f820 R08: ffff888111def26f R09: 1ffff110223bde4d [ 449.811340][T13264] R10: dffffc0000000000 R11: ffffed10223bde4e R12: 1ffff1102863c911 [ 449.819316][T13264] R13: 0000000000000000 R14: ffff8881431e4870 R15: 0000000000000000 [ 449.827293][T13264] FS: 00007fd17794b6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 449.836220][T13264] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 449.842798][T13264] CR2: fffffffffffffffa CR3: 000000010f0e5000 CR4: 00000000003506b0 [ 449.851336][T13264] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000200000000300 [ 449.859307][T13264] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 449.867278][T13264] Call Trace: [ 449.870556][T13264] [ 449.873487][T13264] ? anon_vma_interval_tree_iter_next+0x380/0x380 [ 449.879907][T13264] vma_interval_tree_remove+0xadc/0xb00 [ 449.885570][T13264] unlink_file_vma+0xda/0xf0 [ 449.890176][T13264] free_pgtables+0x139/0x280 [ 449.894790][T13264] exit_mmap+0x433/0x8b0 [ 449.899041][T13264] ? __kasan_slab_free+0x11/0x20 [ 449.903998][T13264] ? vm_brk+0x30/0x30 [ 449.907986][T13264] ? __mmput+0x7c/0x320 [ 449.912143][T13264] __mmput+0x93/0x320 [ 449.916121][T13264] ? mmput+0x48/0x150 [ 449.920121][T13264] mmput+0x50/0x150 [ 449.923949][T13264] copy_process+0x25ec/0x3250 [ 449.928632][T13264] ? __pidfd_prepare+0x150/0x150 [ 449.933574][T13264] ? map_freeze+0x360/0x360 [ 449.938079][T13264] kernel_clone+0x233/0x960 [ 449.942585][T13264] ? irqentry_exit+0x37/0x40 [ 449.947177][T13264] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 449.952981][T13264] ? create_io_thread+0x170/0x170 [ 449.958011][T13264] __x64_sys_clone+0x198/0x210 [ 449.962778][T13264] ? __ia32_sys_vfork+0x130/0x130 [ 449.967811][T13264] ? __kasan_check_write+0x14/0x20 [ 449.972924][T13264] ? switch_fpu_return+0x15d/0x2c0 [ 449.978039][T13264] x64_sys_call+0x41f/0x9a0 [ 449.982548][T13264] do_syscall_64+0x4c/0xa0 [ 449.986969][T13264] ? clear_bhb_loop+0x50/0xa0 [ 449.991638][T13264] ? clear_bhb_loop+0x50/0xa0 [ 449.996311][T13264] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 450.002206][T13264] RIP: 0033:0x7fd178eeecb9 [ 450.006616][T13264] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 450.026230][T13264] RSP: 002b:00007fd17794afd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 450.034642][T13264] RAX: ffffffffffffffda RBX: 00007fd179169fa0 RCX: 00007fd178eeecb9 [ 450.042611][T13264] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 450.050577][T13264] RBP: 00007fd178f5cbf7 R08: 0000000000000000 R09: 0000000000000000 [ 450.058547][T13264] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 450.066516][T13264] R13: 00007fd17916a038 R14: 00007fd179169fa0 R15: 00007ffe4d23a618 [ 450.074499][T13264] [ 450.077515][T13264] Modules linked in: [ 450.083128][T13264] ---[ end trace 35da7351102f0358 ]--- [ 450.085767][ T30] audit: type=1400 audit(1768658589.197:164): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 450.089561][T13264] RIP: 0010:__rb_erase_color+0x1e6/0xaf0 [ 450.116287][T13264] Code: 00 fc ff df 48 89 4d c0 80 3c 01 00 74 08 48 89 df e8 be 4e 38 ff 4c 8b 2b 4d 89 ef 49 c1 ef 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 07 00 74 08 4c 89 ef e8 9b 4e 38 ff 41 f6 45 00 01 48 89 [ 450.119477][ T30] audit: type=1400 audit(1768658589.197:165): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 450.136696][T13264] RSP: 0018:ffffc90000c4f7c0 EFLAGS: 00010246 [ 450.160311][ T30] audit: type=1400 audit(1768658589.197:166): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 450.168200][T13264] RAX: dffffc0000000000 RBX: ffff8881431e4880 RCX: 1ffff1102863c910 [ 450.187811][ T30] audit: type=1400 audit(1768658589.197:167): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 450.199158][T13264] RDX: ffffffff819c9b50 RSI: 1ffff110223bde4a RDI: ffff8881431e4870 [ 450.217615][ T30] audit: type=1400 audit(1768658589.197:168): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 450.236201][T13264] RBP: ffffc90000c4f820 R08: ffff888111def26f R09: 1ffff110223bde4d [ 450.253475][ T30] audit: type=1400 audit(1768658589.197:169): avc: denied { append open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 450.254155][T13264] R10: dffffc0000000000 R11: ffffed10223bde4e R12: 1ffff1102863c911 [ 450.276898][ T30] audit: type=1400 audit(1768658589.197:170): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 450.309252][T13264] R13: 0000000000000000 R14: ffff8881431e4870 R15: 0000000000000000 [ 450.317993][T13264] FS: 00007fd17794b6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 450.329603][T13264] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 450.336844][T13264] CR2: fffffffffffffffa CR3: 000000010f0e5000 CR4: 00000000003506b0 [ 450.345324][T13264] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000200000000300 [ 450.353693][T13264] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 450.362093][T13264] Kernel panic - not syncing: Fatal exception [ 450.368416][T13264] Kernel Offset: disabled [ 450.372754][T13264] Rebooting in 86400 seconds..