last executing test programs: 5m42.559002031s ago: executing program 0 (id=1534): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000f00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r1}, &(0x7f0000000200), &(0x7f0000000280)=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000100000085000000860000009500"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0xe, 0x0, &(0x7f00000004c0)="0000000000005eefc9bb9fd1b208", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 32) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xffffffffffffffff) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000090000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='mm_page_alloc\x00', r5}, 0x10) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x62, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) (async) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{r6}, &(0x7f0000000280), &(0x7f00000002c0)='%pI4 \x00'}, 0x20) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000600000005000000000000", @ANYBLOB="00000000f8ffffffffffffff5f"], 0x48) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 5m42.453117072s ago: executing program 0 (id=1538): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c1300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000048aab3dc850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x4}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x42) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 5m42.354323422s ago: executing program 0 (id=1539): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8948, &(0x7f0000000000)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x15\t\x00\x00\x00\x00\x00\x00\x00\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x8004745a, 0x2000000c) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32=r2, @ANYBLOB="0000000000000000000000000000000000000000e7288571b71996330392692050ac026f9a323af3b6fd8100"/54, @ANYRES32=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xd, 0x5, &(0x7f0000000640)=ANY=[@ANYRES32=r0, @ANYBLOB="743b112bc82240effbd2eb49de93fdce451776ff3a6d3824708d6eeb799086fb90f7cc98160ad80a938390582d9502116615628bb4551f154a94bc97b8c67808676b122fd05bc93538e96c2495eff024d723cd82c9d52c251afeebf78ef78c1368e30997d7e7b3f8d0f3550829c825ddd66e732e4f"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xefffffff, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000010000000000000000000000000000000000000ed3038f542b178b8f6e5da5275ac74dbe00a8ab9715d413c5af1fdca1bca457b9747c7289fa53b3bdcb9bdc83ba9647abfa10508eb3a88699e9608110a0d501f38f7980ec76c7a2baf6af716c65b4de959e0aa3ce34b65ccb6075be4336c7352"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) close(r4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 5m42.172015774s ago: executing program 0 (id=1540): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x36, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61123000000000006113340000000000bf1000000000000015000200091b00003d030100000000008701000000000000bc26000000000000bf67000000000000560300000ee600f06702000014000000160300000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586e3f640f9f7e9a73b761ad4f0952a70046270d2b6436fdeecd791614ed46de741eb8cf91c046ef9beca574b350021c7ec6ef130f53748068ca432dae4e248b22b9ad8b2811f67916a1764578cba4b069037bfb3362d5691ac397f7e207145d970f0d97867552629b146645c785fb77dbeca38e49a9d5221f1f45f0a25890d04d91a15a05ae7e7ed6252c3d6c1973fb858de1da70d67317e7872b0603ce47ed2c1520e71b527bb42aa2e20e1e85df73736ed0a782ab7e7278dd54358cfdf6313d40f926332623625b49626481054787ab2dff85a9bebd6b317f26c691a65aa97bb3d1506a3a565e9c7ea5ad4611d2d77ee8a5c1b23814a26b6a20061fbb65bdd03770fa849f2a29ba69f90625f42592a70ba890f7a92878ae73574c3a233ee5954119931a1905210715fa77a8795f2fbec3797cb90f59fe8a4abec25f40c87bf25b750bbaa"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x1e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 5m41.03820626s ago: executing program 0 (id=1555): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000000000000000758b62595385a8d991b77e3e11d348c7db149363c5a6a63e406d059a000000000000000000000000008305bb", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000004800000000000000", @ANYRES32, @ANYBLOB="0100000000000000009c47e5615a17547f000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r2}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r3}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1400000000000000", @ANYRES32=r5], 0x18}, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 64) bpf$LINK_DETACH(0x22, &(0x7f00000002c0)=r6, 0x4) (rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="00000000faffffffffffffff00000000000000", @ANYRES32, @ANYBLOB="00000000000900000000000000f9ffffff00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200"/28], 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b040000bc3df7040000000000f99982ed4619b948000000000400000900000001000000", @ANYRES32, @ANYBLOB, @ANYBLOB], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x28, 0x6, 0x0, 0x44) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) (rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 5m40.92673372s ago: executing program 0 (id=1557): openat$tun(0xffffffffffffff9c, 0x0, 0xc1842, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x11, 0x53d5656a0cb866ca, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x68, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x15, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 5m40.720120852s ago: executing program 32 (id=1557): openat$tun(0xffffffffffffff9c, 0x0, 0xc1842, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x11, 0x53d5656a0cb866ca, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x68, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x15, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 4m49.99081221s ago: executing program 3 (id=2047): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000080), 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000005000000850000000f00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b40)={r3, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000006b113e00000000008510000002000000850000000500000095003300000000009500a505000000006e6433de69e899e4cff17a25e2aa421a0e8d81586c3afa73709cbcd7ab4a2158d04db8b9930c2ac2fbaf5dd5b8abf11cc68b381bcb5b605cc2f5608f0a93cba8ed86157668d0befff81c7bd164a03eefc9d1ae5d30798fb936a3ef453789fe4fe1d86af2f06173f62441f8135276d1849a285747e9df7584f83aea8c8189d61b6150bc8e5065719f73a97728abb717848cbb91431b22a51e4b66da20a98bcb5498747f7f6c2bc1e3afbbae240816086fe672aed0876c4e8c15731400"/248], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES16=r1], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4m49.718737262s ago: executing program 3 (id=2050): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001e00"/28], 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800c3af379b633462d510000000000018112000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b6e10000000000008500000085000080b7000000000000009500fa7c5956befb517eaf7e717fbea3ab7f23c53616515389e4dd3bef3474d2128edf32c42b48d0cf4dd2d24a9defb43ab9b1a15746613885ad8559d1f5bd29019433275f016d9f7ef7412e5790c37049d03b29326fa0fb91d3dcecd96d6b830194cbe0e783b345ab35fcb6804463eb67"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000002d6be3000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x1, r5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40001) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0xc, &(0x7f0000001180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000003000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x90, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 4m49.359338904s ago: executing program 3 (id=2057): close(0x3) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000400000000000000be998e215f2a55c392401bb0e39c18615e434999e5c8bc192fe22dad0e953fd4a4387e3fa352c998d6719380bc6a5d026f878e790458f559c60f063c8f6d48530000000000000000fd6c00000000002eaa2cd8a8f9632caf422120c6e0d28e4002d6dff8c0e126b420c36594fc29fa75a4b19a0b02a9e3e26cd66e2ecbf438cb2e6e9359c143d572d55e607da1884f3e38c3e85f748249dea65f5c4accd16800e7814567d6314fd67daec6dcd214631a4f86f52a71821afbe68fe534d8d8851be0b4be8229f153c812f76c9e57b025e66b00c6663e145380a8b5ab817756bd2fc11039573404c6b5ea73ecf4e445b79342167b0b4d96ec7fc2938dcfd42e37cca6d738f67881727d311fcb75575e44337f479014d942600a81063d6c809b2893566b6d", @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB='\x00'/28], 0x50) (async) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x18) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xcb, 0xcb, 0x5, [@var={0x1, 0x0, 0x0, 0xe, 0x1}, @volatile={0x8}, @datasec={0xb, 0x8, 0x0, 0xf, 0x3, [{0x5, 0x63b3, 0x2}, {0x3, 0xfb1, 0x1}, {0x1, 0x7, 0x4}, {0x5, 0x7fff, 0x65b}, {0x4, 0x1, 0x1}, {0x3}, {0x1, 0x3, 0x7}, {0x1, 0x5, 0x10000}], "c3716d"}, @restrict={0xe, 0x0, 0x0, 0xb, 0x5}, @typedef={0x8, 0x0, 0x0, 0x8, 0x5}, @restrict={0xa, 0x0, 0x0, 0xb, 0x3}, @decl_tag={0xe, 0x0, 0x0, 0x11, 0x5, 0x9}, @fwd={0xb}]}, {0x0, [0x6f, 0x0, 0x30]}}, &(0x7f0000000280)=""/24, 0xe9, 0x18, 0x1, 0x81, 0x10000, @value=r0}, 0x28) (async) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x4, '\x00', 0x0, r5, 0x5, 0x2, 0x4, 0x0, @void, @value, @void, @value}, 0x50) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 4m48.514146169s ago: executing program 3 (id=2070): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff26, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x80, 0x0}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYRES32=r2], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="b0ff02c66b0d698cb89e2fe086dd1f74ffff06000000fe80000000000000ac14140746647b7954c4c06b580febc28eb143d0f6c0bad63a67a04402ba4125c7024f63fdb0b6c8ee826b4dfe6042a2f057c66cad677d850ea9928bcfcb47e585e427746ed3b27c40060cbd030a6d675c9926af53cd3085b24f9b7a486775c4f284f8c5a572ca115bce90c0ee9d4e7a07f5f1518092cb1f156694036f6618a59196631e6303fd5307d1112601d3641c9492f7dc3503416836b14590c53b1fc1ac149b70cc1142d6bc57fc3a76839fa2f96878b520fedfb9f64d81584a2e85ab4f6ec718b02d78f2ebf04e6b3b94610a21616181629a03c3dc0bf05e0a71f887833b81db7a10bc53259cb80716f6804934a411d424c1db98d454be1adb2776fdbb92b299d3b80af6987a871b4549fdb4c8297ee31ad925c8b0fb1a9d2589b08ed52602cbc26b56df71201bc4ea8621c56f33d251c1d4589af2dcd78fbb4e34bde02cb3920a30cee9489ee72c3e19304c16c2110e1839712d484b80abe77786a7e2ba834874a4e16b93dd07297554a06c2ad2c906f8ebb1db8730df096709184728d48f0a806696bd0d4b12d0064b933d9675353dae77fe8419451f85da63be78b70ca2a84a77f572d9f289d4313e6f6039fe756ac13a5d08838315dff44cda433cc7bc6b77449f8c", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r4, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0], 0x0, 0x42, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f00000006c0), 0x8, 0x97, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000900)={r5, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x4, 0xe, &(0x7f0000000180)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_val={0x18, 0x4, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @map_fd={0x18, 0x0, 0x1, 0x0, r5}], &(0x7f0000000300)='GPL\x00', 0x75a6e8cc, 0xb4, &(0x7f0000000380)=""/180, 0x40f00, 0x0, '\x00', r7, @fallback=0x2b, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x10, 0xf409, 0xa77}, 0x10, r3, r1, 0x0, &(0x7f0000000940)=[r5, r8, r5], 0x0, 0x10, 0x4, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0), 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x19, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001c80)={{r5, 0xffffffffffffffff}, &(0x7f0000001c00), &(0x7f0000001c40)='%pI4 \x00'}, 0x20) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r12, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001d40)={{r5, 0xffffffffffffffff}, &(0x7f0000001cc0), &(0x7f0000001d00)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001e40)={0x11, 0xb, &(0x7f0000001a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0xa, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0xfffffff9}, @alu={0x4, 0x1, 0x8, 0x0, 0xb, 0x2, 0xfffffffffffffffe}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @map_fd={0x18, 0x5}]}, &(0x7f0000001ac0)='GPL\x00', 0x63d2, 0xa6, &(0x7f0000001b00)=""/166, 0x40f00, 0x4, '\x00', r7, @fallback=0x2d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001bc0)={0x5, 0xb, 0x8, 0x8a7}, 0x10, 0x0, r1, 0x6, &(0x7f0000001d80)=[r8, r5, r9, r9, r11, r12, r8, r13], &(0x7f0000001dc0)=[{0x5, 0x4, 0x2, 0x6}, {0x4, 0x5, 0xa, 0x1}, {0x2, 0x4, 0xe, 0x5}, {0x0, 0x4, 0x9, 0x6}, {0x1, 0x1, 0x4, 0x1}, {0x5, 0x2, 0xa, 0x4}], 0x10, 0x5, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001980)) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f00000002c0)="f6ea090003000060009ba538a44cc2", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 4m48.31554254s ago: executing program 3 (id=2071): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r4}, &(0x7f0000000040), &(0x7f0000000080)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000500)={r3, 0x0, 0x0}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r7) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x4, 0x0, 0x1}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1fffff, @void, @value}, 0x94) 4m48.21582434s ago: executing program 3 (id=2072): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x9, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_freezer_state(r1, &(0x7f0000000140), 0x2, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r2, &(0x7f0000000400)='FROZEN\x00', 0x7) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 4m33.179180477s ago: executing program 33 (id=2072): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x9, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_freezer_state(r1, &(0x7f0000000140), 0x2, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r2, &(0x7f0000000400)='FROZEN\x00', 0x7) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2m58.902329382s ago: executing program 1 (id=2943): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000005c0)={r1, &(0x7f0000000b00), 0x0}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111060000000000851000000200000085000400bb00000095003300000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) close(r3) recvmsg$unix(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40010002) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="8fff0f0000000000007538e486dd630080fcfc0833080000000000000000875a060300000002000000000000000000000000ac1414aa"], 0xfdef) 2m58.886137082s ago: executing program 1 (id=2944): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d000000180100000000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff000000820c0200", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00#\x00\x00\x00\x00\x00\x00\x00'], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0xc8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af87f00000000bfa100000000000007010000000000ffb702000008000000b70300000000000085000000710000009500000000002117a41a7611ad12665b3c96fcdd7d89449610345e2d48b6991a7e30be95f53d5ba22c8e2c4066f28f9531ec84be92ae3448daf88123e62c6d4a6c3bcd62a18803dbd4335a2ec0667fb7208add818e4e0ff0ed158835281bb406fde7c66f98490a6ebef247b96b85c7b2af3575fb9a42316940b7716d92173ffc8ab2234038b86a04bddfbdc8bcc0b781af13d44e51c1bb79f50dd8144b5363de742e640cd7ebd88de59a472df43a1f93c6c6f3f60e043511b33a027feb801293c4dc4311aefaa697aa1feae057fb83ee75b59e3a349865defe269c7a6e1a375e84bdee138c6fff549006bec8ab56e8ba67ae9e95286edfd124a332ccf076b8f93b039d4a8c963f2831833296f15d7118dad6b9618bf69d869072bd74849195a0aa03b677fc93f8ed9c09402fdda80da67cd7649f0724be8923ccad9bdb498dd066880d194bf9e51cb220a10000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000fe27008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b705000008000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r5}, &(0x7f0000000180), &(0x7f0000000240)='%-5lx \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r9, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r8, 0x0, 0xe, 0xfe, &(0x7f0000000740)="000000000000c000ee6e3e20630c", 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m58.586201284s ago: executing program 1 (id=2947): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x0, 0x0, 0x0, 0x0, 0x45d, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9141, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000500)={'veth0_to_team\x00', @random="a99f62b37dbd"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r7}, 0x10) ioctl$SIOCSIFHWADDR(r3, 0x8913, &(0x7f0000000040)={'macsec0\x00', @random="a64beb939b96"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m57.899685198s ago: executing program 1 (id=2951): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000006100000054000000000000009500000000000000b4a8b1541206000000e9c79077fa15ba36eca61299de54cf77c9062430bc068829afff36b31fa7e35ce95d04"], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000240)="5cdd3086ddff0066b3c9bbac88a8", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x3, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0400000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x50) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc01, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6, 0x0, 0x0, 0x6}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1e0000000100000009000000b800000001200000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000005000000000000000900"/27], 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) r9 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_subtree(r10, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r11, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2214971f06699731b6876b52887d5122dfbf6bb"], 0x5) write$cgroup_subtree(r11, &(0x7f00000006c0)=ANY=[@ANYBLOB="2d63707520a8ee7cff46794702ed5d341e216dad80aea5070d8d6f79907e100ebe20a33449ef7c66a5b445d19382b3254250724540d9e3f6260401bec4d7da97494a6cfd780142fe30e446b820e69f910a20f87e14be27679ae8570ca3c1ab97d80f5e78f587e2fd2ec6e1d0"], 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000008000000000000000400000018110000", @ANYRES32=r7, @ANYBLOB="0000000100010000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085000000b10000008500000040000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000bf910000"], &(0x7f00000003c0)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0x9, 0x0, 0xa}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000400)=[r6, r3, r3, r5, r4, r3, 0xffffffffffffffff, r6, r5, r6], &(0x7f0000000780)=[{0x3, 0x5, 0x4, 0x9}, {0x0, 0x1, 0x2, 0xc}, {0x3, 0x3, 0x2}, {0x5, 0x2, 0x9}, {0x2, 0x1, 0x2, 0x7}, {0x0, 0x5, 0x7, 0xa}], 0x10, 0xfffff801, @void, @value}, 0x94) r12 = openat$cgroup_type(r9, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r12, &(0x7f0000000080), 0x9) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)) 2m57.003765083s ago: executing program 1 (id=2954): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'veth1_to_bridge\x00'}) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001406) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$TUNSETOFFLOAD(r0, 0x40047451, 0x2000002d) 2m56.794502584s ago: executing program 1 (id=2958): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='freezer.self_freezing\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x50, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0xb8, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0xa, [@fwd={0x7}, @enum={0x10, 0x8, 0x0, 0x6, 0x4, [{0x1, 0xe}, {0xf, 0x8}, {0x2, 0x2}, {0x8}, {0x1, 0x9}, {0x6, 0xffffff16}, {0xc, 0xfc2}, {0x10, 0x2}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x5f, 0x30, 0x2e, 0x61]}}, &(0x7f0000000580)=""/176, 0x7a, 0xb0, 0x0, 0x6005, 0x10000, @value}, 0x28) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)=@o_path={&(0x7f00000006c0)='./file0\x00', 0x0, 0x4010}, 0x18) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x20, &(0x7f00000000c0)=@raw=[@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @btf_id={0x18, 0xf, 0x3, 0x0, 0x2}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @call={0x85, 0x0, 0x0, 0xc8}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @alu={0x7, 0x0, 0x8, 0x9, 0xa, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], &(0x7f00000001c0)='syzkaller\x00', 0x2e, 0x0, 0x0, 0x41000, 0x8, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000680)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000007c0)=[r4, r5], &(0x7f0000000800)=[{0x1, 0x2, 0xc, 0xc}, {0x5, 0x5, 0xa, 0xb}, {0x3, 0x2, 0x8, 0x1}, {0x1, 0x5, 0x8, 0x2}, {0x5, 0x1, 0x10, 0x8}, {0x3, 0x3, 0xb, 0x6}, {0x5, 0x5, 0x6, 0x5}, {0x2, 0x4, 0x2, 0x5}, {0x3, 0x1, 0x3, 0x1}, {0x1, 0x1, 0xb, 0xa}], 0x10, 0x7, @void, @value}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000009c0)=@o_path={&(0x7f0000000980)='./file0\x00', r1, 0x4000, r1}, 0x18) socketpair(0x2c, 0x800, 0x8, &(0x7f0000000a00)={0xffffffffffffffff}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000a40)={'pimreg1\x00', 0x4110}) r8 = syz_clone(0x23380400, &(0x7f0000000a80)="2564c6725859731a554642e887f53d23ea80b7df3a650bb497ee6562", 0x1c, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="4b9e78e0c385662b089fd64d4edb86040a45cdbee857ac68c528fb5d10e025308ef2403bb3564e0b031990c8a1324b2918431f6afd22db8e31020fd8b3813ab19ac38cad7aa9d4df46430a8ff988ef031ad797a54aa9f491732e31d7840ddc83270d4b524e83492a43b164bece01359b1495fde2ef06c9f4bcbee54cef6537ffae4c0b014322a46730a3f9935019ed7d0e41fb9a9a2a0ac4fcea258a65f91afd79174e1bf72fa1aea301284f32e896cd97190370e5f57f9422137df4d60d32") syz_open_procfs$namespace(r8, &(0x7f0000000c00)='ns/user\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r4, 0x58, &(0x7f0000000c40)}, 0x10) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d00)={0x1b, 0x0, 0x0, 0x101, 0x0, r5, 0xfffff801, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x50) unlink(&(0x7f0000000d80)='./file0\x00') perf_event_open(&(0x7f0000000e00)={0x5, 0x80, 0x6, 0xb9, 0x6, 0x1, 0x0, 0x100, 0x8d0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000dc0), 0x1}, 0x422, 0x7, 0xffff, 0x5, 0x7, 0x4, 0x3, 0x0, 0x2, 0x0, 0xb8}, 0xffffffffffffffff, 0x2, r1, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ec0)={&(0x7f0000000e80)='thermal_zone_trip\x00', r6, 0x0, 0xffff}, 0x18) r10 = openat$cgroup(r1, &(0x7f0000000f00)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r10, &(0x7f0000000f40)='cgroup.threads\x00', 0x2, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000f80), 0x200c0, 0x0) ioctl$TUNSETTXFILTER(r11, 0x400454d1, &(0x7f0000000fc0)={0x1, 0x2, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xb}]}) ioctl$TUNSETLINK(r11, 0x400454cd, 0x302) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)) r12 = perf_event_open(&(0x7f0000001100)={0x3, 0x80, 0x5, 0x8, 0x6, 0x3, 0x0, 0x1, 0x20, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000010c0), 0x5}, 0x8800, 0x4, 0x0, 0xe, 0x9, 0x200, 0x9b, 0x0, 0x8000, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x8) perf_event_open$cgroup(&(0x7f0000001040)={0x2, 0x80, 0x9, 0x1, 0x4, 0x14, 0x0, 0x100000000, 0x800c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8, 0x6}, 0x100bc0, 0x74b9, 0x9, 0x7, 0x3, 0x2, 0x2, 0x0, 0x9, 0x0, 0x8}, r1, 0xe, r12, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001180)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000013c0)={0x6, 0x6, &(0x7f00000011c0)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}], &(0x7f0000001200)='GPL\x00', 0x274, 0x3c, &(0x7f0000001240)=""/60, 0x88adc3572afb3f62, 0x17, '\x00', r2, 0x25, r1, 0x8, &(0x7f0000001280)={0x4, 0x746ee6cf}, 0x8, 0x10, &(0x7f00000012c0)={0x3, 0x2, 0x10, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001300)=[r9, r4], &(0x7f0000001340)=[{0x3, 0x2, 0xf, 0x6}, {0x0, 0x3, 0x7}, {0x5, 0x5, 0x4, 0x6}, {0x2, 0x3, 0x1, 0x5}, {0x5, 0x5, 0x8, 0x4}, {0x3, 0x3, 0x6, 0x9}], 0x10, 0x1ff, @void, @value}, 0x94) write$cgroup_type(r1, &(0x7f0000001480), 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000014c0)=0xffffffffffffffff, 0x4) recvmsg$unix(r7, &(0x7f0000001800)={&(0x7f0000001500)=@abs, 0x6e, &(0x7f0000001740)=[{&(0x7f0000001580)=""/26, 0x1a}, {&(0x7f00000015c0)=""/40, 0x28}, {&(0x7f0000001600)=""/17, 0x11}, {&(0x7f0000001640)=""/149, 0x95}, {&(0x7f0000001700)=""/24, 0x18}], 0x5, &(0x7f00000017c0)=[@cred={{0x1c}}], 0x20}, 0x1) 2m41.71793935s ago: executing program 34 (id=2958): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='freezer.self_freezing\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x50, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0xb8, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0xa, [@fwd={0x7}, @enum={0x10, 0x8, 0x0, 0x6, 0x4, [{0x1, 0xe}, {0xf, 0x8}, {0x2, 0x2}, {0x8}, {0x1, 0x9}, {0x6, 0xffffff16}, {0xc, 0xfc2}, {0x10, 0x2}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x5f, 0x30, 0x2e, 0x61]}}, &(0x7f0000000580)=""/176, 0x7a, 0xb0, 0x0, 0x6005, 0x10000, @value}, 0x28) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)=@o_path={&(0x7f00000006c0)='./file0\x00', 0x0, 0x4010}, 0x18) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x20, &(0x7f00000000c0)=@raw=[@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @btf_id={0x18, 0xf, 0x3, 0x0, 0x2}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @call={0x85, 0x0, 0x0, 0xc8}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @alu={0x7, 0x0, 0x8, 0x9, 0xa, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], &(0x7f00000001c0)='syzkaller\x00', 0x2e, 0x0, 0x0, 0x41000, 0x8, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000680)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000007c0)=[r4, r5], &(0x7f0000000800)=[{0x1, 0x2, 0xc, 0xc}, {0x5, 0x5, 0xa, 0xb}, {0x3, 0x2, 0x8, 0x1}, {0x1, 0x5, 0x8, 0x2}, {0x5, 0x1, 0x10, 0x8}, {0x3, 0x3, 0xb, 0x6}, {0x5, 0x5, 0x6, 0x5}, {0x2, 0x4, 0x2, 0x5}, {0x3, 0x1, 0x3, 0x1}, {0x1, 0x1, 0xb, 0xa}], 0x10, 0x7, @void, @value}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000009c0)=@o_path={&(0x7f0000000980)='./file0\x00', r1, 0x4000, r1}, 0x18) socketpair(0x2c, 0x800, 0x8, &(0x7f0000000a00)={0xffffffffffffffff}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000a40)={'pimreg1\x00', 0x4110}) r8 = syz_clone(0x23380400, &(0x7f0000000a80)="2564c6725859731a554642e887f53d23ea80b7df3a650bb497ee6562", 0x1c, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="4b9e78e0c385662b089fd64d4edb86040a45cdbee857ac68c528fb5d10e025308ef2403bb3564e0b031990c8a1324b2918431f6afd22db8e31020fd8b3813ab19ac38cad7aa9d4df46430a8ff988ef031ad797a54aa9f491732e31d7840ddc83270d4b524e83492a43b164bece01359b1495fde2ef06c9f4bcbee54cef6537ffae4c0b014322a46730a3f9935019ed7d0e41fb9a9a2a0ac4fcea258a65f91afd79174e1bf72fa1aea301284f32e896cd97190370e5f57f9422137df4d60d32") syz_open_procfs$namespace(r8, &(0x7f0000000c00)='ns/user\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r4, 0x58, &(0x7f0000000c40)}, 0x10) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d00)={0x1b, 0x0, 0x0, 0x101, 0x0, r5, 0xfffff801, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x50) unlink(&(0x7f0000000d80)='./file0\x00') perf_event_open(&(0x7f0000000e00)={0x5, 0x80, 0x6, 0xb9, 0x6, 0x1, 0x0, 0x100, 0x8d0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000dc0), 0x1}, 0x422, 0x7, 0xffff, 0x5, 0x7, 0x4, 0x3, 0x0, 0x2, 0x0, 0xb8}, 0xffffffffffffffff, 0x2, r1, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ec0)={&(0x7f0000000e80)='thermal_zone_trip\x00', r6, 0x0, 0xffff}, 0x18) r10 = openat$cgroup(r1, &(0x7f0000000f00)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r10, &(0x7f0000000f40)='cgroup.threads\x00', 0x2, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000f80), 0x200c0, 0x0) ioctl$TUNSETTXFILTER(r11, 0x400454d1, &(0x7f0000000fc0)={0x1, 0x2, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xb}]}) ioctl$TUNSETLINK(r11, 0x400454cd, 0x302) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)) r12 = perf_event_open(&(0x7f0000001100)={0x3, 0x80, 0x5, 0x8, 0x6, 0x3, 0x0, 0x1, 0x20, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000010c0), 0x5}, 0x8800, 0x4, 0x0, 0xe, 0x9, 0x200, 0x9b, 0x0, 0x8000, 0x0, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x8) perf_event_open$cgroup(&(0x7f0000001040)={0x2, 0x80, 0x9, 0x1, 0x4, 0x14, 0x0, 0x100000000, 0x800c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8, 0x6}, 0x100bc0, 0x74b9, 0x9, 0x7, 0x3, 0x2, 0x2, 0x0, 0x9, 0x0, 0x8}, r1, 0xe, r12, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001180)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000013c0)={0x6, 0x6, &(0x7f00000011c0)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}], &(0x7f0000001200)='GPL\x00', 0x274, 0x3c, &(0x7f0000001240)=""/60, 0x88adc3572afb3f62, 0x17, '\x00', r2, 0x25, r1, 0x8, &(0x7f0000001280)={0x4, 0x746ee6cf}, 0x8, 0x10, &(0x7f00000012c0)={0x3, 0x2, 0x10, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001300)=[r9, r4], &(0x7f0000001340)=[{0x3, 0x2, 0xf, 0x6}, {0x0, 0x3, 0x7}, {0x5, 0x5, 0x4, 0x6}, {0x2, 0x3, 0x1, 0x5}, {0x5, 0x5, 0x8, 0x4}, {0x3, 0x3, 0x6, 0x9}], 0x10, 0x1ff, @void, @value}, 0x94) write$cgroup_type(r1, &(0x7f0000001480), 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000014c0)=0xffffffffffffffff, 0x4) recvmsg$unix(r7, &(0x7f0000001800)={&(0x7f0000001500)=@abs, 0x6e, &(0x7f0000001740)=[{&(0x7f0000001580)=""/26, 0x1a}, {&(0x7f00000015c0)=""/40, 0x28}, {&(0x7f0000001600)=""/17, 0x11}, {&(0x7f0000001640)=""/149, 0x95}, {&(0x7f0000001700)=""/24, 0x18}], 0x5, &(0x7f00000017c0)=[@cred={{0x1c}}], 0x20}, 0x1) 14.611401007s ago: executing program 5 (id=4177): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x22fe0}], 0x1}, 0x0) sendmsg$sock(r1, &(0x7f0000000600)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x64010102}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000000)="696a1a919ce00fec2efc922c64d52665128663e5fcf9d8b182409fd9318888b728fd6840f1", 0x25}], 0x1, &(0x7f0000000540)=[@timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x1ff}}], 0x30}, 0x881) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000580)=@base={0x11, 0x4, 0x4, 0x20002, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000006007a21bb22dfc119c0"], &(0x7f0000000280)=""/201, 0x1e, 0xc9, 0x0, 0x6, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRESHEX], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000200)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r2, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000680)=[0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0], 0x0, 0xea, &(0x7f0000000700)=[{}], 0x8, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0xf6, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) 14.351383622s ago: executing program 5 (id=4178): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000006100000054000000000000009500000000000000b4a8b1541206000000e9c79077fa15ba36eca61299de54cf77c9062430bc068829afff36b31fa7e35ce95d04"], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000240)="5cdd3086ddff0066b3c9bbac88a8", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x3, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0400000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x50) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc01, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6, 0x0, 0x0, 0x6}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1e0000000100000009000000b800000001200000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000005000000000000000900"/28], 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) r9 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_subtree(r10, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r11, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2214971f06699731b6876b52887d5122dfbf6bb"], 0x5) write$cgroup_subtree(r11, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000008000000000000000400000018110000", @ANYRES32=r7, @ANYBLOB="0000000100010000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085000000b10000008500000040000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000bf910000"], &(0x7f00000003c0)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0x9, 0x0, 0xa}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000400)=[r6, r3, r3, r5, r4, r3, 0xffffffffffffffff, r6, r5, r6], &(0x7f0000000780)=[{0x3, 0x5, 0x4, 0x9}, {0x0, 0x1, 0x2, 0xc}, {0x3, 0x3, 0x2}, {0x5, 0x2, 0x9}, {0x2, 0x1, 0x2, 0x7}, {0x0, 0x5, 0x7, 0xa}], 0x10, 0xfffff801, @void, @value}, 0x94) r12 = openat$cgroup_type(r9, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r12, &(0x7f0000000080), 0x9) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)) 13.49277412s ago: executing program 5 (id=4184): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="fdffffffffffffff00006c000000000000000000001e000000000000ada6b6b947e6489161eb63e607db77cc7976d07075e32e"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r5, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000"], 0xfdef) 13.435163306s ago: executing program 5 (id=4186): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x80000, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffcca) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12.508159091s ago: executing program 5 (id=4196): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0900000004000000030000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000d651e9e00000003b4cceae00000000000000000000000000000000000000000000000000c4fd9b18323f18f112bb56ce7febf10c573e3c768526b54db0572db545e84177ad38018165ff4343517e46fd15bbfa81bd8eb30f3ea12d7c9f85c4f5ae53257668e359eca14d4f4dce2cc5f944947ed6a18ae4ee5ee8456618eb35e1e01596"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@bloom_filter={0x1e, 0x3, 0x5, 0xa1b, 0x2, 0x1, 0x3, '\x00', 0x0, r2, 0x4, 0x3, 0x0, 0xc, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1d, 0x5, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9222, 0x0, 0x0, 0x0, 0xfffffff4}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f00000003c0)='syzkaller\x00', 0x8, 0x54, &(0x7f00000004c0)=""/84, 0x41000, 0x12, '\x00', 0x0, @lsm=0x2b, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xc, 0xa, 0x4e20}, 0x10, 0xffffffffffffffff, r1, 0x7, &(0x7f00000005c0)=[r0], &(0x7f0000000600)=[{0x3, 0x1, 0x3, 0x3}, {0x3, 0x2, 0x10, 0x3}, {0x0, 0x5, 0x5, 0xa}, {0x1, 0x1, 0xf, 0x4}, {0x3, 0x5, 0x5, 0x4}, {0x4, 0x5, 0x2, 0x2}, {0x4, 0x2, 0xa, 0x9}], 0x10, 0x57, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x153, 0x3ff, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r4, &(0x7f0000000100), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r0}, &(0x7f0000000200), &(0x7f0000000740)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000002c0)}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x9, 0x0, 0x0, 0x5, 0x0, 0x400000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0900000004000000030000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000d651e9e00000003b4cceae00000000000000000000000000000000000000000000000000c4fd9b18323f18f112bb56ce7febf10c573e3c768526b54db0572db545e84177ad38018165ff4343517e46fd15bbfa81bd8eb30f3ea12d7c9f85c4f5ae53257668e359eca14d4f4dce2cc5f944947ed6a18ae4ee5ee8456618eb35e1e01596"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@bloom_filter={0x1e, 0x3, 0x5, 0xa1b, 0x2, 0x1, 0x3, '\x00', 0x0, r2, 0x4, 0x3, 0x0, 0xc, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1d, 0x5, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9222, 0x0, 0x0, 0x0, 0xfffffff4}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f00000003c0)='syzkaller\x00', 0x8, 0x54, &(0x7f00000004c0)=""/84, 0x41000, 0x12, '\x00', 0x0, @lsm=0x2b, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xc, 0xa, 0x4e20}, 0x10, 0xffffffffffffffff, r1, 0x7, &(0x7f00000005c0)=[r0], &(0x7f0000000600)=[{0x3, 0x1, 0x3, 0x3}, {0x3, 0x2, 0x10, 0x3}, {0x0, 0x5, 0x5, 0xa}, {0x1, 0x1, 0xf, 0x4}, {0x3, 0x5, 0x5, 0x4}, {0x4, 0x5, 0x2, 0x2}, {0x4, 0x2, 0xa, 0x9}], 0x10, 0x57, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x153, 0x3ff, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r4, &(0x7f0000000100), 0x0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r0}, &(0x7f0000000200), &(0x7f0000000740)=r3}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000002c0)}, 0x20) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x9, 0x0, 0x0, 0x5, 0x0, 0x400000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) 12.427725216s ago: executing program 5 (id=4197): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100001b80000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000009c0)={r3, 0x58, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x74) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="1e00000029040000030000000400010002000000", @ANYRES32, @ANYBLOB="000800000000000400000000000000000000000005964e54e0bca26c70afb3a5a6ce1064e6b123e4b42bae71d251fa25b120a78ddd3bccef4b47e07a5330c2e7ac5c091b6c72bf79cc88185efab94d5da27e953f4e7f5ab5db12f1c6e01d02", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0500000002000000000000000200"/28], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x13, 0xffff, 0x80000000, 0x467a, 0x40054, 0xffffffffffffffff, 0x8, '\x00', r4, r5, 0x0, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="10000015000075c60fb99741a832100000400000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="03000000030000000300"/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x0, 0x2f, &(0x7f00000006c0)=ANY=[@ANYBLOB="49940600ffffffffb7080000000000007b8af8ff00000000b7080000030000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000852000000500000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000ecd28add85000000820000008520000001000000180100002020702500000000002020207b1af8ff00000000ffa100000000000007010000f8ffffffb702000008000000b7030000080000008500000006000000b7080000000000007b8af8ff00000000b7080000040000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000cd89f4ff00000000"], &(0x7f0000000580)='syzkaller\x00', 0x2, 0x16, &(0x7f00000005c0)=""/22, 0x40f00, 0x8, '\x00', r4, 0x0, r2, 0x8, &(0x7f0000000600)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000840)=[r3, r3, r0, r6, r1, r3, r8, r3], &(0x7f0000000940)=[{0x1, 0x5, 0x10, 0xb}, {0x3, 0x1, 0xa, 0x1}, {0x3, 0x4, 0x0, 0xa}, {0x1, 0x2, 0x9, 0xb}, {0x5, 0x1, 0x0, 0xb}], 0x10, 0x8000, @void, @value}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000000000000000000030000000002000000020000000000000000000000000000090200"/74], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r10}, 0x10) syz_clone(0x200000, &(0x7f0000000040)="39821c82836e00a41435", 0xa, &(0x7f00000002c0), &(0x7f00000003c0), &(0x7f0000000500)="4972bc65f04e46ba4dde09cf07317d709946c6894e89bf20fcb36d2cf1abafdf4c62adac8fd34de0c0188b20195b6c847dcf9e69f984e186310afb4da5b3df6cd48957c73c14b4c2326ab9b9858609b5b9bf24") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, @void, @value}, 0x94) unlink(0x0) close(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r11, 0x8982, 0x20000500) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) 8.340161101s ago: executing program 7 (id=4226): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b4050000200080006110600000000000b70000000000000095000000000000009f332460916e6e893f1eeb0b723043c47c896ce0bce66a245ad99b817fd98cd824498949714ffaac8a6f77ef26dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb3c5c26838f2b9000f205891060017cfa6fa26fa7a34700458c60897d4a6148a1c11428607c40de60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc6002084e5b52710aee410e3e554d090d95983826fb8579c1fb47d2c5553d2ccb5fe5b51fe6b174ebd9907dcff414ed00000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1200000004000000040000000e"], 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={@map=r1, r0, 0x5, 0x0, 0x0, @void, @value}, 0x10) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="000000008000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x62a83200, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006b113e000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000380)=""/76}, 0x20) 5.540180233s ago: executing program 2 (id=4240): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x1) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x4}]}, {0x0, [0x30, 0x30, 0x5f, 0x2e, 0x61]}}, &(0x7f0000000080)=""/238, 0x2b, 0xee, 0x1, 0xfffffff8, 0x10000, @value=r0}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000003c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0], 0x0, 0xf1, &(0x7f0000000480)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x2f, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @exit, @generic={0x5, 0x4, 0x2, 0x4, 0xd5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @jmp={0x5, 0x1, 0xd, 0x7, 0xb, 0xfffffffffffffffc, 0x42522be9aee2dbde}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x101}}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit, @generic={0x9, 0x3, 0x7, 0x9, 0x8}, @func], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000380)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x10, '\x00', r2, 0x0, r1, 0x8, &(0x7f00000006c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x0, 0x2, 0x6, 0x4}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000740)=[{0x4, 0x4, 0xe, 0x1}, {0x4, 0x2, 0x4}], 0x10, 0x1, @void, @value}, 0x94) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@const={0x9}, @fwd={0xc}, @fwd={0xc}]}, {0x0, [0x2e]}}, &(0x7f0000000880)=""/52, 0x3f, 0x34, 0x0, 0x7, 0x0, @void, @value}, 0x28) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000900)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000940)='cgroup.threads\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r3, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a80)=[0x0, 0x0], 0x0, 0x8a, &(0x7f0000000ac0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000b00), &(0x7f0000000b40), 0x8, 0xc5, 0x8, 0x8, &(0x7f0000000b80)}}, 0x10) r9 = gettid() write$cgroup_pid(r0, &(0x7f0000000d00)=r9, 0x12) r10 = perf_event_open(&(0x7f0000000d80)={0x4, 0x80, 0xc, 0x4, 0x0, 0xe, 0x0, 0x3e4, 0x10600, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000d40), 0x1}, 0x219e0, 0x7, 0x10000, 0x5, 0x2, 0x80, 0x3, 0x0, 0x6, 0x0, 0x10}, r9, 0xc, r0, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={r0, 0x58, &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002040)={{r0, 0xffffffffffffffff}, &(0x7f0000001fc0), &(0x7f0000002000)='%+9llu \x00'}, 0x20) r13 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002100)={0x6, 0x7, &(0x7f0000000e00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xf77d}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000e40)='GPL\x00', 0x80000000, 0x1000, &(0x7f0000000e80)=""/4096, 0x41100, 0x4, '\x00', r11, 0x25, r4, 0x8, &(0x7f0000001f40)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000001f80)={0x4, 0x6, 0x3, 0x7ff}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000002080)=[r0, r0, r0, r0, r0, r0, r0, r12], &(0x7f00000020c0)=[{0x1, 0x3, 0x8, 0x2}, {0x2, 0x4, 0xe, 0x6}], 0x10, 0x7ff, @void, @value}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000021c0)={r0, r12, 0x4, r13}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f0000002200)='\x00') r14 = openat$cgroup_ro(r5, &(0x7f0000002240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000002280)=r14, 0x4) perf_event_open(&(0x7f0000002300)={0x2, 0x80, 0x8, 0x8, 0x5, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f00000022c0), 0xd}, 0x5000, 0x6, 0x24, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7, 0x0, 0x9}, r9, 0x8, r14, 0x1) ioctl$PERF_EVENT_IOC_RESET(r10, 0x2403, 0x8) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000002380), 0x2, 0x0) r15 = openat$tun(0xffffffffffffff9c, &(0x7f00000023c0), 0x2000, 0x0) ioctl$SIOCSIFHWADDR(r15, 0x8924, &(0x7f0000002400)={'dvmrp0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3c}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002440)=r8, 0x4) r16 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002480)={0x1b, 0x0, 0x0, 0x7, 0x0, 0x1, 0x100, '\x00', r7, r0, 0x2, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002780)={r0, 0x20, &(0x7f0000002740)={&(0x7f0000002680)=""/1, 0x1, 0x0, &(0x7f00000026c0)=""/71, 0x47}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000002840)={0x2, 0x3, &(0x7f0000002500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000002540)='GPL\x00', 0x5, 0x71, &(0x7f0000002580)=""/113, 0x40f00, 0x70, '\x00', r2, @fallback=0x11, r14, 0x8, &(0x7f0000002600)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002640)={0x0, 0xc, 0x0, 0x3}, 0x10, r17, 0xffffffffffffffff, 0x2, &(0x7f00000027c0)=[r0, r14, r0, r16], &(0x7f0000002800)=[{0x5, 0x2, 0x9}, {0x4, 0x3, 0x10, 0x3}], 0x10, 0x4, @void, @value}, 0x94) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000002c00)={&(0x7f0000002900)="f511dbc340d69d4706a9f1c0f9017dac9c71cfd4f0e3aec5e2551c3613754818a79ac7ac27cee8fb5a6ae567b774a25cd5321892429a0d863ff5f36a8373cbfdc72e3bed0e4eded03e4da5b93c86f564ff87e215a0ed43baee8060cf81808ef64f6234d85328952b7c96d4807630d6ef278a6ee7cc8f8545b2ed68c6e425b4d69f285baa62ebd58be8a33d420ea2a569da3ad1c59fc57c", &(0x7f00000029c0)=""/220, &(0x7f0000002ac0)="58a157d08346b124a9a15d75c11ba57aba252079aaa648b53168a8b4086ddb3ab9dfbfe32e56c5e0cc64e915f0f25f368d72ed544b2d076a3b7885e4e8c307b31010b349", &(0x7f0000002b40)="3e9896ead6583b6e3856ef2c28ac4658b0a7b5c6f370108b12411903ad95c7c91c29259a89c39e7b1bcf540c88995f5f74248e6195ff28eeae8f1b53be95b3ded6ba4faa34c2175e9bc0cced3e294182f91ea5cb39cbc94b5478c4b848c734b4ae9de6853ac0a0a3c55817142f51ab45438967f3bcc032cc64f63167e58d0375329b5caa96e63b9aa885f5761e330ed07ef7855cdc8bedc82715201a1ee66a8be4e521849d6c8a8b7c913a98bab89700b8ceecd1ef899e196f", 0x9, r14, 0x4}, 0x38) 5.363942492s ago: executing program 2 (id=4241): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r1}, &(0x7f0000000a00), &(0x7f0000000a40)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f0000000880), &(0x7f00000008c0)=r0}, 0x20) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x749c, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000080), 0x0}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000000, &(0x7f0000000340)="2dabb4bbf0bb129f59f16f", 0xb, &(0x7f0000000580), &(0x7f0000000680), 0x0) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0x30}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x56}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) 4.202057572s ago: executing program 2 (id=4246): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_ext={0x1c, 0x2, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x0, 0x5, 0x5, 0x7d}, 0x10, 0x7c86, 0xffffffffffffffff, 0x3, &(0x7f0000000800)=[r0, 0xffffffffffffffff, r0], &(0x7f0000000840)=[{0x1, 0x3, 0x10, 0xb}, {0x1, 0x3, 0xe, 0x1}, {0x3, 0x4, 0x5}], 0x10, 0x7e, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x3, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) close(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00'}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f00000008c0)=ANY=[@ANYRESHEX=r0, @ANYRESDEC], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 32) r6 = openat$cgroup_procs(r5, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) (async, rerun: 32) r7 = getpid() write$cgroup_pid(r6, &(0x7f0000000880)=r7, 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000380), 0x12) (async) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) setsockopt$sock_attach_bpf(r3, 0x1, 0x14, &(0x7f0000000040)=r10, 0x3b) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1d, 0x6, &(0x7f0000000d00)=ANY=[@ANYBLOB="0705c2000400000018130000", @ANYRES32=r2, @ANYBLOB="0000000000000000950000000000000018000000000200000000000006000000b93d4667ed4c2c0174bd92ec062a38c1b4da3eb4b5149e79ba3333d181383cffc200f80793f8955fcc5452829f943e96e04c061f445af74db44d0e167c7ad43c3d10b145f6a3a3ca32e65733a3df27d3e3cddc3898f00a5a14ac3d68575b06ac9500f46e4e2ab50154776e0339eb73f0490abfe754efd28ef43078ce3d2158887b42bb0f037e78447ab1cad271d6c3da6a1f3cfebe9f72140b812a662e6b88ea9b25a86c98f23de46769c8d44edd"], &(0x7f0000000240)='GPL\x00', 0x2, 0xc7, &(0x7f0000000300)=""/199, 0x41000, 0x4a, '\x00', 0x0, @lsm, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xb, 0x9, 0x1}, 0x10, 0x0, r10, 0x8, 0x0, &(0x7f0000000580)=[{0x0, 0x1, 0x2, 0xe}, {0x2, 0x5, 0x4, 0x7}, {0x4, 0x5, 0x2, 0xa}, {0x3, 0x3, 0xf, 0x2}, {0x4, 0x3, 0x9, 0xb}, {0x1, 0x5, 0x9, 0x5}, {0x2, 0x3, 0x3, 0x9}, {0x2, 0x2, 0x0, 0xa}], 0x10, 0x3, @void, @value}, 0x94) (rerun: 32) recvmsg$unix(r3, &(0x7f00000002c0)={0x0, 0xfffffd13, 0x0}, 0x0) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r11}, 0x10) (async) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r12, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba5df485855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 4.120312718s ago: executing program 4 (id=4247): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000006370f0", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES64=r1, @ANYRES8=r0], 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f00800", 0x0, 0x4000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020754d0400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000180100002020642500000000002020207b1a00ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r2, 0x0, 0xfd, 0xfffffffffffffffc, &(0x7f0000000a40)="ff76ae395777b8937bbb52eb9ed3c4b85685acd699c1a863b484771859831ecee0983445ee317c10271ba78b840eb29bdc59d89b5cb794a68387584149f285b61f976cb3fcbb4ba407165b7075429c3957ec4ca48f793120640d047011f0185bc826ef4a78024f6bab15af9a1306de572338c8a2e265d36a88c8a16d633c80823eca8fe9073044fb453b1f00b821529fbf167114385436a41c9d3520ac12ae27694558c6e57a17053a2a59253b1e5aeb2cccc22c3d9de069dd67bdfdfcdee938e4a10adcc73a9cbcf2be4df5d9904870e585ebc6a5ce3bcf045994c6224b7a9b46a9984179aaefcdf3f53ab5f781902e924230dd6e77357cc4ca2fd586", &(0x7f0000000140)=""/13, 0x0, 0x0, 0xad, 0x112, &(0x7f0000000240)="9cdc57e4a9c7fcb9b186c9bd43fa44b38bef6138ca1f6f08cdaacbcffe9a2ae0343debf4e6ce7818ec4261022c63c5174dbf51c34fd98db73c55431a897423936fe486079d14be4fdaa264f27421f79a60f4c7f8d297d74bc790de34386008fc17b9ca14491f71bbc7fd8367ce56a3fb28ba9d6d3b2c24568f8b891c71cab31229da7ca3687c49e4e9d44410b7fa88e3f5f4e437b5e143240b3bec30863d4b722b6ad3c8d882037a7daebcb362", &(0x7f0000000880)="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", 0x1, 0x0, 0x2}, 0x9) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001180)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x161d1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffff80000000}, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x4, 0x0, 0xff, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r5, 0x0) (async, rerun: 64) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2401, 0x1) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001c000000b7030000000000008500000005000000bca900000000000035090100000000009500000000000000b702000004000000632af8ff00000000b509000000000000c3aaf8fff1000000bf8613000000000007080000f8ffffffbfa400000000000007040000f0ffffffc40200000800000018220000", @ANYRES32, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 4.119000527s ago: executing program 2 (id=4248): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x18826, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='kfree\x00', r2, 0x0, 0x800000000}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) openat$cgroup_type(r1, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0x5d, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) gettid() openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='cpu&00\t|l%G\x87\xcf\x00\xe4\xb7l\xfe\xb0\f_\xd7\x01\xc9\n\x18\x9a\x91\x02\x04A\x0e/\xd0U\xacF\xcb\"\xf3Pgch\xe2\xef\x98o\x00\x00\xc7Y\x80\xd28\xd5\x12&\xf6Y\xd0\x83\xd0\x85\xd8\xc6\xbd\x9a\xfel\"\xde\x8e\xc3\xc9\r\xd4\xb8\x97_<\xf3hV\xf7)\xb3\xf925\xcf\x97l\x85\xf3;\x1a\x0f:J\x9b\xf8\xa4\x83\x1btNT\x8a\x80\xcd\xb6\x0f\x06\xae\xc3\x94\xa3]\xd0\x1a >6\xc7\x06\x00\x00\x00\x00\x00\x00\x00x\xfcQ\xfb\f\x86\xaa\x9bjCA\xdb=g\xdf\xec\xe2~\x99V\xbck\xe7\x01\x00\x00\x00\xd9\xf9\xab\xbe\xfb\v\x954\x10\xe4\xf7\x83&\xf1J\xaa\xd4~\x10Y\xafU2\x1f_\xd5\xb7\x9d\xaa\xec\x9ceJy\xe4\x0fC\xa1e)\xedG\x1b\xa5jy\xebe\xf0\xa9\xa6\xc2Z\x85Vs8\xad\x15\xa7') r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0xc, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x9}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x2e]}}, &(0x7f0000000080)=""/159, 0x50, 0x9f, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x42, 0x40, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x24084200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000900000000000000000000000018110000", @ANYBLOB="de263d8063a081b7a6549437a6368ff9a396c2966bf36e55b2f1fda989c5f9c97072eee3b6bb2991590a7cc04d9f28936e47b48b6ec9937a69d48c47e7b7cbd57ed1a86b4bb7ddefb2ebe59d72291a97e4f4ad27ccd1e4590d5c0706da98147a28f2814e1c6a216cc2b04f00bcce332436a2a49dbf753d4931152ee27068998e9c8e305df84c2d2e2a61bfc2249df5603426637135b01ed1c054d7c79af4e28f5df87bbeb775f3d2", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_devices(r4, &(0x7f0000000080)={'b', ' *:* ', 'wm\x00'}, 0x9) 3.785404057s ago: executing program 4 (id=4249): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x40, 0x0, 0x4, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x3}, 0x10911, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x20) write$cgroup_subtree(r4, 0x0, 0xfdef) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000080e2ffffff00220000000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000780)=ANY=[@ANYRES64=r5, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r6}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r8, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000180)=[{&(0x7f00000002c0)="a293d221edaa6de592afbbbeec1525da631ff05d03806af54e3b27b9c19a79791f5d76d3d9f67247551056cd9610f2143493945c76b47e83014d24cb23918d8306c8f3841e6b179b7ddf5deb558e66ef04a207b4aa2d1d65edeaf48d066dd39a67f47f125e999313978042ea1e9c880b52f4d0024d4e6b14fafcc9a7680d7e754a2da3f6e35e8992b5bb9c8316108d0a9b1714a36856f98aed4feb58a80efd2be99fe5ffb99b099fe7", 0xa8a554}]}, 0x40850) 3.777702347s ago: executing program 7 (id=4250): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000006100000054000000000000009500000000000000b4a8b1541206000000e9c79077fa15ba36eca61299de54cf77c9062430bc068829afff36b31fa7e35ce95d04"], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000240)="5cdd3086ddff0066b3c9bbac88a8", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x3, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0400000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x50) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc01, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6, 0x0, 0x0, 0x6}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1e0000000100000009000000b800000001200000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000005000000000000000900"/28], 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) r9 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_subtree(r10, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r11, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2214971f06699731b6876b52887d5122dfbf6bb"], 0x5) write$cgroup_subtree(r11, &(0x7f00000006c0)=ANY=[@ANYBLOB="2d63707520a8ee7cff46794702ed5d341e216dad80aea5070d8d6f79907e100ebe20a33449ef7c66a5b445d19382b3254250724540d9e3f6260401bec4d7da97494a6cfd780142fe30e446b820e69f910a"], 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000008000000000000000400000018110000", @ANYRES32=r7, @ANYBLOB="0000000100010000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085000000b10000008500000040000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000bf910000"], &(0x7f00000003c0)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0x9, 0x0, 0xa}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000400)=[r6, r3, r3, r5, r4, r3, 0xffffffffffffffff, r6, r5, r6], &(0x7f0000000780)=[{0x3, 0x5, 0x4, 0x9}, {0x0, 0x1, 0x2, 0xc}, {0x3, 0x3, 0x2}, {0x5, 0x2, 0x9}, {0x2, 0x1, 0x2, 0x7}, {0x0, 0x5, 0x7, 0xa}], 0x10, 0xfffff801, @void, @value}, 0x94) r12 = openat$cgroup_type(r9, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r12, &(0x7f0000000080), 0x9) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)) 3.436306226s ago: executing program 7 (id=4251): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000010000000000000000000000000090000000000000000"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000280)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r5, &(0x7f0000000980), 0x20000992) 2.984343179s ago: executing program 4 (id=4254): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="fdffffffffffffff00006c000000000000000000001e000000000000ada6b6b947e6489161eb63e607db77cc7976d07075e32e"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r4, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x38, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000"], 0xfdef) 2.787202128s ago: executing program 4 (id=4255): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00'/25], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) close(r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, @void, @value, @void, @value}, 0x50) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0xfffffffffffffde4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0xc8, 0x0, 0x3, 0x40000000000003, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) write$cgroup_int(r6, &(0x7f0000000200)=0x1, 0x12) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=r4, 0xffffffffffffffff, 0x26, 0x18, 0x0, @void, @value=r1}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40810}, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000000000000000000007be8bc20e7000104000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r10}, 0x0, &(0x7f0000000040)}, 0x20) 2.544281123s ago: executing program 7 (id=4256): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r1}, &(0x7f0000000a00), &(0x7f0000000a40)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f0000000880), &(0x7f00000008c0)=r0}, 0x20) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x749c, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000080), 0x0}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000000, &(0x7f0000000340)="2dabb4bbf0bb129f59f16f", 0xb, &(0x7f0000000580), &(0x7f0000000680), 0x0) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0x30}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x56}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) 2.16934913s ago: executing program 6 (id=4258): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'xfrm0\x00', @random="ab435da1d37b"}) write$cgroup_pid(r1, 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000400)='syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000380)='ns/cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYRESHEX=r0, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x8a8ad0023b903a6f, 0x0) 1.806791309s ago: executing program 4 (id=4259): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000000363fcff0500000018200000", @ANYRES32, @ANYBLOB="0000000008000000950100e1008000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f0000000c00)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0xed00}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xb6) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000003280)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xcc0, 0x0, &(0x7f0000000040)="2b1c52ac82e71ea05b0c5e43ede4", 0x0, 0xb20c, 0x0, 0x0, 0xe8, 0x0, &(0x7f0000000280)="dd"}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='ext4_es_lookup_extent_enter\x00', r5}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00', r6}, 0x18) close(r6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000014000000b7030000000d00008500000083000000bf090000000000005509010000000000950020d000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x18) close(r8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r7, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb933"], 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380), 0x0, 0xc3, &(0x7f0000000480), 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xee, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x5, [@struct={0x8, 0x6, 0x0, 0x4, 0x1, 0x4, [{0x10, 0x2}, {0xe, 0x4, 0x10001}, {0x9, 0x4, 0x2}, {0x9, 0x0, 0x6}, {0x10, 0x4, 0xd9}, {0x1, 0x5, 0x2}]}]}, {0x0, [0x0, 0x5f, 0x61]}}, &(0x7f0000000740)=""/178, 0x71, 0xb2, 0x0, 0xf92, 0x0, @void, @value}, 0x28) 1.793756748s ago: executing program 6 (id=4260): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='!\x00') (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) (async, rerun: 64) sendmsg$tipc(r1, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000880)="0f", 0x1}], 0x1, 0x0, 0x0, 0x20008054}, 0x40) (async, rerun: 64) recvmsg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/78, 0x4e}], 0x1, 0x0, 0xe}, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x1}, 0xffffffffffffffff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a2, &(0x7f0000000080)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a3, &(0x7f0000000080)) 1.292614128s ago: executing program 7 (id=4261): bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000fa93634188bfcba816d045a0091339041acc191b1f5b9bde76888923913b6b4d0338768c0f6251bc458f39f1dd2d29abda37ad18e9a776ff0f0341bc429de80f25c8da94597d37c76f5f61575a21d5735f53a4c81c63307df7558aae7b4d6857a59fc5dada648de6442340eda5539588a9edba0c26de20f7bd09779b7a17ccf0b944a28f9fe33716f918406191", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfe37, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x18000000000002a0, 0xe, 0xa002a0, &(0x7f0000000040)="b907ef19edfff007049e0ff0888e", 0x0, 0x4000, 0x18000000, 0x0, 0x0, 0x0, 0x0}, 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000000880)}, 0x96a713fbd4955066) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001180)=ANY=[@ANYBLOB="0400000004000000040000000180000008080000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRESDEC=r1, @ANYBLOB="00000000ffffffff0000000000000000000000000001000000000000"], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1200000005000000080000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000097e55261028dac2200"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r4}, &(0x7f0000000180), &(0x7f0000000100)=r3}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r2, &(0x7f0000002080)="d608f4af25ccd7a2725d9eab4d5c9d22933a5c4398400c5a38c9bb519b26278c57241d49ae5e7d08904863852fa44337f1441e00cae49dec3fb0874e09c51ca2547009b887106fe9afad66fb1e92600e8907039b6421d9a7e1ec7edba13078ac3c10ee4210008b266acd192f88850110a336793ffa25de3f901a6d0a3f5452574a50b6e11aef74d1f149915146af7ca009fe1c8d1e0df1b03c92603dfc94eb98f174be80666a5abfc737ec8e4bf080417888fed6343f4444b68d966ba4eb7bbdd2fb11ce98a86883", 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f0000000400)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r5}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xa153}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.182662901s ago: executing program 4 (id=4262): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000680800009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r2}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095", @ANYRES64=0x0, @ANYRESOCT=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) openat$ppp(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000006000000040000000000000700000020000000005f00"], &(0x7f0000000540)=""/246, 0x2a, 0xf6, 0x1, 0x0, 0x0, @void, @value}, 0x28) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="faf909d2694ecf300000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r6, 0x8982, 0x20000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0, 0x10, 0x0, 0x0, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x16, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r8, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYRES8=r7], &(0x7f0000000040)='GPL\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = syz_clone(0x800000, &(0x7f0000000300)="b1c7c86e60118ed953dd0a580e90de38335a40861a04dc2a4b2c16caa888c5d490e2a0dabe4ddefb4a28445a9bef32b4a07497a364d08c866922e73fce153d5445c11ba0204b936142316a37d09a9a0987c1cbb449cb91939b529226dd14635729c64dc46054eac21b68ef994ab2dc", 0x6f, &(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000680)="35dd5a4d41baa2423491f8a7637ffe797c5a70cc43897a3026ecc70c0674a1becc0e915e92227fade6c120353afa3c3ad7661691cd6c4941e94e63c4b32b6858ad4dffd2fdc2234b2d35b952479fcb714e72d7510e29e603d53c5fc0c16004f9485973d177157b7c7259812e8eecaa625d7dcb7bded17ae8c1f79c1f83048758df0416") syz_open_procfs$namespace(r11, &(0x7f0000000500)='ns/mnt\x00') close(r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) 875.118253ms ago: executing program 6 (id=4263): bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0, 0x0, 0xa}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000d40)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r5, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r6, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) close(r6) close(r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 536.711633ms ago: executing program 6 (id=4264): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000d40)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], &(0x7f0000000400), 0x0, 0x6f, 0x0, 0x0, 0x10, &(0x7f0000000700), &(0x7f0000000780), 0x8, 0x1f, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xf, &(0x7f0000000200)=ANY=[], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r2, 0x58, &(0x7f0000000900)}, 0x10) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='memory.min\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0x147, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x1f2f, 0x0, 0x0, 0x0, 0x0, 0x241, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)="30a0", 0x2}], 0x1}, 0x4040001) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000300)=0xffffffffffffffff, 0x4) recvmsg$unix(r4, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f00000000c0)=""/109, 0x6d}], 0x1}, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0), 0x9) ioctl$TUNSETOFFLOAD(r1, 0x40047451, 0x2000000c) openat$cgroup_int(r6, &(0x7f0000000340)='hugetlb.2MB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) 340.27657ms ago: executing program 2 (id=4265): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b4050000200080006110600000000000b70000000000000095000000000000009f332460916e6e893f1eeb0b723043c47c896ce0bce66a245ad99b817fd98cd824498949714ffaac8a6f77ef26dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb3c5c26838f2b9000f205891060017cfa6fa26fa7a34700458c60897d4a6148a1c11428607c40de60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc6002084e5b52710aee410e3e554d090d95983826fb8579c1fb47d2c5553d2ccb5fe5b51fe6b174ebd9907dcff414ed00000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x21, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000dfb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000040)='mm_lru_insertion\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)="38a0", 0x2}], 0x1}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYRES64=r4], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100"/15, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="17000000fcffffff040000000d00000000000000", @ANYRES32=0x1, @ANYBLOB="feffffff69e106cf92b95f558f5caa81e7", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000feffffff00"/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400", @ANYBLOB="395eec6483ad5aab813b28ca2b00000000000000ae4298140052cacefe63d3dcbc79689960dedec6ea521a7a227d91ca7b4406fb6d549d4022131b8e05bcbecdb409a8d6b17671d96b0b6f43e6625560190b227131079002f619fd53e994084a27d52482bfc6e367f828bee56b6bee0f0d2b4d12dd20de0bd526264b57bd4fba7f881d2ed713e65ba49118ce994c86f463", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x101000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000400000003000000000000000400000078580d83132a78e4d950"], 0xffffffffffffffff, 0x3e, 0x0, 0x2, 0x0, 0x0, @void, @value}, 0x28) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000039c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffe8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x18000000000002a0, 0x38, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f086dd", 0x0, 0x63, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b708006158c0583f326592ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r9}, 0x10) 296.395058ms ago: executing program 7 (id=4266): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000001c0)='netfs_read\x00', r0, 0x0, 0x6}, 0x18) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x11, 0x0, 0x0, @void, @value}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) r4 = openat$cgroup_procs(r3, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000380), 0x12) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x0, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 195.899212ms ago: executing program 6 (id=4267): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x5, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000003480)={0x0, 0x0, 0x0, 0x300, 0x0, 0x2008}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 75.537175ms ago: executing program 6 (id=4268): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000003, 0x5670}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0100000004000000030000000600000000000000", @ANYRES32, @ANYBLOB="00000085baf50cc7cd8677a662f80000000000000010000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000043c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) sendmsg$inet(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="0000000200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001e2d3a548c3f2d793c7954b00000018", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000740), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f00000004c0)={&(0x7f0000000240), 0x6e, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/202, 0xca}], 0x1, &(0x7f0000000400)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}, 0x102) 0s ago: executing program 2 (id=4269): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="00000200000000ffff3e0a0000000000000000006f0ae18b35931f4c5ac8ff280b2c2e2e7116570abd1011947433607af9535cb39727a3", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1b, 0x10, &(0x7f00000003c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x400}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, @jmp={0x5, 0x0, 0x8, 0x1, 0x9, 0x100, 0x8}], &(0x7f0000000000)='GPL\x00', 0x5, 0xb2, &(0x7f0000000500)=""/178, 0x41100, 0x70, '\x00', r5, @fallback=0x14, r6, 0x8, &(0x7f0000000340)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0x1, 0x101, 0x80}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000800)=[0xffffffffffffffff, r7, r0, r0], &(0x7f00000008c0)=[{0x1, 0x5, 0x9, 0x6}, {0x1, 0x3, 0xe, 0x2}], 0x10, 0x1, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="19a94c4d40053dc145a468df337b9587a76d3a2383a0e611768b47315f03879ad68765e0fa4dc9d0d61e5fd325b4a908af8a887ba3352341c21e835d6edaebe0dc6b081b488574dff222f8d5ee354b976844558a3b95e15395114ecf1d9ffbb595e7933cdaa5dda0e09be8cf46bbd8131fbce86cf77a44", @ANYRES16=0x0], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="7eaa000000000000711013000000000095000000000000009bf28e4fc0ecc33f94f1894493197eba3651a84afe093fc5b450f160ccd2bba45ccf2b432543ce0c3718233acd18d2215ec0b1dcfb4c78479f9c508ffcd4ab84b24b169e3e707d59226b3d10296b719f557fabc72e2a130d2d7e8e9852499ae49d1af5e3ddaab8e020630767c9b11fa4c9ecff8b50600dafd184d4be9e16e7e15d253aaadc96843bb1ff83da97a573505f93383635938396032b8d0c7ee9f9ee26c91626c9aa44384a7c1fcb1634d6b95d0d4d642fe0a720c3fd8e8501d2a116aa0416c608e452094eb6f075472038b7ecbd40"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r9) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.116' (ED25519) to the list of known hosts. [ 20.962411][ T30] audit: type=1400 audit(1732010584.129:66): avc: denied { integrity } for pid=279 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 20.990094][ T30] audit: type=1400 audit(1732010584.159:67): avc: denied { mounton } for pid=279 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.991296][ T279] cgroup: Unknown subsys name 'net' [ 21.017313][ T30] audit: type=1400 audit(1732010584.159:68): avc: denied { mount } for pid=279 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.050274][ T279] cgroup: Unknown subsys name 'devices' [ 21.050276][ T30] audit: type=1400 audit(1732010584.199:69): avc: denied { unmount } for pid=279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.226403][ T279] cgroup: Unknown subsys name 'hugetlb' [ 21.233144][ T279] cgroup: Unknown subsys name 'rlimit' [ 21.393355][ T30] audit: type=1400 audit(1732010584.559:70): avc: denied { setattr } for pid=279 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.422772][ T30] audit: type=1400 audit(1732010584.559:71): avc: denied { mounton } for pid=279 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.451419][ T30] audit: type=1400 audit(1732010584.559:72): avc: denied { mount } for pid=279 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.454375][ T282] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.487566][ T30] audit: type=1400 audit(1732010584.659:73): avc: denied { relabelto } for pid=282 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.518443][ T30] audit: type=1400 audit(1732010584.659:74): avc: denied { write } for pid=282 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.521932][ T279] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.547263][ T30] audit: type=1400 audit(1732010584.689:75): avc: denied { read } for pid=279 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.175121][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.183893][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.193593][ T291] device bridge_slave_0 entered promiscuous mode [ 22.209175][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.217844][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.227455][ T289] device bridge_slave_0 entered promiscuous mode [ 22.235626][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.246224][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.254996][ T291] device bridge_slave_1 entered promiscuous mode [ 22.275356][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.283130][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.292764][ T289] device bridge_slave_1 entered promiscuous mode [ 22.315004][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.325035][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.332623][ T290] device bridge_slave_0 entered promiscuous mode [ 22.350251][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.357829][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.368483][ T290] device bridge_slave_1 entered promiscuous mode [ 22.422241][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.431181][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.443589][ T292] device bridge_slave_0 entered promiscuous mode [ 22.465468][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.472591][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.481119][ T292] device bridge_slave_1 entered promiscuous mode [ 22.505968][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.514875][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.528568][ T293] device bridge_slave_0 entered promiscuous mode [ 22.546417][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.556640][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.567770][ T293] device bridge_slave_1 entered promiscuous mode [ 22.733844][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.742589][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.750495][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.758252][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.767623][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.775131][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.782469][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.790472][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.806659][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.815234][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.826050][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.837754][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.849475][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.858533][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.867495][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.875127][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.911459][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.921488][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.932184][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.943867][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.980925][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.990694][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.000265][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.010073][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.020784][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.030822][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.040905][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.053396][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.063770][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.075132][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.085671][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.106057][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.115698][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.124988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.133079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.144479][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.153423][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.162935][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.173121][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.182473][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.191534][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.202216][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.210601][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.223429][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.233132][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.244878][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.264489][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.275133][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.286688][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.294887][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.304091][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.316608][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.327547][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.337493][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.364254][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.373466][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.383199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.393305][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.403119][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.411660][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.422409][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.433842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.448605][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.472738][ T290] device veth0_vlan entered promiscuous mode [ 23.481912][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.492558][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.502463][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.513175][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.523688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.531991][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.540442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.549733][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.557410][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.571001][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.579413][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.591328][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.601569][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.611224][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.621124][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.629614][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.639169][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.663621][ T292] device veth0_vlan entered promiscuous mode [ 23.675048][ T291] device veth0_vlan entered promiscuous mode [ 23.685773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.696696][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.707675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.718213][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.727219][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.736043][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.744630][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.753825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.762864][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.774199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.783185][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.792547][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.802914][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.814206][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.823110][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.830170][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.838026][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.846250][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.854094][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.862430][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.871820][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.880524][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.889728][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.897541][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.909206][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.917715][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.929437][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.950971][ T292] device veth1_macvtap entered promiscuous mode [ 23.960645][ T290] device veth1_macvtap entered promiscuous mode [ 23.969255][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.981186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.992205][ T291] device veth1_macvtap entered promiscuous mode [ 24.013591][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.024189][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.034877][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.046210][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.056342][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.066796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.081071][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.094455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.105377][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.115798][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.126239][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.142205][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.151227][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.173378][ T289] device veth0_vlan entered promiscuous mode [ 24.180752][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.190080][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.200067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.209022][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.218305][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.226221][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.243027][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.266212][ T289] device veth1_macvtap entered promiscuous mode [ 24.287043][ T293] device veth0_vlan entered promiscuous mode [ 24.307488][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.324649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.334844][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.344338][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.367203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.384891][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.403512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.429944][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.518691][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.557668][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.617983][ C0] hrtimer: interrupt took 37071 ns [ 24.726994][ T293] device veth1_macvtap entered promiscuous mode [ 24.819393][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.837498][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.851319][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.871705][ T334] device wg2 entered promiscuous mode [ 24.884025][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.907328][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.170366][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 26.170383][ T30] audit: type=1400 audit(1732010589.339:114): avc: denied { cpu } for pid=364 comm="syz.4.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.268173][ T361] device syzkaller0 entered promiscuous mode [ 28.206626][ T30] audit: type=1400 audit(1732010591.379:115): avc: denied { relabelfrom } for pid=392 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.364836][ T30] audit: type=1400 audit(1732010591.409:116): avc: denied { relabelto } for pid=392 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.206587][ T30] audit: type=1400 audit(1732010592.379:117): avc: denied { create } for pid=414 comm="syz.4.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 29.534635][ T423] device pim6reg1 entered promiscuous mode [ 32.794057][ T30] audit: type=1400 audit(1732010595.949:118): avc: denied { write } for pid=472 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.880102][ T354] syz.0.6 (354) used greatest stack depth: 21560 bytes left [ 34.504314][ T508] device wg2 entered promiscuous mode [ 36.154188][ T538] device wg2 entered promiscuous mode [ 36.911625][ T556] device pim6reg1 entered promiscuous mode [ 38.095485][ T596] device wg2 left promiscuous mode [ 38.212417][ T596] device wg2 entered promiscuous mode [ 39.906418][ T644] device wg2 left promiscuous mode [ 40.107233][ T644] device wg2 entered promiscuous mode [ 40.609154][ T647] device pim6reg1 entered promiscuous mode [ 41.674555][ T695] device wg2 left promiscuous mode [ 41.716241][ T693] device syzkaller0 entered promiscuous mode [ 41.856967][ T695] device wg2 entered promiscuous mode [ 42.955141][ T731] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 43.185635][ T747] device wg2 left promiscuous mode [ 43.349390][ T30] audit: type=1400 audit(1732010606.519:119): avc: denied { create } for pid=743 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 43.434171][ T753] device wg2 entered promiscuous mode [ 44.433777][ T30] audit: type=1400 audit(1732010607.599:120): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 45.205833][ T806] device veth1_macvtap left promiscuous mode [ 45.276136][ T807] device wg2 entered promiscuous mode [ 45.589988][ T815] device syzkaller0 entered promiscuous mode [ 46.007448][ T820] device syzkaller0 entered promiscuous mode [ 46.508543][ T30] audit: type=1400 audit(1732010609.679:121): avc: denied { create } for pid=827 comm="syz.4.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 47.484249][ T863] device veth0_vlan left promiscuous mode [ 47.543353][ T863] device veth0_vlan entered promiscuous mode [ 48.294722][ T892] device wg2 left promiscuous mode [ 48.359936][ T898] device wg2 entered promiscuous mode [ 49.314736][ T30] audit: type=1400 audit(1732010612.489:122): avc: denied { create } for pid=916 comm="syz.1.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 49.348396][ T931] device pim6reg1 entered promiscuous mode [ 49.361051][ T924] device pim6reg1 entered promiscuous mode [ 49.531509][ T941] device syzkaller0 entered promiscuous mode [ 49.584224][ T30] audit: type=1400 audit(1732010612.739:123): avc: denied { create } for pid=942 comm="syz.2.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 49.730418][ T30] audit: type=1400 audit(1732010612.859:124): avc: denied { create } for pid=942 comm="syz.2.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 49.752540][ T944] device veth1_macvtap left promiscuous mode [ 49.805741][ T954] device wg2 left promiscuous mode [ 49.887348][ T954] device wg2 entered promiscuous mode [ 49.923229][ T943] device veth1_macvtap entered promiscuous mode [ 49.931843][ T943] device macsec0 entered promiscuous mode [ 50.910431][ T1005] device syzkaller0 entered promiscuous mode [ 50.937542][ T1009] device wg2 left promiscuous mode [ 50.955833][ T30] audit: type=1400 audit(1732010614.129:125): avc: denied { write } for pid=1006 comm="syz.2.178" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 51.030298][ T1009] device wg2 entered promiscuous mode [ 51.048648][ T30] audit: type=1400 audit(1732010614.179:126): avc: denied { ioctl } for pid=1006 comm="syz.2.178" path="socket:[17412]" dev="sockfs" ino=17412 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 51.094615][ T1007] device pim6reg1 entered promiscuous mode [ 51.222643][ T1019] ÿÿÿÿÿÿ: renamed from vlan1 [ 51.941379][ T1054] device syzkaller0 entered promiscuous mode [ 52.885835][ T1072] device pim6reg1 entered promiscuous mode [ 53.261929][ T1085] device wg2 left promiscuous mode [ 53.820987][ T1092] device pim6reg1 entered promiscuous mode [ 53.942908][ T30] audit: type=1400 audit(1732010617.109:127): avc: denied { create } for pid=1098 comm="syz.2.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 54.294687][ T1111] ªªªªªª: renamed from vlan0 [ 54.489938][ T1122] bond_slave_1: mtu less than device minimum [ 55.060663][ T1162] €Â0: renamed from pim6reg1 [ 55.858939][ T1181] device syzkaller0 entered promiscuous mode [ 56.105594][ T30] audit: type=1400 audit(1732010619.269:128): avc: denied { create } for pid=1204 comm="syz.3.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 56.156941][ T1210] bond_slave_1: mtu less than device minimum [ 56.173801][ T1210] device pim6reg1 entered promiscuous mode [ 56.457339][ T1229] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.611284][ T1228] device pim6reg1 entered promiscuous mode [ 57.557712][ T1266] device wg2 left promiscuous mode [ 57.719907][ T1270] device wg2 entered promiscuous mode [ 57.818848][ T1281] device syzkaller0 entered promiscuous mode [ 58.829015][ T1316] device wg2 left promiscuous mode [ 58.885727][ T1316] device wg2 entered promiscuous mode [ 58.916089][ T1325] device sit0 entered promiscuous mode [ 59.492998][ T1338] bond_slave_1: mtu less than device minimum [ 59.688744][ T1326] syz.4.264 (1326) used greatest stack depth: 20824 bytes left [ 60.823355][ T30] audit: type=1400 audit(1732010623.989:129): avc: denied { create } for pid=1390 comm="syz.2.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 61.498489][ T30] audit: type=1400 audit(1732010624.669:130): avc: denied { create } for pid=1416 comm="syz.4.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 62.229663][ T30] audit: type=1400 audit(1732010625.399:131): avc: denied { create } for pid=1435 comm="syz.3.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 62.382879][ T30] audit: type=1400 audit(1732010625.439:132): avc: denied { write } for pid=1435 comm="syz.3.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 62.614602][ T1452] syz.1.300[1452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.639422][ T1452] syz.1.300[1452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.992851][ T1469] device sit0 entered promiscuous mode [ 63.815402][ T1494] -: renamed from syzkaller0 [ 63.934006][ T30] audit: type=1400 audit(1732010627.099:133): avc: denied { create } for pid=1491 comm="syz.0.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 66.042964][ T30] audit: type=1400 audit(1732010629.209:134): avc: denied { setopt } for pid=1525 comm="syz.2.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 66.168482][ T1528] device pim6reg1 entered promiscuous mode [ 66.252432][ T30] audit: type=1400 audit(1732010629.419:135): avc: denied { create } for pid=1553 comm="syz.0.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 69.898325][ T1593] device wg2 left promiscuous mode [ 70.020225][ T1603] device sit0 entered promiscuous mode [ 72.569177][ T1648] device wg2 left promiscuous mode [ 72.584523][ T1648] device wg2 entered promiscuous mode [ 73.963912][ T1666] syz.2.354[1666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.964098][ T1666] syz.2.354[1666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.050010][ T1730] ------------[ cut here ]------------ [ 76.317258][ T1730] trace type BPF program uses run-time allocation [ 76.374885][ T1730] WARNING: CPU: 1 PID: 1730 at kernel/bpf/verifier.c:11698 check_map_prog_compatibility+0x6f1/0x890 [ 77.454011][ T1743] Â: renamed from pim6reg1 [ 77.590883][ T1730] Modules linked in: [ 77.814588][ T1730] CPU: 1 PID: 1730 Comm: syz.1.370 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 77.826982][ T1730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 77.840515][ T1730] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 77.849740][ T1730] Code: db e9 f9 fc ff ff e8 3e 31 ed ff 31 db e9 ed fc ff ff e8 32 31 ed ff c6 05 de 5e a3 05 01 48 c7 c7 c0 eb 87 85 e8 4f 7b be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 77.878758][ T1730] RSP: 0018:ffffc90000c3f328 EFLAGS: 00010246 [ 77.929304][ T1730] RAX: 32dec200a27cd000 RBX: 0000000000000001 RCX: 0000000000040000 [ 77.939155][ T1730] RDX: ffffc90000f3b000 RSI: 0000000000000a37 RDI: 0000000000000a38 [ 77.963337][ T1730] RBP: ffffc90000c3f370 R08: ffffffff81579195 R09: ffffed103ee265e8 [ 77.975325][ T1730] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 77.995638][ T1730] R13: ffff888114b8e000 R14: ffffc90000129000 R15: dffffc0000000000 [ 78.008079][ T1730] FS: 00007f2ba0f306c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 78.018036][ T1730] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 78.028052][ T1730] CR2: 0000001b2de0fff8 CR3: 000000011ce56000 CR4: 00000000003506a0 [ 78.041621][ T1730] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 78.052909][ T1730] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 78.062042][ T1730] Call Trace: [ 78.076023][ T1730] [ 78.079422][ T1730] ? show_regs+0x58/0x60 [ 78.091279][ T1730] ? __warn+0x160/0x2f0 [ 78.100298][ T1730] ? check_map_prog_compatibility+0x6f1/0x890 [ 78.108935][ T1730] ? report_bug+0x3d9/0x5b0 [ 78.116197][ T1730] ? check_map_prog_compatibility+0x6f1/0x890 [ 78.132131][ T1730] ? handle_bug+0x41/0x70 [ 78.137989][ T1730] ? exc_invalid_op+0x1b/0x50 [ 78.148394][ T1730] ? asm_exc_invalid_op+0x1b/0x20 [ 78.154562][ T1730] ? __wake_up_klogd+0xd5/0x110 [ 78.161437][ T1730] ? check_map_prog_compatibility+0x6f1/0x890 [ 78.169149][ T1730] ? check_map_prog_compatibility+0x6f1/0x890 [ 78.208287][ T1730] resolve_pseudo_ldimm64+0x682/0x1240 [ 78.245660][ T30] audit: type=1400 audit(1732010641.419:136): avc: denied { read } for pid=1767 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 78.336515][ T1730] ? check_attach_btf_id+0xef0/0xef0 [ 78.341898][ T1730] ? __mark_reg_known+0x1b0/0x1b0 [ 78.865009][ T1730] ? security_capable+0x87/0xb0 [ 78.870085][ T1730] bpf_check+0x3174/0x12bf0 [ 78.877676][ T1730] ? bpf_prog_22b6409c2f5c9c11+0x2d8/0x778 [ 78.884822][ T1730] ? is_bpf_text_address+0x172/0x190 [ 78.892685][ T1730] ? stack_trace_save+0x1c0/0x1c0 [ 78.910540][ T1730] ? __kernel_text_address+0x9b/0x110 [ 78.941574][ T1787] device sit0 left promiscuous mode [ 79.011822][ T1730] ? unwind_get_return_address+0x4d/0x90 [ 79.033869][ T1730] ? bpf_get_btf_vmlinux+0x60/0x60 [ 79.039361][ T1730] ? arch_stack_walk+0xf3/0x140 [ 79.045071][ T1730] ? stack_trace_save+0x113/0x1c0 [ 79.054187][ T1730] ? stack_trace_snprint+0xf0/0xf0 [ 79.061911][ T1730] ? stack_trace_snprint+0xf0/0xf0 [ 79.071461][ T1730] ? __stack_depot_save+0x34/0x470 [ 79.077079][ T1730] ? ____kasan_kmalloc+0xed/0x110 [ 79.085651][ T1730] ? ____kasan_kmalloc+0xdb/0x110 [ 79.093681][ T1730] ? __kasan_kmalloc+0x9/0x10 [ 79.098883][ T1730] ? kmem_cache_alloc_trace+0x115/0x210 [ 79.104479][ T1730] ? selinux_bpf_prog_alloc+0x51/0x140 [ 79.110029][ T1730] ? security_bpf_prog_alloc+0x62/0x90 [ 79.127196][ T1730] ? bpf_prog_load+0x9ee/0x1b50 [ 79.133363][ T1730] ? __sys_bpf+0x4bc/0x760 [ 79.140893][ T1730] ? __x64_sys_bpf+0x7c/0x90 [ 79.145634][ T1730] ? x64_sys_call+0x87f/0x9a0 [ 79.151275][ T1730] ? do_syscall_64+0x3b/0xb0 [ 79.159854][ T1730] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 79.167037][ T1730] ? __kasan_kmalloc+0x9/0x10 [ 79.172269][ T1730] ? memset+0x35/0x40 [ 79.178413][ T1730] ? bpf_obj_name_cpy+0x196/0x1e0 [ 79.184495][ T1730] bpf_prog_load+0x12ac/0x1b50 [ 79.195596][ T1730] ? map_freeze+0x370/0x370 [ 79.204543][ T1730] ? selinux_bpf+0xcb/0x100 [ 79.213566][ T1730] ? security_bpf+0x82/0xb0 [ 79.717079][ T1730] __sys_bpf+0x4bc/0x760 [ 79.723773][ T1730] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 79.734108][ T1730] ? __kasan_check_write+0x14/0x20 [ 79.742516][ T1730] ? switch_fpu_return+0x15f/0x2e0 [ 79.954837][ T1730] __x64_sys_bpf+0x7c/0x90 [ 80.062656][ T1730] x64_sys_call+0x87f/0x9a0 [ 80.229296][ T1730] do_syscall_64+0x3b/0xb0 [ 80.424916][ T1730] ? clear_bhb_loop+0x35/0x90 [ 80.462759][ T1730] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 80.539354][ T1730] RIP: 0033:0x7f2ba22b7759 [ 80.748072][ T1730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.890080][ T1814] device syzkaller0 entered promiscuous mode [ 80.940997][ T1730] RSP: 002b:00007f2ba0f30038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 81.124465][ T1730] RAX: ffffffffffffffda RBX: 00007f2ba246ef80 RCX: 00007f2ba22b7759 [ 81.227525][ T1730] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 81.348996][ T1730] RBP: 00007f2ba232a75e R08: 0000000000000000 R09: 0000000000000000 [ 81.362067][ T1730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 81.378157][ T1730] R13: 0000000000000000 R14: 00007f2ba246ef80 R15: 00007fffa7ac52b8 [ 81.404292][ T1730] [ 81.408372][ T1730] ---[ end trace e521fb8df6711eb4 ]--- [ 82.594689][ T1845] device syzkaller0 entered promiscuous mode [ 82.729936][ T1856] device wg2 entered promiscuous mode [ 83.155210][ T1870] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 84.424356][ T1885] €Â0: renamed from pim6reg1 [ 84.456848][ T1896] device pim6reg1 entered promiscuous mode [ 84.478350][ T30] audit: type=1400 audit(1732010647.649:137): avc: denied { create } for pid=1898 comm="syz.3.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 84.953741][ T1899] device veth0_vlan left promiscuous mode [ 84.975158][ T1912] syz.4.420[1912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.975229][ T1912] syz.4.420[1912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.016698][ T1899] device veth0_vlan entered promiscuous mode [ 85.233719][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.287190][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.462203][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.493248][ T1918] device wg2 entered promiscuous mode [ 86.577940][ T1937] device syzkaller0 entered promiscuous mode [ 87.905077][ T1984] device syzkaller0 entered promiscuous mode [ 88.287143][ T1995] device syzkaller0 entered promiscuous mode [ 88.589486][ T2003] device syzkaller0 entered promiscuous mode [ 88.624084][ T2003] syzkaller0: tun_net_xmit 1280 [ 88.632382][ T2003] syzkaller0: create flow: hash 2272832413 index 1 [ 88.651032][ T30] audit: type=1400 audit(1732010651.819:138): avc: denied { create } for pid=2005 comm="syz.1.447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 88.716145][ T2001] syzkaller0: delete flow: hash 2272832413 index 1 [ 89.700237][ T2043] device syzkaller0 entered promiscuous mode [ 89.786430][ T30] audit: type=1400 audit(1732010652.949:139): avc: denied { create } for pid=2058 comm="syz.4.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 90.453148][ T2078] bond_slave_1: mtu less than device minimum [ 90.598587][ T2081] ªªªªªª: renamed from vlan0 [ 91.166873][ T2105] device sit0 left promiscuous mode [ 91.445364][ T30] audit: type=1400 audit(1732010654.619:140): avc: denied { ioctl } for pid=2120 comm="syz.0.481" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 91.546488][ T2112] device syzkaller0 entered promiscuous mode [ 91.799168][ T2137] FAULT_INJECTION: forcing a failure. [ 91.799168][ T2137] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 91.884514][ T2137] CPU: 1 PID: 2137 Comm: syz.4.484 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 91.903976][ T2137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 91.918929][ T2137] Call Trace: [ 91.924127][ T2137] [ 91.928444][ T2137] dump_stack_lvl+0x151/0x1c0 [ 91.934885][ T2137] ? io_uring_drop_tctx_refs+0x190/0x190 [ 91.943214][ T2137] dump_stack+0x15/0x20 [ 91.952717][ T2137] should_fail+0x3c6/0x510 [ 91.958004][ T2137] should_fail_usercopy+0x1a/0x20 [ 91.964928][ T2137] _copy_from_user+0x20/0xd0 [ 91.972063][ T2137] __sys_bpf+0x1e9/0x760 [ 91.976838][ T2137] ? fput_many+0x160/0x1b0 [ 91.984118][ T2137] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 91.989869][ T2137] ? debug_smp_processor_id+0x17/0x20 [ 91.997686][ T2137] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 92.005146][ T2137] __x64_sys_bpf+0x7c/0x90 [ 92.012826][ T2137] x64_sys_call+0x87f/0x9a0 [ 92.018718][ T2137] do_syscall_64+0x3b/0xb0 [ 92.023871][ T2137] ? clear_bhb_loop+0x35/0x90 [ 92.028894][ T2137] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 92.037290][ T2137] RIP: 0033:0x7f173920e759 [ 92.043992][ T2137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.070598][ T2137] RSP: 002b:00007f1737e66038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 92.082485][ T2137] RAX: ffffffffffffffda RBX: 00007f17393c6058 RCX: 00007f173920e759 [ 92.091638][ T2137] RDX: 0000000000000020 RSI: 00000000200002c0 RDI: 0000000000000004 [ 92.103147][ T2137] RBP: 00007f1737e66090 R08: 0000000000000000 R09: 0000000000000000 [ 92.114644][ T2137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.125241][ T2137] R13: 0000000000000001 R14: 00007f17393c6058 R15: 00007ffefc727d38 [ 92.134382][ T2137] [ 92.200572][ T2144] device wg2 left promiscuous mode [ 92.228966][ T2144] device wg2 entered promiscuous mode [ 93.228240][ T2184] device syzkaller0 entered promiscuous mode [ 93.285532][ T2179] device pim6reg1 entered promiscuous mode [ 93.714658][ T2193] FAULT_INJECTION: forcing a failure. [ 93.714658][ T2193] name failslab, interval 1, probability 0, space 0, times 1 [ 93.730047][ T2200] device wg2 entered promiscuous mode [ 93.944044][ T2193] CPU: 1 PID: 2193 Comm: syz.1.501 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 93.958333][ T2193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 93.971690][ T2193] Call Trace: [ 93.977638][ T2193] [ 93.983136][ T2193] dump_stack_lvl+0x151/0x1c0 [ 93.989590][ T2193] ? io_uring_drop_tctx_refs+0x190/0x190 [ 93.996993][ T2193] dump_stack+0x15/0x20 [ 94.001244][ T2193] should_fail+0x3c6/0x510 [ 94.008113][ T2193] __should_failslab+0xa4/0xe0 [ 94.013223][ T2193] should_failslab+0x9/0x20 [ 94.019721][ T2193] slab_pre_alloc_hook+0x37/0xd0 [ 94.026675][ T2193] __kmalloc+0x6d/0x270 [ 94.032004][ T2193] ? kvmalloc_node+0x1f0/0x4d0 [ 94.039797][ T2193] kvmalloc_node+0x1f0/0x4d0 [ 94.044990][ T2193] ? vm_mmap+0xb0/0xb0 [ 94.050546][ T2193] vmemdup_user+0x26/0xe0 [ 94.055972][ T2193] map_get_next_key+0x21c/0x4e0 [ 94.061110][ T2193] __sys_bpf+0x389/0x760 [ 94.065890][ T2193] ? fput_many+0x160/0x1b0 [ 94.070751][ T2193] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 94.078201][ T2193] ? debug_smp_processor_id+0x17/0x20 [ 94.084577][ T2193] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 94.091069][ T2193] __x64_sys_bpf+0x7c/0x90 [ 94.096790][ T2193] x64_sys_call+0x87f/0x9a0 [ 94.101692][ T2193] do_syscall_64+0x3b/0xb0 [ 94.107017][ T2193] ? clear_bhb_loop+0x35/0x90 [ 94.112229][ T2193] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 94.118990][ T2193] RIP: 0033:0x7f2ba22b7759 [ 94.126305][ T2193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.149606][ T2193] RSP: 002b:00007f2ba0f30038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 94.159913][ T2193] RAX: ffffffffffffffda RBX: 00007f2ba246ef80 RCX: 00007f2ba22b7759 [ 94.169008][ T2193] RDX: 0000000000000020 RSI: 00000000200002c0 RDI: 0000000000000004 [ 94.180060][ T2193] RBP: 00007f2ba0f30090 R08: 0000000000000000 R09: 0000000000000000 [ 94.192954][ T2193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.202048][ T2193] R13: 0000000000000000 R14: 00007f2ba246ef80 R15: 00007fffa7ac52b8 [ 94.210287][ T2193] [ 94.483616][ T2214] device wg2 left promiscuous mode [ 94.562670][ T2217] device syzkaller0 entered promiscuous mode [ 94.580097][ T2214] device erspan0 entered promiscuous mode [ 94.810708][ T2218] device pim6reg1 entered promiscuous mode [ 95.694869][ T2254] device pim6reg1 entered promiscuous mode [ 95.851821][ T2257] Â: renamed from pim6reg1 [ 96.179444][ T2270] device syzkaller0 entered promiscuous mode [ 97.081664][ T2290] device wg2 left promiscuous mode [ 97.720692][ T2328] device syzkaller0 entered promiscuous mode [ 98.610159][ T2358] device wg2 left promiscuous mode [ 98.640850][ T2359] device wg2 entered promiscuous mode [ 99.575245][ T2375] device pim6reg1 entered promiscuous mode [ 99.921425][ T2380] device syzkaller0 entered promiscuous mode [ 100.506246][ T2405] device pim6reg1 entered promiscuous mode [ 101.093623][ T2422] device veth1_macvtap left promiscuous mode [ 101.251318][ T2426] device veth1_macvtap entered promiscuous mode [ 101.349457][ T2426] device macsec0 entered promiscuous mode [ 101.391036][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 101.717681][ T2435] device syzkaller0 entered promiscuous mode [ 102.487573][ T2452] device syzkaller0 entered promiscuous mode [ 102.947352][ T2478] device syzkaller0 entered promiscuous mode [ 104.627910][ T2514] device syzkaller0 entered promiscuous mode [ 105.121484][ T2527] device syzkaller0 entered promiscuous mode [ 105.182880][ T2535] device wg2 entered promiscuous mode [ 105.822116][ T30] audit: type=1400 audit(1732010668.989:141): avc: denied { create } for pid=2554 comm="syz.1.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 106.990460][ T2570] device macsec0 entered promiscuous mode [ 108.040386][ T2598] device wg2 left promiscuous mode [ 108.337046][ T2598] device wg2 entered promiscuous mode [ 108.596263][ T2612] device wg2 left promiscuous mode [ 108.802120][ T2612] device wg2 entered promiscuous mode [ 109.375656][ T30] audit: type=1400 audit(1732010672.549:142): avc: denied { read write } for pid=2613 comm="syz.0.616" name="cgroup.subtree_control" dev="cgroup2" ino=587 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 109.581294][ T30] audit: type=1400 audit(1732010672.569:143): avc: denied { open } for pid=2613 comm="syz.0.616" path="" dev="cgroup2" ino=587 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 109.923900][ T2635] device syzkaller0 entered promiscuous mode [ 110.063639][ T2645] device syzkaller0 entered promiscuous mode [ 110.912401][ T2678] device pim6reg1 entered promiscuous mode [ 110.979022][ T2681] device syzkaller0 entered promiscuous mode [ 111.229449][ T2685] device syzkaller0 entered promiscuous mode [ 114.455151][ T2742] device syzkaller0 entered promiscuous mode [ 115.320072][ T2769] device wg2 left promiscuous mode [ 115.480808][ T2755] device wg2 entered promiscuous mode [ 116.707445][ T2797] device syzkaller0 entered promiscuous mode [ 118.245989][ T2843] device syzkaller0 entered promiscuous mode [ 119.078436][ T2860] device syzkaller0 entered promiscuous mode [ 119.580160][ T30] audit: type=1400 audit(1732010682.749:144): avc: denied { create } for pid=2870 comm="syz.0.684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 119.924150][ T2883] device veth0_vlan left promiscuous mode [ 120.000381][ T2883] device veth0_vlan entered promiscuous mode [ 120.172090][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.189415][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 120.198919][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.382023][ T2887] device syzkaller0 entered promiscuous mode [ 121.165369][ T2921] device wg2 left promiscuous mode [ 122.012659][ T2950] device syzkaller0 entered promiscuous mode [ 122.055908][ T2953] device wg2 left promiscuous mode [ 122.274220][ T2953] device wg2 entered promiscuous mode [ 122.483354][ T30] audit: type=1400 audit(1732010685.649:145): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 122.563349][ T30] audit: type=1400 audit(1732010685.649:146): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 122.572701][ T2963] device syzkaller0 entered promiscuous mode [ 123.680563][ T2997] device syzkaller0 entered promiscuous mode [ 124.400636][ T3022] device sit0 left promiscuous mode [ 124.425509][ T3018] device syzkaller0 entered promiscuous mode [ 124.452212][ T3022] device sit0 entered promiscuous mode [ 126.679228][ T3077] device syzkaller0 entered promiscuous mode [ 126.696798][ T3084] device pim6reg1 entered promiscuous mode [ 128.401947][ T3111] device wg2 left promiscuous mode [ 130.770546][ T3151] device wg2 left promiscuous mode [ 130.804730][ T3157] syz.1.761[3157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.804816][ T3157] syz.1.761[3157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.554368][ T30] audit: type=1400 audit(1732010694.729:147): avc: denied { create } for pid=3167 comm="syz.0.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 131.816251][ T3177] device syzkaller0 entered promiscuous mode [ 131.867579][ T3180] device sit0 entered promiscuous mode [ 134.195846][ T3213] device pim6reg1 entered promiscuous mode [ 134.993038][ T3235] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 135.179259][ T3235] device syzkaller0 entered promiscuous mode [ 135.342177][ T3255] device syzkaller0 entered promiscuous mode [ 138.088314][ T3305] device syzkaller0 entered promiscuous mode [ 140.491088][ T3395] device syzkaller0 entered promiscuous mode [ 140.894553][ T3404] device veth1_macvtap entered promiscuous mode [ 140.908137][ T3404] device macsec0 entered promiscuous mode [ 140.954974][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 142.825598][ T3448] device syzkaller0 entered promiscuous mode [ 143.376929][ T3473] device syzkaller0 entered promiscuous mode [ 143.895175][ T3502] device syzkaller0 entered promiscuous mode [ 144.251816][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.282997][ T3518] device sit0 entered promiscuous mode [ 144.661463][ T3534] ref_ctr_offset mismatch. inode: 0x3a2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 144.990729][ T3543] bond_slave_1: mtu less than device minimum [ 144.997470][ T3544] bond_slave_1: mtu less than device minimum [ 145.450406][ T3559] device syzkaller0 entered promiscuous mode [ 146.229093][ T3617] device syzkaller0 entered promiscuous mode [ 146.939845][ T3691] device veth0_vlan left promiscuous mode [ 146.968233][ T3691] device veth0_vlan entered promiscuous mode [ 147.061223][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.070360][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 147.079618][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.489447][ T3707] device syzkaller0 entered promiscuous mode [ 147.971529][ T3705] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 148.283538][ T3705] device syzkaller0 entered promiscuous mode [ 148.810400][ T3752] device syzkaller0 entered promiscuous mode [ 149.875165][ T3786] device veth0_vlan left promiscuous mode [ 149.979624][ T3786] device veth0_vlan entered promiscuous mode [ 150.131815][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.167284][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.224401][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 150.465305][ T3799] device syzkaller0 entered promiscuous mode [ 150.979049][ T30] audit: type=1400 audit(1732010714.139:148): avc: denied { create } for pid=3822 comm="syz.0.930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 151.535899][ T3850] device syzkaller0 entered promiscuous mode [ 152.342497][ T3881] bond_slave_1: mtu less than device minimum [ 152.800054][ T3886] device syzkaller0 entered promiscuous mode [ 153.122479][ T3898] device syzkaller0 entered promiscuous mode [ 153.237364][ T3907] device syzkaller0 entered promiscuous mode [ 153.327745][ T3909] device sit0 entered promiscuous mode [ 153.681652][ T101] udevd[101]: worker [316] terminated by signal 33 (Unknown signal 33) [ 153.745060][ T101] udevd[101]: worker [316] failed while handling '/devices/virtual/block/loop4' [ 155.272513][ T3960] device syzkaller0 entered promiscuous mode [ 155.637611][ T3976] device syzkaller0 entered promiscuous mode [ 157.449258][ T4013] device syzkaller0 entered promiscuous mode [ 157.776913][ T4015] device veth0_vlan left promiscuous mode [ 157.857154][ T4015] device veth0_vlan entered promiscuous mode [ 157.950187][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.015828][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.142819][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.457906][ T30] audit: type=1400 audit(1732010721.629:149): avc: denied { append } for pid=4035 comm="syz.1.986" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 158.950382][ T30] audit: type=1400 audit(1732010722.119:150): avc: denied { create } for pid=4055 comm="syz.2.994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 159.142586][ T4053] device veth0_vlan left promiscuous mode [ 159.233154][ T4053] device veth0_vlan entered promiscuous mode [ 159.386706][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.426494][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 159.614446][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.848606][ T4066] device syzkaller0 entered promiscuous mode [ 162.555462][ T4165] device pim6reg1 entered promiscuous mode [ 163.394192][ T30] audit: type=1400 audit(1732010726.569:151): avc: denied { create } for pid=4188 comm="syz.2.1029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 163.550985][ T30] audit: type=1400 audit(1732010726.589:152): avc: denied { create } for pid=4188 comm="syz.2.1029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 163.583047][ T4192] device pim6reg1 entered promiscuous mode [ 164.627281][ T30] audit: type=1400 audit(1732010727.799:153): avc: denied { append } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 165.840321][ T30] audit: type=1400 audit(1732010727.799:154): avc: denied { open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 165.983310][ T30] audit: type=1400 audit(1732010727.799:155): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 167.807579][ T4260] device pim6reg1 entered promiscuous mode [ 169.088462][ T4346] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.095724][ T4346] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.237184][ T4346] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.244090][ T4346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.251221][ T4346] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.258111][ T4346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.358087][ T4346] device bridge0 entered promiscuous mode [ 170.204149][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.500035][ T4378] device syzkaller0 entered promiscuous mode [ 171.434266][ T30] audit: type=1400 audit(1732010734.599:156): avc: denied { tracepoint } for pid=4411 comm="syz.1.1094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 171.912882][ T4428] device sit0 left promiscuous mode [ 172.020446][ T30] audit: type=1400 audit(1732010735.189:157): avc: denied { ioctl } for pid=4433 comm="syz.4.1100" path="socket:[26417]" dev="sockfs" ino=26417 ioctlcmd=0x8929 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 172.072166][ T4432] device sit0 entered promiscuous mode [ 172.297339][ T4441] device wg2 entered promiscuous mode [ 174.487717][ T4513] device syzkaller0 entered promiscuous mode [ 175.110155][ T4527] device pim6reg1 entered promiscuous mode [ 176.024390][ T4537] device syzkaller0 entered promiscuous mode [ 176.129841][ T4539] device syzkaller0 entered promiscuous mode [ 176.135946][ T4550] FAULT_INJECTION: forcing a failure. [ 176.135946][ T4550] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 176.315403][ T4550] CPU: 1 PID: 4550 Comm: syz.4.1127 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 176.329550][ T4550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 176.343851][ T4550] Call Trace: [ 176.347564][ T4550] [ 176.350340][ T4550] dump_stack_lvl+0x151/0x1c0 [ 176.355021][ T4550] ? io_uring_drop_tctx_refs+0x190/0x190 [ 176.360977][ T4550] ? __wake_up_klogd+0xd5/0x110 [ 176.366067][ T4550] dump_stack+0x15/0x20 [ 176.370089][ T4550] should_fail+0x3c6/0x510 [ 176.375731][ T4550] should_fail_usercopy+0x1a/0x20 [ 176.380667][ T4550] _copy_from_iter+0x22f/0xdc0 [ 176.385963][ T4550] ? copy_mc_pipe_to_iter+0x760/0x760 [ 176.391180][ T4550] ? pskb_expand_head+0x37c/0x1240 [ 176.396197][ T4550] ? kfree+0xc8/0x220 [ 176.400029][ T4550] ? __check_object_size+0x2ec/0x3d0 [ 176.405138][ T4550] skb_copy_datagram_from_iter+0x100/0x6d0 [ 176.411305][ T4550] tun_get_user+0x112d/0x3aa0 [ 176.416337][ T4550] ? __x64_sys_openat+0x211/0x290 [ 176.421474][ T4550] ? _kstrtoull+0x3a0/0x4a0 [ 176.426673][ T4550] ? tun_do_read+0x2010/0x2010 [ 176.431347][ T4550] ? kstrtouint_from_user+0x20a/0x2a0 [ 176.436557][ T4550] ? kstrtol_from_user+0x310/0x310 [ 176.441521][ T4550] ? avc_policy_seqno+0x1b/0x70 [ 176.446370][ T4550] ? selinux_file_permission+0x2c4/0x570 [ 176.452597][ T4550] tun_chr_write_iter+0x1e1/0x2e0 [ 176.458169][ T4550] vfs_write+0xd5d/0x1110 [ 176.462415][ T4550] ? file_end_write+0x1c0/0x1c0 [ 176.467099][ T4550] ? __fdget_pos+0x209/0x3a0 [ 176.471521][ T4550] ? ksys_write+0x77/0x2c0 [ 176.475781][ T4550] ksys_write+0x199/0x2c0 [ 176.479942][ T4550] ? exc_page_fault+0x47a/0x7f0 [ 176.485156][ T4550] ? __ia32_sys_read+0x90/0x90 [ 176.489753][ T4550] ? debug_smp_processor_id+0x17/0x20 [ 176.495043][ T4550] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 176.500957][ T4550] __x64_sys_write+0x7b/0x90 [ 176.505978][ T4550] x64_sys_call+0x2f/0x9a0 [ 176.510403][ T4550] do_syscall_64+0x3b/0xb0 [ 176.514657][ T4550] ? clear_bhb_loop+0x35/0x90 [ 176.519175][ T4550] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 176.524986][ T4550] RIP: 0033:0x7f173920e759 [ 176.529240][ T4550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.549288][ T4550] RSP: 002b:00007f1737e66038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 176.557532][ T4550] RAX: ffffffffffffffda RBX: 00007f17393c6058 RCX: 00007f173920e759 [ 176.565432][ T4550] RDX: 000000000000fdef RSI: 0000000020000380 RDI: 0000000000000003 [ 176.573849][ T4550] RBP: 00007f1737e66090 R08: 0000000000000000 R09: 0000000000000000 [ 176.582008][ T4550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.590436][ T4550] R13: 0000000000000001 R14: 00007f17393c6058 R15: 00007ffefc727d38 [ 176.598850][ T4550] [ 177.041024][ T30] audit: type=1400 audit(1732010740.209:158): avc: denied { create } for pid=4566 comm="syz.2.1136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 177.063478][ T4561] device syzkaller0 entered promiscuous mode [ 177.982843][ T4624] device syzkaller0 entered promiscuous mode [ 178.897183][ T4635] device syzkaller0 entered promiscuous mode [ 179.331157][ T4668] device veth1_macvtap left promiscuous mode [ 179.348742][ T4668] device macsec0 left promiscuous mode [ 179.613463][ T4665] device syzkaller0 entered promiscuous mode [ 179.625740][ T4668] device veth1_macvtap entered promiscuous mode [ 179.631856][ T4668] device macsec0 entered promiscuous mode [ 179.709600][ T4680] device syzkaller0 entered promiscuous mode [ 180.426714][ T4692] device veth1_macvtap left promiscuous mode [ 180.516418][ T4695] device veth1_macvtap entered promiscuous mode [ 180.594543][ T4695] device macsec0 entered promiscuous mode [ 181.482420][ T4718] device pim6reg1 entered promiscuous mode [ 181.656170][ T4725] device syzkaller0 entered promiscuous mode [ 181.786862][ T4732] device veth1_macvtap left promiscuous mode [ 181.792800][ T4732] device macsec0 left promiscuous mode [ 181.813247][ T4723] bridge0: port 3(veth0_to_batadv) entered blocking state [ 181.823160][ T4723] bridge0: port 3(veth0_to_batadv) entered disabled state [ 181.875357][ T4723] device veth0_to_batadv entered promiscuous mode [ 181.904583][ T4723] bridge0: port 3(veth0_to_batadv) entered blocking state [ 181.915623][ T4723] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 182.017218][ T4738] device pim6reg1 entered promiscuous mode [ 182.557021][ T4770] bond_slave_1: mtu less than device minimum [ 182.915669][ T4779] device pim6reg1 entered promiscuous mode [ 183.157286][ T4788] device syzkaller0 entered promiscuous mode [ 183.270648][ T4792] device syzkaller0 entered promiscuous mode [ 183.279317][ T4792] FAULT_INJECTION: forcing a failure. [ 183.279317][ T4792] name failslab, interval 1, probability 0, space 0, times 0 [ 183.291907][ T4792] CPU: 0 PID: 4792 Comm: syz.0.1200 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 183.305134][ T4792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 183.315374][ T4792] Call Trace: [ 183.318593][ T4792] [ 183.321362][ T4792] dump_stack_lvl+0x151/0x1c0 [ 183.326026][ T4792] ? io_uring_drop_tctx_refs+0x190/0x190 [ 183.331838][ T4792] dump_stack+0x15/0x20 [ 183.335825][ T4792] should_fail+0x3c6/0x510 [ 183.340685][ T4792] __should_failslab+0xa4/0xe0 [ 183.345592][ T4792] should_failslab+0x9/0x20 [ 183.349886][ T4792] slab_pre_alloc_hook+0x37/0xd0 [ 183.355119][ T4792] ? __napi_alloc_skb+0x167/0x2e0 [ 183.360585][ T4792] __kmalloc_track_caller+0x6c/0x260 [ 183.367698][ T4792] ? __napi_alloc_skb+0x167/0x2e0 [ 183.372631][ T4792] ? __napi_alloc_skb+0x167/0x2e0 [ 183.378790][ T4792] __alloc_skb+0x10c/0x550 [ 183.383650][ T4792] __napi_alloc_skb+0x167/0x2e0 [ 183.388435][ T4792] napi_get_frags+0x6a/0x170 [ 183.393120][ T4792] tun_get_user+0xd85/0x3aa0 [ 183.398224][ T4792] ? bpf_snprintf+0xa1/0x260 [ 183.403474][ T4792] ? _kstrtoull+0x3a0/0x4a0 [ 183.409016][ T4792] ? tun_do_read+0x2010/0x2010 [ 183.413606][ T4792] ? kstrtouint_from_user+0x20a/0x2a0 [ 183.420046][ T4792] ? kstrtol_from_user+0x310/0x310 [ 183.424985][ T4792] ? avc_policy_seqno+0x1b/0x70 [ 183.429754][ T4792] ? selinux_file_permission+0x2c4/0x570 [ 183.435317][ T4792] tun_chr_write_iter+0x1e1/0x2e0 [ 183.440173][ T4792] vfs_write+0xd5d/0x1110 [ 183.444337][ T4792] ? __traceiter_kmem_cache_free+0x32/0x50 [ 183.449982][ T4792] ? file_end_write+0x1c0/0x1c0 [ 183.454805][ T4792] ? __fdget_pos+0x209/0x3a0 [ 183.459221][ T4792] ? ksys_write+0x77/0x2c0 [ 183.463478][ T4792] ksys_write+0x199/0x2c0 [ 183.467647][ T4792] ? __ia32_sys_read+0x90/0x90 [ 183.472500][ T4792] ? debug_smp_processor_id+0x17/0x20 [ 183.477715][ T4792] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 183.483607][ T4792] __x64_sys_write+0x7b/0x90 [ 183.488131][ T4792] x64_sys_call+0x2f/0x9a0 [ 183.492376][ T4792] do_syscall_64+0x3b/0xb0 [ 183.497143][ T4792] ? clear_bhb_loop+0x35/0x90 [ 183.502473][ T4792] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 183.508358][ T4792] RIP: 0033:0x7f3e1113f759 [ 183.512609][ T4792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 183.533302][ T4792] RSP: 002b:00007f3e0fdb8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 183.543841][ T4792] RAX: ffffffffffffffda RBX: 00007f3e112f6f80 RCX: 00007f3e1113f759 [ 183.553109][ T4792] RDX: 000000000000fdef RSI: 0000000020000380 RDI: 0000000000000003 [ 183.563037][ T4792] RBP: 00007f3e0fdb8090 R08: 0000000000000000 R09: 0000000000000000 [ 183.571565][ T4792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 183.580312][ T4792] R13: 0000000000000000 R14: 00007f3e112f6f80 R15: 00007fff38eaded8 [ 183.591786][ T4792] [ 183.714249][ T4797] device syzkaller0 entered promiscuous mode [ 186.403575][ T4908] Â: renamed from pim6reg1 [ 187.397879][ T4934] device syzkaller0 entered promiscuous mode [ 187.483198][ T4939] FAULT_INJECTION: forcing a failure. [ 187.483198][ T4939] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 187.636915][ T4939] CPU: 0 PID: 4939 Comm: syz.0.1241 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 187.648525][ T4939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 187.658677][ T4939] Call Trace: [ 187.661797][ T4939] [ 187.664577][ T4939] dump_stack_lvl+0x151/0x1c0 [ 187.669262][ T4939] ? io_uring_drop_tctx_refs+0x190/0x190 [ 187.674836][ T4939] dump_stack+0x15/0x20 [ 187.678812][ T4939] should_fail+0x3c6/0x510 [ 187.683583][ T4939] should_fail_usercopy+0x1a/0x20 [ 187.688530][ T4939] _copy_from_iter+0x22f/0xdc0 [ 187.693233][ T4939] ? copy_mc_pipe_to_iter+0x760/0x760 [ 187.698598][ T4939] ? pskb_expand_head+0x37c/0x1240 [ 187.703632][ T4939] ? kfree+0xc8/0x220 [ 187.707472][ T4939] ? __check_object_size+0x2ec/0x3d0 [ 187.712679][ T4939] skb_copy_datagram_from_iter+0x100/0x6d0 [ 187.718402][ T4939] tun_get_user+0x112d/0x3aa0 [ 187.723440][ T4939] ? __x64_sys_openat+0x211/0x290 [ 187.728317][ T4939] ? _kstrtoull+0x3a0/0x4a0 [ 187.733538][ T4939] ? tun_do_read+0x2010/0x2010 [ 187.738202][ T4939] ? kstrtouint_from_user+0x20a/0x2a0 [ 187.743761][ T4939] ? kstrtol_from_user+0x310/0x310 [ 187.748706][ T4939] ? avc_policy_seqno+0x1b/0x70 [ 187.754774][ T4939] ? selinux_file_permission+0x2c4/0x570 [ 187.760331][ T4939] tun_chr_write_iter+0x1e1/0x2e0 [ 187.765358][ T4939] vfs_write+0xd5d/0x1110 [ 187.769501][ T4939] ? file_end_write+0x1c0/0x1c0 [ 187.775231][ T4939] ? __fdget_pos+0x209/0x3a0 [ 187.779665][ T4939] ? ksys_write+0x77/0x2c0 [ 187.783906][ T4939] ksys_write+0x199/0x2c0 [ 187.788156][ T4939] ? exc_page_fault+0x47a/0x7f0 [ 187.792846][ T4939] ? __ia32_sys_read+0x90/0x90 [ 187.797444][ T4939] ? debug_smp_processor_id+0x17/0x20 [ 187.802651][ T4939] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 187.808648][ T4939] __x64_sys_write+0x7b/0x90 [ 187.813066][ T4939] x64_sys_call+0x2f/0x9a0 [ 187.817315][ T4939] do_syscall_64+0x3b/0xb0 [ 187.822106][ T4939] ? clear_bhb_loop+0x35/0x90 [ 187.826603][ T4939] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 187.832346][ T4939] RIP: 0033:0x7f3e1113f759 [ 187.837804][ T4939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 187.857329][ T4939] RSP: 002b:00007f3e0fd97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 187.865661][ T4939] RAX: ffffffffffffffda RBX: 00007f3e112f7058 RCX: 00007f3e1113f759 [ 187.873511][ T4939] RDX: 000000000000fdef RSI: 0000000020000380 RDI: 0000000000000003 [ 187.881279][ T4939] RBP: 00007f3e0fd97090 R08: 0000000000000000 R09: 0000000000000000 [ 187.889091][ T4939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 187.897335][ T4939] R13: 0000000000000001 R14: 00007f3e112f7058 R15: 00007fff38eaded8 [ 187.905944][ T4939] [ 190.524857][ T4999] bridge0: port 3(veth0_to_batadv) entered disabled state [ 190.532293][ T4999] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.030793][ T5000] bridge0: port 3(veth0_to_batadv) entered blocking state [ 191.037801][ T5000] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 191.045619][ T5000] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.053075][ T5000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.480210][ T5000] device bridge0 entered promiscuous mode [ 191.588367][ T5022] FAULT_INJECTION: forcing a failure. [ 191.588367][ T5022] name failslab, interval 1, probability 0, space 0, times 0 [ 191.611498][ T5022] CPU: 0 PID: 5022 Comm: syz.1.1264 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 191.626597][ T5022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 191.643063][ T5022] Call Trace: [ 191.648373][ T5022] [ 191.651128][ T5022] dump_stack_lvl+0x151/0x1c0 [ 191.656257][ T5022] ? io_uring_drop_tctx_refs+0x190/0x190 [ 191.662776][ T5022] dump_stack+0x15/0x20 [ 191.667315][ T5022] should_fail+0x3c6/0x510 [ 191.671885][ T5022] __should_failslab+0xa4/0xe0 [ 191.678256][ T5022] should_failslab+0x9/0x20 [ 191.683770][ T5022] slab_pre_alloc_hook+0x37/0xd0 [ 191.692650][ T5022] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 191.698311][ T5022] __kmalloc_track_caller+0x6c/0x260 [ 191.706091][ T5022] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 191.713817][ T5022] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 191.719124][ T5022] __alloc_skb+0x10c/0x550 [ 191.725295][ T5022] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 191.730626][ T5022] rtnetlink_event+0xf3/0x1b0 [ 191.736399][ T5022] raw_notifier_call_chain+0x8c/0xf0 [ 191.742616][ T5022] dev_set_mac_address+0x325/0x470 [ 191.748348][ T5022] ? dev_pre_changeaddr_notify+0x220/0x220 [ 191.754940][ T5022] dev_set_mac_address_user+0x31/0x50 [ 191.763020][ T5022] dev_ifsioc+0x7ef/0x10c0 [ 191.767310][ T5022] ? dev_ioctl+0xe70/0xe70 [ 191.773863][ T5022] ? mutex_lock+0x135/0x1e0 [ 191.781061][ T5022] ? wait_for_completion_killable_timeout+0x10/0x10 [ 191.792365][ T5022] dev_ioctl+0x54d/0xe70 [ 191.797794][ T5022] sock_do_ioctl+0x34f/0x5a0 [ 191.803799][ T5022] ? sock_show_fdinfo+0xa0/0xa0 [ 191.809719][ T5022] ? selinux_file_ioctl+0x3cc/0x540 [ 191.820447][ T5022] sock_ioctl+0x455/0x740 [ 191.825559][ T5022] ? sock_poll+0x400/0x400 [ 191.830082][ T5022] ? __fget_files+0x31e/0x380 [ 191.838583][ T5022] ? security_file_ioctl+0x84/0xb0 [ 191.844970][ T5022] ? sock_poll+0x400/0x400 [ 191.849457][ T5022] __se_sys_ioctl+0x114/0x190 [ 191.856644][ T5022] __x64_sys_ioctl+0x7b/0x90 [ 191.867311][ T5022] x64_sys_call+0x98/0x9a0 [ 191.872947][ T5022] do_syscall_64+0x3b/0xb0 [ 191.879807][ T5022] ? clear_bhb_loop+0x35/0x90 [ 191.887254][ T5022] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 191.894447][ T5022] RIP: 0033:0x7f2ba22b7759 [ 191.901789][ T5022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.927911][ T5022] RSP: 002b:00007f2ba0f30038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 191.939938][ T5022] RAX: ffffffffffffffda RBX: 00007f2ba246ef80 RCX: 00007f2ba22b7759 [ 191.950656][ T5022] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 191.963026][ T5022] RBP: 00007f2ba0f30090 R08: 0000000000000000 R09: 0000000000000000 [ 191.973683][ T5022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.986975][ T5022] R13: 0000000000000000 R14: 00007f2ba246ef80 R15: 00007fffa7ac52b8 [ 191.995965][ T5022] [ 193.746559][ T5082] syz.2.1283[5082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.746631][ T5082] syz.2.1283[5082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.462815][ T30] audit: type=1400 audit(1732010759.629:159): avc: denied { create } for pid=5199 comm="syz.4.1316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 197.227559][ T5236] : renamed from ipvlan1 [ 197.872517][ T101] udevd[101]: worker [3931] terminated by signal 33 (Unknown signal 33) [ 197.939394][ T101] udevd[101]: worker [3931] failed while handling '/devices/virtual/block/loop3' [ 198.278735][ T5281] syz.4.1342[5281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.278819][ T5281] syz.4.1342[5281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.369287][ T5293] device pim6reg1 entered promiscuous mode [ 199.407491][ T5310] device syzkaller0 entered promiscuous mode [ 200.127033][ T5340] device pim6reg1 entered promiscuous mode [ 200.210068][ T5340] device syzkaller0 entered promiscuous mode [ 200.689809][ T5379] device syzkaller0 entered promiscuous mode [ 202.352124][ T5432] device veth0_vlan left promiscuous mode [ 202.470219][ T5432] device veth0_vlan entered promiscuous mode [ 202.910567][ T5468] device pim6reg1 entered promiscuous mode [ 204.231673][ T5524] device veth0_vlan left promiscuous mode [ 204.334767][ T5524] device veth0_vlan entered promiscuous mode [ 204.914035][ T5549] device sit0 left promiscuous mode [ 204.954122][ T5549] device sit0 entered promiscuous mode [ 205.456859][ T5561] device sit0 left promiscuous mode [ 208.940692][ T5643] device pim6reg1 entered promiscuous mode [ 209.012795][ T5654] device sit0 left promiscuous mode [ 209.459213][ T5652] device veth0_vlan left promiscuous mode [ 209.483127][ T5652] device veth0_vlan entered promiscuous mode [ 209.533882][ T5657] device sit0 entered promiscuous mode [ 209.552736][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.566542][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 209.601803][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 210.183138][ T5696] device pim6reg1 entered promiscuous mode [ 210.998331][ T5722] ªªªªªª: renamed from vlan0 [ 211.505415][ T5761] device syzkaller0 entered promiscuous mode [ 213.697072][ T5840] device veth0_vlan left promiscuous mode [ 213.795313][ T5840] device veth0_vlan entered promiscuous mode [ 217.928096][ T5974] syz.3.1526[5974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.928169][ T5974] syz.3.1526[5974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.947866][ T5976] FAULT_INJECTION: forcing a failure. [ 217.947866][ T5976] name failslab, interval 1, probability 0, space 0, times 0 [ 218.112167][ T5976] CPU: 0 PID: 5976 Comm: syz.0.1525 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 218.123295][ T5976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 218.133189][ T5976] Call Trace: [ 218.136314][ T5976] [ 218.139090][ T5976] dump_stack_lvl+0x151/0x1c0 [ 218.143618][ T5976] ? io_uring_drop_tctx_refs+0x190/0x190 [ 218.149452][ T5976] ? avc_denied+0x1b0/0x1b0 [ 218.153935][ T5976] dump_stack+0x15/0x20 [ 218.157934][ T5976] should_fail+0x3c6/0x510 [ 218.162178][ T5976] __should_failslab+0xa4/0xe0 [ 218.166780][ T5976] ? __alloc_skb+0xbe/0x550 [ 218.171126][ T5976] should_failslab+0x9/0x20 [ 218.175543][ T5976] slab_pre_alloc_hook+0x37/0xd0 [ 218.180579][ T5976] ? __alloc_skb+0xbe/0x550 [ 218.184914][ T5976] kmem_cache_alloc+0x44/0x200 [ 218.189521][ T5976] __alloc_skb+0xbe/0x550 [ 218.193684][ T5976] alloc_skb_with_frags+0xa6/0x680 [ 218.198651][ T5976] ? 0xffffffffa0016000 [ 218.202998][ T5976] ? is_bpf_text_address+0x172/0x190 [ 218.208091][ T5976] sock_alloc_send_pskb+0x915/0xa50 [ 218.214169][ T5976] ? sock_kzfree_s+0x60/0x60 [ 218.218772][ T5976] ? stack_trace_save+0x113/0x1c0 [ 218.223651][ T5976] ? stack_trace_snprint+0xf0/0xf0 [ 218.228921][ T5976] tun_get_user+0xf1b/0x3aa0 [ 218.233871][ T5976] ? __x64_sys_openat+0x210/0x290 [ 218.238731][ T5976] ? x64_sys_call+0x6bf/0x9a0 [ 218.243243][ T5976] ? _kstrtoull+0x3a0/0x4a0 [ 218.247582][ T5976] ? tun_do_read+0x2010/0x2010 [ 218.252187][ T5976] ? kstrtouint_from_user+0x20a/0x2a0 [ 218.257472][ T5976] ? kstrtol_from_user+0x310/0x310 [ 218.262423][ T5976] ? avc_policy_seqno+0x1b/0x70 [ 218.267195][ T5976] ? selinux_file_permission+0x2c4/0x570 [ 218.272666][ T5976] tun_chr_write_iter+0x1e1/0x2e0 [ 218.277700][ T5976] vfs_write+0xd5d/0x1110 [ 218.281863][ T5976] ? putname+0xfa/0x150 [ 218.286118][ T5976] ? file_end_write+0x1c0/0x1c0 [ 218.290809][ T5976] ? __fdget_pos+0x209/0x3a0 [ 218.295227][ T5976] ? ksys_write+0x77/0x2c0 [ 218.299588][ T5976] ksys_write+0x199/0x2c0 [ 218.303734][ T5976] ? __ia32_sys_read+0x90/0x90 [ 218.308334][ T5976] ? debug_smp_processor_id+0x17/0x20 [ 218.313540][ T5976] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 218.319455][ T5976] __x64_sys_write+0x7b/0x90 [ 218.323876][ T5976] x64_sys_call+0x2f/0x9a0 [ 218.328817][ T5976] do_syscall_64+0x3b/0xb0 [ 218.333066][ T5976] ? clear_bhb_loop+0x35/0x90 [ 218.338014][ T5976] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 218.343751][ T5976] RIP: 0033:0x7f3e1113f759 [ 218.348002][ T5976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.367548][ T5976] RSP: 002b:00007f3e0fdb8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 218.375906][ T5976] RAX: ffffffffffffffda RBX: 00007f3e112f6f80 RCX: 00007f3e1113f759 [ 218.384239][ T5976] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 218.392200][ T5976] RBP: 00007f3e0fdb8090 R08: 0000000000000000 R09: 0000000000000000 [ 218.400015][ T5976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.408245][ T5976] R13: 0000000000000000 R14: 00007f3e112f6f80 R15: 00007fff38eaded8 [ 218.416059][ T5976] [ 219.495981][ T6036] device veth0_vlan left promiscuous mode [ 219.528254][ T6036] device veth0_vlan entered promiscuous mode [ 219.658368][ T6041] tap0: tun_chr_ioctl cmd 1074025677 [ 219.683444][ T6041] tap0: linktype set to 825 [ 219.741434][ T30] audit: type=1400 audit(1732010782.909:160): avc: denied { create } for pid=6048 comm="syz.3.1549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 220.404720][ T289] syz-executor (289) used greatest stack depth: 20688 bytes left [ 220.640533][ T6080] bond_slave_1: mtu less than device minimum [ 221.201950][ T6082] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.235115][ T6082] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.243420][ T6082] device bridge_slave_0 entered promiscuous mode [ 221.264523][ T6082] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.275794][ T6082] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.301453][ T6082] device bridge_slave_1 entered promiscuous mode [ 221.449143][ T335] device bridge_slave_1 left promiscuous mode [ 221.458316][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.468116][ T335] device bridge_slave_0 left promiscuous mode [ 221.475458][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.486645][ T335] device veth1_macvtap left promiscuous mode [ 221.493587][ T335] device veth0_vlan left promiscuous mode [ 221.629885][ T6082] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.638439][ T6082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.649904][ T6082] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.658803][ T6082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.739336][ T6145] device sit0 left promiscuous mode [ 221.937726][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.945668][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.963420][ T6154] device veth1_macvtap left promiscuous mode [ 222.037535][ T6155] device veth1_macvtap entered promiscuous mode [ 222.117920][ T6160] bridge0: port 3(veth0_to_batadv) entered disabled state [ 222.132598][ T6160] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.190287][ T6160] device bridge0 left promiscuous mode [ 222.340450][ T6173] device veth0_to_batadv left promiscuous mode [ 222.366976][ T6173] bridge0: port 3(veth0_to_batadv) entered disabled state [ 222.376129][ T6173] device bridge_slave_1 left promiscuous mode [ 222.382344][ T6173] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.394716][ T6173] device bridge_slave_0 left promiscuous mode [ 222.402041][ T6173] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.474753][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.482553][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.492918][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.502322][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.514614][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.529260][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.541453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.554485][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.565300][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.573190][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.592226][ T6184] device pim6reg1 entered promiscuous mode [ 222.640304][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.715958][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.766202][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.798343][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.808200][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 222.825793][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 222.847593][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 222.863199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.884491][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.902385][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.915216][ T6082] device veth0_vlan entered promiscuous mode [ 222.955606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.967125][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.984329][ T6082] device veth1_macvtap entered promiscuous mode [ 222.998642][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.009080][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.071420][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.089526][ T30] audit: type=1400 audit(1732010786.259:161): avc: denied { mounton } for pid=6082 comm="syz-executor" path="/root/syzkaller.Ala0J2/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 223.170180][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.300280][ T30] audit: type=1400 audit(1732010786.289:162): avc: denied { mount } for pid=6082 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 223.544970][ T30] audit: type=1400 audit(1732010786.309:163): avc: denied { mounton } for pid=6082 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 223.666602][ T6238] device syzkaller0 entered promiscuous mode [ 225.354060][ T6286] device sit0 entered promiscuous mode [ 225.674014][ T6304] tap0: tun_chr_ioctl cmd 2147767517 [ 226.114104][ T6320] device veth0_vlan left promiscuous mode [ 226.120900][ T6320] device veth0_vlan entered promiscuous mode [ 226.687487][ T6339] device syzkaller0 entered promiscuous mode [ 229.316490][ T6382] device syzkaller0 entered promiscuous mode [ 229.476752][ T6387] bond_slave_1: mtu less than device minimum [ 229.507743][ T6391] device veth0_vlan left promiscuous mode [ 229.515880][ T6391] device veth0_vlan entered promiscuous mode [ 229.525108][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.536270][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.548995][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 230.751771][ T6432] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.758830][ T6432] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.319881][ T6550] device wg2 left promiscuous mode [ 234.680983][ T6550] device wg2 entered promiscuous mode [ 237.131395][ T6645] device wg2 entered promiscuous mode [ 237.626875][ T6654] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.634568][ T6654] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.652520][ T6654] device bridge0 left promiscuous mode [ 237.698627][ T6648] device bridge_slave_1 left promiscuous mode [ 237.711955][ T6648] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.781061][ T6648] device bridge_slave_0 left promiscuous mode [ 237.808873][ T6648] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.745693][ T6702] device syzkaller0 entered promiscuous mode [ 239.036078][ T6726] device wg2 entered promiscuous mode [ 239.317703][ T6734] device syzkaller0 entered promiscuous mode [ 241.205357][ T6784] device syzkaller0 entered promiscuous mode [ 241.408039][ T6792] device syzkaller0 entered promiscuous mode [ 241.508647][ T6804] device syzkaller0 entered promiscuous mode [ 243.506676][ T6885] device syzkaller0 entered promiscuous mode [ 243.976686][ T6910] device pim6reg1 entered promiscuous mode [ 244.271204][ T6929] device pim6reg1 entered promiscuous mode [ 244.401483][ T6931] device pim6reg1 entered promiscuous mode [ 246.524153][ T6959] device wg2 left promiscuous mode [ 246.605461][ T6959] device wg2 entered promiscuous mode [ 248.119640][ T7007] device wg2 left promiscuous mode [ 248.857460][ T7023] device veth0_vlan left promiscuous mode [ 248.891773][ T7023] device veth0_vlan entered promiscuous mode [ 249.061600][ T7034] device sit0 left promiscuous mode [ 249.995097][ T7077] device sit0 left promiscuous mode [ 250.977734][ T7108] device syzkaller0 entered promiscuous mode [ 251.335172][ T7128] device pim6reg1 entered promiscuous mode [ 252.911636][ T7201] device sit0 entered promiscuous mode [ 253.592795][ T7240] syz.1.1878[7240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.592873][ T7240] syz.1.1878[7240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.159580][ T7256] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.519540][ T7280] device syzkaller0 entered promiscuous mode [ 254.553152][ T7276] device wg2 entered promiscuous mode [ 258.388242][ T7464] device pim6reg1 entered promiscuous mode [ 258.737766][ T7475] device syzkaller0 entered promiscuous mode [ 259.031840][ T7488] device syzkaller0 entered promiscuous mode [ 262.921531][ T7576] device wg2 left promiscuous mode [ 262.939668][ T7572] ÿÿÿÿÿÿ: renamed from vlan1 [ 263.189105][ T7591] syz.2.1984[7591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.197236][ T7591] syz.2.1984[7591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.925262][ T7627] tun0: tun_chr_ioctl cmd 1074025678 [ 265.094249][ T7627] tun0: group set to 0 [ 267.724005][ T7713] device pim6reg1 entered promiscuous mode [ 269.352457][ T7750] device pim6reg1 entered promiscuous mode [ 269.681778][ T7760] device veth0_vlan left promiscuous mode [ 269.772139][ T7760] device veth0_vlan entered promiscuous mode [ 270.010290][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.027715][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 270.039908][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.585685][ T30] audit: type=1400 audit(1732010834.759:164): avc: denied { create } for pid=7820 comm="syz.1.2052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 271.941499][ T7838] device sit0 left promiscuous mode [ 271.985986][ T7840] device sit0 entered promiscuous mode [ 272.707723][ T7877] device syzkaller0 entered promiscuous mode [ 274.174775][ T7959] device syzkaller0 entered promiscuous mode [ 274.333711][ T7965] device bridge_slave_1 left promiscuous mode [ 274.373255][ T7965] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.423664][ T7965] device bridge_slave_0 left promiscuous mode [ 274.432200][ T7965] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.716486][ T7972] device syzkaller0 entered promiscuous mode [ 274.732214][ T7973] device wg2 left promiscuous mode [ 274.752802][ T7973] device wg2 entered promiscuous mode [ 276.386516][ T30] audit: type=1400 audit(1732010839.559:165): avc: denied { create } for pid=8011 comm="syz.4.2109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 276.429606][ T8010] device pim6reg1 entered promiscuous mode [ 277.214044][ T8051] syz.1.2122[8051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.214124][ T8051] syz.1.2122[8051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.012585][ T8075] device syzkaller0 entered promiscuous mode [ 278.302290][ T8083] device pim6reg1 entered promiscuous mode [ 278.785946][ T8110] device sit0 left promiscuous mode [ 279.111955][ T8154] device pim6reg1 entered promiscuous mode [ 279.324089][ T8152] device wg2 left promiscuous mode [ 279.405705][ T8155] device wg2 entered promiscuous mode [ 279.774843][ T8178] bond_slave_1: mtu less than device minimum [ 284.415830][ T8275] device sit0 left promiscuous mode [ 285.477867][ T8295] device veth1_macvtap left promiscuous mode [ 285.668080][ T8293] device veth1_macvtap entered promiscuous mode [ 285.804853][ T8293] device macsec0 entered promiscuous mode [ 285.836295][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 285.995346][ T8314] device syzkaller0 entered promiscuous mode [ 286.147912][ T30] audit: type=1400 audit(1732010849.309:166): avc: denied { create } for pid=8315 comm="syz.2.2200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 286.307782][ T8319] device syzkaller0 entered promiscuous mode [ 286.816665][ T8341] device syzkaller0 entered promiscuous mode [ 288.131835][ T8412] device pim6reg1 entered promiscuous mode [ 288.884688][ T8418] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.892537][ T8418] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.972810][ T8418] device bridge_slave_0 entered promiscuous mode [ 289.041000][ T8442] tap0: tun_chr_ioctl cmd 1074025677 [ 289.095008][ T8442] tap0: linktype set to 773 [ 289.185203][ T8418] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.200422][ T8418] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.257719][ T8418] device bridge_slave_1 entered promiscuous mode [ 289.313177][ T8446] device pim6reg1 entered promiscuous mode [ 290.440131][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.471965][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.705630][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.748316][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.789914][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.797534][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.863444][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.956594][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.965244][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.972215][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.980717][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.991651][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.000963][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 291.011943][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 291.118010][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.148613][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 291.157187][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 291.191123][ T8418] device veth0_vlan entered promiscuous mode [ 291.228485][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 291.238275][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.247011][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 291.274645][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.448427][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 291.490120][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 291.510992][ T8418] device veth1_macvtap entered promiscuous mode [ 291.771407][ T8497] device syzkaller0 entered promiscuous mode [ 291.860378][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 291.881304][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 291.902873][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 291.934184][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 291.953134][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 292.645947][ T8517] syz.1.2253[8517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.646027][ T8517] syz.1.2253[8517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.152713][ T8529] device pim6reg1 entered promiscuous mode [ 294.488874][ T8577] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.544359][ T8578] device sit0 entered promiscuous mode [ 295.459351][ T30] audit: type=1400 audit(1732010858.629:167): avc: denied { create } for pid=8598 comm="syz.6.2278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 297.900053][ T8660] device syzkaller0 entered promiscuous mode [ 298.130577][ T8679] device veth1_macvtap left promiscuous mode [ 298.204002][ T8679] device macsec0 left promiscuous mode [ 300.453311][ T8770] device pim6reg1 entered promiscuous mode [ 301.751649][ T8839] bridge0: port 3(veth0_to_batadv) entered blocking state [ 301.770728][ T8839] bridge0: port 3(veth0_to_batadv) entered disabled state [ 301.798245][ T8839] device veth0_to_batadv entered promiscuous mode [ 302.006146][ T8840] device veth0_to_batadv left promiscuous mode [ 302.037724][ T8840] bridge0: port 3(veth0_to_batadv) entered disabled state [ 302.300674][ T8857] device sit0 entered promiscuous mode [ 303.435696][ T8931] device veth0_vlan left promiscuous mode [ 303.492925][ T8931] device veth0_vlan entered promiscuous mode [ 303.567108][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.583478][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 303.591859][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 304.115272][ T8972] device pim6reg1 entered promiscuous mode [ 304.904284][ T9016] device syzkaller0 entered promiscuous mode [ 306.102859][ T9071] device pim6reg1 entered promiscuous mode [ 306.597662][ T9090] device syzkaller0 entered promiscuous mode [ 308.849006][ T9179] FAULT_INJECTION: forcing a failure. [ 308.849006][ T9179] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 308.984148][ T9179] CPU: 0 PID: 9179 Comm: syz.4.2452 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 308.995888][ T9179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 309.006486][ T9179] Call Trace: [ 309.009838][ T9179] [ 309.012583][ T9179] dump_stack_lvl+0x151/0x1c0 [ 309.017394][ T9179] ? io_uring_drop_tctx_refs+0x190/0x190 [ 309.023259][ T9179] dump_stack+0x15/0x20 [ 309.027248][ T9179] should_fail+0x3c6/0x510 [ 309.031506][ T9179] should_fail_usercopy+0x1a/0x20 [ 309.037473][ T9179] _copy_from_user+0x20/0xd0 [ 309.041857][ T9179] __sys_bpf+0x1e9/0x760 [ 309.046040][ T9179] ? fput_many+0x160/0x1b0 [ 309.050383][ T9179] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 309.056021][ T9179] ? debug_smp_processor_id+0x17/0x20 [ 309.061495][ T9179] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 309.067836][ T9179] __x64_sys_bpf+0x7c/0x90 [ 309.072177][ T9179] x64_sys_call+0x87f/0x9a0 [ 309.076876][ T9179] do_syscall_64+0x3b/0xb0 [ 309.081198][ T9179] ? clear_bhb_loop+0x35/0x90 [ 309.085717][ T9179] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 309.092482][ T9179] RIP: 0033:0x7f173920e759 [ 309.097851][ T9179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 309.117876][ T9179] RSP: 002b:00007f1737e87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 309.127359][ T9179] RAX: ffffffffffffffda RBX: 00007f17393c5f80 RCX: 00007f173920e759 [ 309.135350][ T9179] RDX: 0000000000000080 RSI: 0000000020000300 RDI: 0000000000000005 [ 309.144205][ T9179] RBP: 00007f1737e87090 R08: 0000000000000000 R09: 0000000000000000 [ 309.152105][ T9179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 309.160727][ T9179] R13: 0000000000000001 R14: 00007f17393c5f80 R15: 00007ffefc727d38 [ 309.168626][ T9179] [ 309.258738][ T9181] device syzkaller0 entered promiscuous mode [ 310.789182][ T9213] device wg2 left promiscuous mode [ 310.915289][ T9213] device wg2 entered promiscuous mode [ 311.040785][ T9225] FAULT_INJECTION: forcing a failure. [ 311.040785][ T9225] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.077527][ T9225] CPU: 1 PID: 9225 Comm: syz.4.2465 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 311.091186][ T9225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 311.103297][ T9225] Call Trace: [ 311.106443][ T9225] [ 311.109192][ T9225] dump_stack_lvl+0x151/0x1c0 [ 311.114161][ T9225] ? io_uring_drop_tctx_refs+0x190/0x190 [ 311.119619][ T9225] ? kstrtouint_from_user+0x20a/0x2a0 [ 311.125359][ T9225] ? kstrtol_from_user+0x310/0x310 [ 311.130284][ T9225] ? avc_has_perm_noaudit+0x348/0x430 [ 311.135598][ T9225] dump_stack+0x15/0x20 [ 311.139598][ T9225] should_fail+0x3c6/0x510 [ 311.146328][ T9225] should_fail_usercopy+0x1a/0x20 [ 311.151210][ T9225] strncpy_from_user+0x24/0x2d0 [ 311.155862][ T9225] bpf_prog_load+0x185/0x1b50 [ 311.160377][ T9225] ? map_freeze+0x370/0x370 [ 311.164716][ T9225] ? selinux_bpf+0xcb/0x100 [ 311.169060][ T9225] ? security_bpf+0x82/0xb0 [ 311.173412][ T9225] __sys_bpf+0x4bc/0x760 [ 311.177475][ T9225] ? fput_many+0x160/0x1b0 [ 311.181723][ T9225] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 311.186938][ T9225] ? debug_smp_processor_id+0x17/0x20 [ 311.192145][ T9225] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 311.198171][ T9225] __x64_sys_bpf+0x7c/0x90 [ 311.202598][ T9225] x64_sys_call+0x87f/0x9a0 [ 311.207631][ T9225] do_syscall_64+0x3b/0xb0 [ 311.211880][ T9225] ? clear_bhb_loop+0x35/0x90 [ 311.217274][ T9225] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 311.222994][ T9225] RIP: 0033:0x7f173920e759 [ 311.227246][ T9225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 311.249309][ T9225] RSP: 002b:00007f1737e87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 311.257928][ T9225] RAX: ffffffffffffffda RBX: 00007f17393c5f80 RCX: 00007f173920e759 [ 311.266193][ T9225] RDX: 0000000000000080 RSI: 0000000020000300 RDI: 0000000000000005 [ 311.274159][ T9225] RBP: 00007f1737e87090 R08: 0000000000000000 R09: 0000000000000000 [ 311.282150][ T9225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 311.289957][ T9225] R13: 0000000000000001 R14: 00007f17393c5f80 R15: 00007ffefc727d38 [ 311.298477][ T9225] [ 312.200129][ T9262] device veth0_vlan left promiscuous mode [ 312.342152][ T9262] device veth0_vlan entered promiscuous mode [ 312.453812][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 312.483803][ T30] audit: type=1400 audit(1732010875.649:168): avc: denied { create } for pid=9272 comm="syz.2.2477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 312.507789][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 312.554427][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 312.779451][ T9278] tun0: tun_chr_ioctl cmd 1074025675 [ 312.824026][ T9278] tun0: persist disabled [ 313.039625][ T9284] FAULT_INJECTION: forcing a failure. [ 313.039625][ T9284] name failslab, interval 1, probability 0, space 0, times 0 [ 313.155055][ T9284] CPU: 1 PID: 9284 Comm: syz.5.2480 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 313.167139][ T9284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 313.178095][ T9284] Call Trace: [ 313.181310][ T9284] [ 313.184184][ T9284] dump_stack_lvl+0x151/0x1c0 [ 313.189311][ T9284] ? io_uring_drop_tctx_refs+0x190/0x190 [ 313.195811][ T9284] dump_stack+0x15/0x20 [ 313.200569][ T9284] should_fail+0x3c6/0x510 [ 313.205040][ T9284] __should_failslab+0xa4/0xe0 [ 313.212012][ T9284] should_failslab+0x9/0x20 [ 313.216760][ T9284] slab_pre_alloc_hook+0x37/0xd0 [ 313.221798][ T9284] kmem_cache_alloc_trace+0x48/0x210 [ 313.227105][ T9284] ? __get_vm_area_node+0x117/0x360 [ 313.232239][ T9284] ? __kasan_slab_free+0x11/0x20 [ 313.237177][ T9284] __get_vm_area_node+0x117/0x360 [ 313.242033][ T9284] __vmalloc_node_range+0xe2/0x8d0 [ 313.248608][ T9284] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 313.255023][ T9284] ? selinux_capset+0xf0/0xf0 [ 313.259465][ T9284] ? kstrtouint_from_user+0x20a/0x2a0 [ 313.265340][ T9284] ? kstrtol_from_user+0x310/0x310 [ 313.270359][ T9284] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 313.275740][ T9284] __vmalloc+0x7a/0x90 [ 313.279643][ T9284] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 313.285901][ T9284] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 313.291099][ T9284] ? bpf_prog_alloc+0x15/0x1e0 [ 313.296462][ T9284] bpf_prog_alloc+0x1f/0x1e0 [ 313.301001][ T9284] bpf_prog_load+0x800/0x1b50 [ 313.306230][ T9284] ? map_freeze+0x370/0x370 [ 313.310813][ T9284] ? selinux_bpf+0xcb/0x100 [ 313.316185][ T9284] ? security_bpf+0x82/0xb0 [ 313.322832][ T9284] __sys_bpf+0x4bc/0x760 [ 313.327464][ T9284] ? fput_many+0x160/0x1b0 [ 313.332299][ T9284] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 313.338870][ T9284] ? debug_smp_processor_id+0x17/0x20 [ 313.344673][ T9284] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 313.350908][ T9284] __x64_sys_bpf+0x7c/0x90 [ 313.355346][ T9284] x64_sys_call+0x87f/0x9a0 [ 313.359943][ T9284] do_syscall_64+0x3b/0xb0 [ 313.365547][ T9284] ? clear_bhb_loop+0x35/0x90 [ 313.371371][ T9284] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 313.377432][ T9284] RIP: 0033:0x7fcf2b8a2759 [ 313.381782][ T9284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 313.405404][ T9284] RSP: 002b:00007fcf2a51b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 313.416390][ T9284] RAX: ffffffffffffffda RBX: 00007fcf2ba59f80 RCX: 00007fcf2b8a2759 [ 313.426369][ T9284] RDX: 0000000000000080 RSI: 0000000020000300 RDI: 0000000000000005 [ 313.435300][ T9284] RBP: 00007fcf2a51b090 R08: 0000000000000000 R09: 0000000000000000 [ 313.446086][ T9284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 313.458024][ T9284] R13: 0000000000000001 R14: 00007fcf2ba59f80 R15: 00007fffed9501a8 [ 313.467075][ T9284] [ 313.674017][ T9284] syz.5.2480: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz5,mems_allowed=0 [ 313.745036][ T9284] CPU: 0 PID: 9284 Comm: syz.5.2480 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 313.764139][ T9284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 313.779703][ T9284] Call Trace: [ 313.782896][ T9284] [ 313.787159][ T9284] dump_stack_lvl+0x151/0x1c0 [ 313.792437][ T9284] ? io_uring_drop_tctx_refs+0x190/0x190 [ 313.800702][ T9284] ? pr_cont_kernfs_name+0xf0/0x100 [ 313.807430][ T9284] dump_stack+0x15/0x20 [ 313.814185][ T9284] warn_alloc+0x21a/0x390 [ 313.824899][ T9284] ? zone_watermark_ok_safe+0x270/0x270 [ 313.831232][ T9284] ? kmem_cache_alloc_trace+0x115/0x210 [ 313.838773][ T9284] ? __get_vm_area_node+0x117/0x360 [ 313.846390][ T9284] ? __get_vm_area_node+0x347/0x360 [ 313.855049][ T9284] __vmalloc_node_range+0x2c1/0x8d0 [ 313.863903][ T9284] ? selinux_capset+0xf0/0xf0 [ 313.869641][ T9284] ? kstrtouint_from_user+0x20a/0x2a0 [ 313.874948][ T9284] ? kstrtol_from_user+0x310/0x310 [ 313.882630][ T9284] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 313.896822][ T9284] __vmalloc+0x7a/0x90 [ 313.903289][ T9284] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 313.911300][ T9284] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 313.920635][ T9284] ? bpf_prog_alloc+0x15/0x1e0 [ 313.931638][ T9284] bpf_prog_alloc+0x1f/0x1e0 [ 313.939084][ T9284] bpf_prog_load+0x800/0x1b50 [ 313.945928][ T9284] ? map_freeze+0x370/0x370 [ 313.950752][ T9284] ? selinux_bpf+0xcb/0x100 [ 313.957215][ T9284] ? security_bpf+0x82/0xb0 [ 313.962480][ T9284] __sys_bpf+0x4bc/0x760 [ 313.968715][ T9284] ? fput_many+0x160/0x1b0 [ 313.976688][ T9284] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 313.985196][ T9284] ? debug_smp_processor_id+0x17/0x20 [ 313.994849][ T9284] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 314.005258][ T9284] __x64_sys_bpf+0x7c/0x90 [ 314.011607][ T9284] x64_sys_call+0x87f/0x9a0 [ 314.017112][ T9284] do_syscall_64+0x3b/0xb0 [ 314.021539][ T9284] ? clear_bhb_loop+0x35/0x90 [ 314.029359][ T9284] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 314.036606][ T9284] RIP: 0033:0x7fcf2b8a2759 [ 314.042266][ T9284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 314.067583][ T9284] RSP: 002b:00007fcf2a51b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 314.077403][ T9284] RAX: ffffffffffffffda RBX: 00007fcf2ba59f80 RCX: 00007fcf2b8a2759 [ 314.089352][ T9284] RDX: 0000000000000080 RSI: 0000000020000300 RDI: 0000000000000005 [ 314.100951][ T9284] RBP: 00007fcf2a51b090 R08: 0000000000000000 R09: 0000000000000000 [ 314.110298][ T9284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 314.119716][ T9284] R13: 0000000000000001 R14: 00007fcf2ba59f80 R15: 00007fffed9501a8 [ 314.129695][ T9284] [ 314.405957][ T9284] Mem-Info: [ 314.416698][ T9284] active_anon:116 inactive_anon:7849 isolated_anon:0 [ 314.416698][ T9284] active_file:24470 inactive_file:2492 isolated_file:0 [ 314.416698][ T9284] unevictable:0 dirty:194 writeback:0 [ 314.416698][ T9284] slab_reclaimable:7858 slab_unreclaimable:77762 [ 314.416698][ T9284] mapped:24679 shmem:242 pagetables:516 bounce:0 [ 314.416698][ T9284] kernel_misc_reclaimable:0 [ 314.416698][ T9284] free:1541396 free_pcp:22245 free_cma:0 [ 314.472285][ T9284] Node 0 active_anon:464kB inactive_anon:31396kB active_file:97880kB inactive_file:9968kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:98816kB dirty:776kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:6244kB pagetables:1964kB all_unreclaimable? no [ 314.524111][ T9284] DMA32 free:2974676kB min:62568kB low:78208kB high:93848kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2978968kB mlocked:0kB bounce:0kB free_pcp:4292kB local_pcp:4292kB free_cma:0kB [ 314.558112][ T9284] lowmem_reserve[]: 0 3941 3941 [ 314.564930][ T9284] Normal free:3190976kB min:84884kB low:106104kB high:127324kB reserved_highatomic:0KB active_anon:464kB inactive_anon:31396kB active_file:97880kB inactive_file:9968kB unevictable:0kB writepending:776kB present:5242880kB managed:4035584kB mlocked:0kB bounce:0kB free_pcp:75924kB local_pcp:52584kB free_cma:0kB [ 315.867861][ T9284] lowmem_reserve[]: 0 0 0 [ 316.245203][ T9284] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 723*4096kB (M) = 2974676kB [ 317.133943][ C1] sched: RT throttling activated [ 317.140778][ T9284] Normal: 2332*4kB (UME) 1821*8kB (ME) 1081*16kB (UME) 1144*32kB (UME) 478*64kB (UME) 199*128kB (UME) 90*256kB (UM) 38*512kB (UME) 14*1024kB (U) 3*2048kB (ME) 730*4096kB (UM) = 3186920kB [ 317.227839][ T9284] 29692 total pagecache pages [ 317.352226][ T9284] 0 pages in swap cache [ 317.362374][ T9284] Swap cache stats: add 0, delete 0, find 0/0 [ 317.392830][ T9284] Free swap = 124996kB [ 317.405397][ T9284] Total swap = 124996kB [ 317.410861][ T9284] 2097051 pages RAM [ 317.434000][ T9284] 0 pages HighMem/MovableOnly [ 317.440590][ T9284] 343413 pages reserved [ 317.538814][ T9284] 0 pages cma reserved [ 317.582629][ T9324] device syzkaller0 entered promiscuous mode [ 318.636237][ T9356] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 319.067724][ T9380] device pim6reg1 entered promiscuous mode [ 319.481676][ T9376] device syzkaller0 entered promiscuous mode [ 327.365284][ T9444] device syzkaller0 entered promiscuous mode [ 328.254148][ T9472] device sit0 entered promiscuous mode [ 328.982182][ T9482] device veth1_macvtap left promiscuous mode [ 328.989756][ T9482] device macsec0 left promiscuous mode [ 331.709498][ T30] audit: type=1400 audit(1732010894.879:169): avc: denied { create } for pid=9548 comm="syz.5.2549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 334.502991][ T9580] device wg2 left promiscuous mode [ 335.985508][ T9599] device wg2 left promiscuous mode [ 336.864095][ T9620] device sit0 left promiscuous mode [ 337.508373][ T9625] device veth0_vlan left promiscuous mode [ 337.530478][ T9625] device veth0_vlan entered promiscuous mode [ 337.622620][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.633395][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 337.642668][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.007726][ T30] audit: type=1400 audit(1732010901.179:170): avc: denied { attach_queue } for pid=9626 comm="syz.5.2570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 339.556679][ T9659] device veth0_vlan left promiscuous mode [ 339.589703][ T9659] device veth0_vlan entered promiscuous mode [ 339.660842][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.669814][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 339.698722][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.193135][ T9658] device syzkaller0 entered promiscuous mode [ 341.854768][ T9706] device veth0_vlan left promiscuous mode [ 341.981501][ T9706] device veth0_vlan entered promiscuous mode [ 341.991936][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.004581][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.012081][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 343.555473][ T9740] device wg2 left promiscuous mode [ 344.295986][ T9755] device sit0 left promiscuous mode [ 344.857336][ T9758] device sit0 entered promiscuous mode [ 345.057974][ T9764] device sit0 left promiscuous mode [ 346.903847][ T9800] device veth0_vlan left promiscuous mode [ 346.977154][ T9800] device veth0_vlan entered promiscuous mode [ 347.755796][ T9833] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.763677][ T9833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.807407][ T9833] device bridge0 entered promiscuous mode [ 348.254302][ T9842] device veth0_vlan left promiscuous mode [ 348.436853][ T9842] device veth0_vlan entered promiscuous mode [ 348.527863][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 348.537020][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 348.547764][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 348.555371][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 349.775856][ T9881] device veth0_vlan left promiscuous mode [ 349.874185][ T9881] device veth0_vlan entered promiscuous mode [ 349.905707][ T9895] ref_ctr_offset mismatch. inode: 0xb1a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 352.012747][ T30] audit: type=1400 audit(1732010915.179:171): avc: denied { create } for pid=9941 comm="syz.5.2655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 352.059288][ T9947] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.351045][ T9948] device bridge_slave_1 left promiscuous mode [ 352.414154][ T9948] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.026069][ T9948] device bridge_slave_0 left promiscuous mode [ 353.032063][ T9948] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.105809][ T9921] €Â0: renamed from pim6reg1 [ 353.424310][ T9963] device veth0_vlan left promiscuous mode [ 353.433161][ T9963] device veth0_vlan entered promiscuous mode [ 353.463162][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.481688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 353.511640][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 353.847507][ T9978] device syzkaller0 entered promiscuous mode [ 354.175099][ T9992] device syzkaller0 entered promiscuous mode [ 355.361533][T10046] device veth1_macvtap entered promiscuous mode [ 355.402229][T10046] device macsec0 entered promiscuous mode [ 355.621497][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 356.117092][T10072] device vxcan1 entered promiscuous mode [ 357.379582][T10158] device pim6reg1 entered promiscuous mode [ 357.462420][T10163] device syzkaller0 entered promiscuous mode [ 358.680636][T10181] device syzkaller0 entered promiscuous mode [ 358.690567][T10194] device pim6reg1 entered promiscuous mode [ 358.755100][T10206] Ÿë: port 1(veth0_to_team) entered blocking state [ 358.761881][T10206] Ÿë: port 1(veth0_to_team) entered disabled state [ 358.769339][T10206] device veth0_to_team entered promiscuous mode [ 358.977853][T10225] device pim6reg1 entered promiscuous mode [ 361.304108][T10323] device pim6reg1 entered promiscuous mode [ 361.534199][T10343] ÿÿÿÿÿÿ: renamed from vlan1 [ 361.928672][T10372] device veth0_vlan left promiscuous mode [ 361.935834][T10372] device veth0_vlan entered promiscuous mode [ 361.945661][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.962817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 361.983674][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.156323][T10430] device wg2 entered promiscuous mode [ 364.784939][T10483] device pim6reg1 entered promiscuous mode [ 364.792954][T10485] device sit0 left promiscuous mode [ 366.497238][T10526] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.510022][T10526] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.517930][T10526] device bridge_slave_0 entered promiscuous mode [ 366.635047][T10526] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.642008][T10526] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.708110][T10526] device bridge_slave_1 entered promiscuous mode [ 367.532260][ T30] audit: type=1400 audit(1732010930.699:172): avc: denied { create } for pid=10526 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 367.692068][ T8] device veth0_to_team left promiscuous mode [ 367.698050][ T8] Ÿë: port 1(veth0_to_team) entered disabled state [ 367.777878][ T30] audit: type=1400 audit(1732010930.699:173): avc: denied { write } for pid=10526 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 367.810103][ T30] audit: type=1400 audit(1732010930.699:174): avc: denied { read } for pid=10526 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 368.293457][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 368.303782][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.401813][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 368.506376][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.644318][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.651295][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.784182][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 368.795501][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.803716][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.810607][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.821779][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 368.830205][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 368.971822][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 369.027280][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 369.141979][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.181158][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 369.189656][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 369.208117][T10526] device veth0_vlan entered promiscuous mode [ 369.219254][T10579] device veth0_vlan left promiscuous mode [ 369.226100][T10579] device veth0_vlan entered promiscuous mode [ 369.242048][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 369.250846][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.260397][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.276980][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.285011][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 369.306121][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.306153][T10582] syz.5.2844[10582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.313593][T10582] syz.5.2844[10582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.313778][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 369.351646][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 369.360516][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 369.380349][T10526] device veth1_macvtap entered promiscuous mode [ 369.448020][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 369.464367][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 369.472622][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 369.482812][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 369.496129][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 370.187962][T10636] device veth0_vlan left promiscuous mode [ 370.204867][T10636] device veth0_vlan entered promiscuous mode [ 371.699546][T10689] device bridge_slave_0 entered promiscuous mode [ 371.821128][T10696] syz.1.2872[10696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.821219][T10696] syz.1.2872[10696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.026990][T10713] device pim6reg1 entered promiscuous mode [ 372.654292][T10756] syz.2.2888[10756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.654375][T10756] syz.2.2888[10756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.541879][T10797] device wg2 left promiscuous mode [ 373.813834][T10812] device wg2 entered promiscuous mode [ 375.259034][T10864] device pim6reg1 entered promiscuous mode [ 376.322863][T10878] device syzkaller0 entered promiscuous mode [ 376.872335][T10883] device veth0_vlan left promiscuous mode [ 376.894407][T10883] device veth0_vlan entered promiscuous mode [ 376.902033][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.944492][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.984205][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 378.695664][T10917] bond_slave_1: mtu less than device minimum [ 382.215157][T10925] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.243866][T10925] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.251806][T10925] device bridge_slave_0 entered promiscuous mode [ 382.263144][T10925] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.270575][T10925] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.278142][T10925] device bridge_slave_1 entered promiscuous mode [ 382.665879][T10925] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.672856][T10925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.765241][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.804870][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 382.824579][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.910750][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 383.063735][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 383.181458][ T335] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.188373][ T335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.404370][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 383.434468][ T335] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.441353][ T335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.540901][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 383.644315][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 383.969883][T10925] device veth0_vlan entered promiscuous mode [ 384.017152][ T8] device veth1_macvtap left promiscuous mode [ 384.024407][ T8] device veth0_vlan left promiscuous mode [ 384.145437][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 384.159687][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 384.176327][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 384.194384][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 384.214147][T11013] device pim6reg1 entered promiscuous mode [ 384.225183][T10925] device veth1_macvtap entered promiscuous mode [ 384.256738][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 384.278549][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 384.364348][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 384.384411][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 384.393352][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 384.436576][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 384.452444][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 384.488202][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 384.509653][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 385.438143][T11071] device pim6reg1 entered promiscuous mode [ 385.516160][T11069] device pim6reg1 entered promiscuous mode [ 385.743098][T11095] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 386.711600][T11133] device pim6reg1 entered promiscuous mode [ 386.821877][T11134] device syzkaller0 entered promiscuous mode [ 388.262490][T11168] device bridge_slave_0 entered promiscuous mode [ 388.698878][ T30] audit: type=1400 audit(1732010951.869:175): avc: denied { create } for pid=11183 comm="syz.5.3001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 389.715424][T11213] device sit0 entered promiscuous mode [ 390.390473][T11229] bond_slave_1: mtu less than device minimum [ 391.466840][T11288] device syzkaller0 entered promiscuous mode [ 391.513355][T11298] device sit0 entered promiscuous mode [ 391.864685][T11302] device syzkaller0 entered promiscuous mode [ 396.029723][T11364] device syzkaller0 entered promiscuous mode [ 396.532117][T11382] syz.4.3053[11382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.532191][T11382] syz.4.3053[11382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.544883][T11382] syz.4.3053[11382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.556570][T11382] syz.4.3053[11382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.882383][T11425] device veth1_macvtap left promiscuous mode [ 398.915474][T11425] device macsec0 entered promiscuous mode [ 399.744725][T11446] device pim6reg1 entered promiscuous mode [ 399.879418][T11448] device syzkaller0 entered promiscuous mode [ 399.971828][T11447] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.979961][T11447] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.988886][T11447] device bridge_slave_0 entered promiscuous mode [ 399.997058][T11447] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.005571][T11447] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.014481][T11447] device bridge_slave_1 entered promiscuous mode [ 400.116932][T11447] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.123822][T11447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.131205][T11447] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.140546][T11447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.632249][T11464] device wg2 entered promiscuous mode [ 400.793060][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 400.813196][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 400.836072][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 400.938761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 401.020757][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 401.261607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 401.270541][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 401.490847][T11475] device syzkaller0 entered promiscuous mode [ 401.522482][T11447] device veth0_vlan entered promiscuous mode [ 401.552029][T11447] device veth1_macvtap entered promiscuous mode [ 401.568284][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 401.625444][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.643046][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 401.660476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 401.679039][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 401.715404][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.727775][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 401.746999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 401.764459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 401.780574][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 401.793163][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 402.169927][T11490] device pim6reg1 entered promiscuous mode [ 402.832869][T11521] device pim6reg1 entered promiscuous mode [ 403.023813][T11529] tap0: tun_chr_ioctl cmd 1074025675 [ 403.100285][T11529] tap0: persist enabled [ 404.394395][T11573] syz.4.3109[11573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.394498][T11573] syz.4.3109[11573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.324514][T11611] syz.6.3121 (11611) used obsolete PPPIOCDETACH ioctl [ 407.141347][T11632] device sit0 entered promiscuous mode [ 408.834492][ T30] audit: type=1400 audit(1732010972.009:176): avc: denied { setattr } for pid=11716 comm="syz.7.3149" path="/dev/net/tun" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 412.325285][T11789] device wg2 entered promiscuous mode [ 412.497427][T11796] device pim6reg1 entered promiscuous mode [ 413.654554][ T290] syz-executor (290) used greatest stack depth: 20288 bytes left [ 413.852204][T11851] device syzkaller0 entered promiscuous mode [ 414.504151][T11858] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.511306][T11858] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.803679][T11865] device pim6reg1 entered promiscuous mode [ 414.953639][T11878] device syzkaller0 entered promiscuous mode [ 415.137967][T11889] device sit0 left promiscuous mode [ 415.253762][T11889] device sit0 entered promiscuous mode [ 415.512763][T11901] device pim6reg1 entered promiscuous mode [ 415.971376][ T312] device veth0_vlan left promiscuous mode [ 417.056373][T11950] device syzkaller0 entered promiscuous mode [ 417.206773][T11952] device pim6reg1 entered promiscuous mode [ 417.276104][T11959] device syzkaller0 entered promiscuous mode [ 418.220383][T11997] device pim6reg1 entered promiscuous mode [ 419.969688][T12045] device pim6reg1 entered promiscuous mode [ 420.046432][T12029] device veth0_vlan left promiscuous mode [ 420.069904][T12029] device veth0_vlan entered promiscuous mode [ 420.144011][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 420.184363][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 420.287827][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 420.358146][T12058] device veth1_macvtap left promiscuous mode [ 420.614602][T12078] ªªªªªª: renamed from vlan0 [ 420.875179][T12091] device syzkaller0 entered promiscuous mode [ 421.363687][T12139] device pim6reg1 entered promiscuous mode [ 421.703544][T12157] device sit0 entered promiscuous mode [ 423.489841][T12217] device veth0_vlan left promiscuous mode [ 423.556267][T12217] device veth0_vlan entered promiscuous mode [ 423.662842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 423.673497][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 423.681321][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 423.690013][T12220] device wg2 left promiscuous mode [ 423.696121][T12224] device sit0 left promiscuous mode [ 423.711852][T12227] device sit0 entered promiscuous mode [ 424.085458][T12230] bond_slave_1: mtu greater than device maximum [ 424.404246][T12245] device pim6reg1 entered promiscuous mode [ 424.955538][T12252] device sit0 left promiscuous mode [ 429.636754][T12351] syz.7.3331[12351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.636832][T12351] syz.7.3331[12351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.862900][T12368] device pim6reg1 entered promiscuous mode [ 430.566453][T12402] device sit0 entered promiscuous mode [ 431.385334][T12428] Â: renamed from pim6reg1 [ 433.532554][T12474] device sit0 left promiscuous mode [ 433.713053][T12488] device pim6reg1 entered promiscuous mode [ 435.857357][T12549] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 435.925712][T12549] syzkaller0: linktype set to 804 [ 436.761100][T12570] bond_slave_1: mtu less than device minimum [ 437.210140][T12580] device syzkaller0 entered promiscuous mode [ 437.382410][T12587] device syzkaller0 entered promiscuous mode [ 439.451991][T12681] device sit0 left promiscuous mode [ 439.832324][T12698] device pim6reg1 entered promiscuous mode [ 441.329696][ T30] audit: type=1400 audit(1732011004.499:177): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 441.353644][ T30] audit: type=1400 audit(1732011004.499:178): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 441.394071][ T30] audit: type=1400 audit(1732011004.499:179): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 443.684774][T12816] Â: renamed from pim6reg1 [ 448.603415][T12898] device syzkaller0 entered promiscuous mode [ 448.884526][T12897] device pim6reg1 entered promiscuous mode [ 451.810397][T13004] device wg2 entered promiscuous mode [ 457.849570][T13081] FAULT_INJECTION: forcing a failure. [ 457.849570][T13081] name failslab, interval 1, probability 0, space 0, times 0 [ 457.963106][T13079] device syzkaller0 entered promiscuous mode [ 458.014015][T13081] CPU: 1 PID: 13081 Comm: syz.7.3527 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 458.025227][T13081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 458.035127][T13081] Call Trace: [ 458.038250][T13081] [ 458.041024][T13081] dump_stack_lvl+0x151/0x1c0 [ 458.045542][T13081] ? io_uring_drop_tctx_refs+0x190/0x190 [ 458.051128][T13081] ? avc_denied+0x1b0/0x1b0 [ 458.055456][T13081] dump_stack+0x15/0x20 [ 458.059743][T13081] should_fail+0x3c6/0x510 [ 458.063998][T13081] __should_failslab+0xa4/0xe0 [ 458.068599][T13081] ? __alloc_skb+0xbe/0x550 [ 458.072940][T13081] should_failslab+0x9/0x20 [ 458.077361][T13081] slab_pre_alloc_hook+0x37/0xd0 [ 458.082268][T13081] ? __alloc_skb+0xbe/0x550 [ 458.086566][T13081] kmem_cache_alloc+0x44/0x200 [ 458.091166][T13081] __alloc_skb+0xbe/0x550 [ 458.095332][T13081] alloc_skb_with_frags+0xa6/0x680 [ 458.100277][T13081] ? 0xffffffffa0014000 [ 458.104276][T13081] ? is_bpf_text_address+0x172/0x190 [ 458.109410][T13081] sock_alloc_send_pskb+0x915/0xa50 [ 458.114428][T13081] ? sock_kzfree_s+0x60/0x60 [ 458.118849][T13081] ? stack_trace_save+0x113/0x1c0 [ 458.123712][T13081] ? stack_trace_snprint+0xf0/0xf0 [ 458.128656][T13081] tun_get_user+0xf1b/0x3aa0 [ 458.133084][T13081] ? __x64_sys_openat+0x210/0x290 [ 458.137979][T13081] ? x64_sys_call+0x6bf/0x9a0 [ 458.142455][T13081] ? _kstrtoull+0x3a0/0x4a0 [ 458.146795][T13081] ? tun_do_read+0x2010/0x2010 [ 458.151393][T13081] ? kstrtouint_from_user+0x20a/0x2a0 [ 458.156600][T13081] ? kstrtol_from_user+0x310/0x310 [ 458.161548][T13081] ? avc_policy_seqno+0x1b/0x70 [ 458.166236][T13081] ? selinux_file_permission+0x2c4/0x570 [ 458.171962][T13081] tun_chr_write_iter+0x1e1/0x2e0 [ 458.176823][T13081] vfs_write+0xd5d/0x1110 [ 458.180993][T13081] ? putname+0xfa/0x150 [ 458.184981][T13081] ? file_end_write+0x1c0/0x1c0 [ 458.189673][T13081] ? __fdget_pos+0x209/0x3a0 [ 458.194097][T13081] ? ksys_write+0x77/0x2c0 [ 458.198348][T13081] ksys_write+0x199/0x2c0 [ 458.202514][T13081] ? __ia32_sys_read+0x90/0x90 [ 458.207114][T13081] ? debug_smp_processor_id+0x17/0x20 [ 458.212319][T13081] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 458.218221][T13081] __x64_sys_write+0x7b/0x90 [ 458.222648][T13081] x64_sys_call+0x2f/0x9a0 [ 458.226902][T13081] do_syscall_64+0x3b/0xb0 [ 458.231150][T13081] ? clear_bhb_loop+0x35/0x90 [ 458.235666][T13081] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 458.241395][T13081] RIP: 0033:0x7f5c40872759 [ 458.246366][T13081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 458.265790][T13081] RSP: 002b:00007f5c3f4eb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 458.274027][T13081] RAX: ffffffffffffffda RBX: 00007f5c40a29f80 RCX: 00007f5c40872759 [ 458.281841][T13081] RDX: 000000000000fdef RSI: 00000000200004c0 RDI: 00000000000000c8 [ 458.289650][T13081] RBP: 00007f5c3f4eb090 R08: 0000000000000000 R09: 0000000000000000 [ 458.297461][T13081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 458.305273][T13081] R13: 0000000000000000 R14: 00007f5c40a29f80 R15: 00007ffd010cd2f8 [ 458.313095][T13081] [ 458.326113][T13087] device sit0 left promiscuous mode [ 460.304042][T13137] FAULT_INJECTION: forcing a failure. [ 460.304042][T13137] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 460.343993][T13137] CPU: 1 PID: 13137 Comm: syz.2.3540 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 460.355287][T13137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 460.365199][T13137] Call Trace: [ 460.368314][T13137] [ 460.371092][T13137] dump_stack_lvl+0x151/0x1c0 [ 460.375595][T13137] ? io_uring_drop_tctx_refs+0x190/0x190 [ 460.381061][T13137] ? stack_trace_save+0x113/0x1c0 [ 460.385918][T13137] dump_stack+0x15/0x20 [ 460.389909][T13137] should_fail+0x3c6/0x510 [ 460.394254][T13137] should_fail_alloc_page+0x5a/0x80 [ 460.403319][T13137] prepare_alloc_pages+0x15c/0x700 [ 460.408257][T13137] ? __alloc_pages_bulk+0xe40/0xe40 [ 460.413284][T13137] ? x64_sys_call+0x2f/0x9a0 [ 460.417711][T13137] ? do_syscall_64+0x3b/0xb0 [ 460.422134][T13137] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 460.428490][T13137] __alloc_pages+0x18c/0x8f0 [ 460.432903][T13137] ? prep_new_page+0x110/0x110 [ 460.437512][T13137] kmalloc_order+0x4a/0x160 [ 460.441856][T13137] kmalloc_order_trace+0x1a/0xb0 [ 460.446635][T13137] ? alloc_skb_with_frags+0xa6/0x680 [ 460.451734][T13137] __kmalloc_track_caller+0x19b/0x260 [ 460.456942][T13137] ? kmem_cache_alloc+0xf5/0x200 [ 460.461714][T13137] ? alloc_skb_with_frags+0xa6/0x680 [ 460.466845][T13137] __alloc_skb+0x10c/0x550 [ 460.471091][T13137] alloc_skb_with_frags+0xa6/0x680 [ 460.476035][T13137] ? 0xffffffffa0014000 [ 460.480025][T13137] ? is_bpf_text_address+0x172/0x190 [ 460.485237][T13137] sock_alloc_send_pskb+0x915/0xa50 [ 460.490273][T13137] ? sock_kzfree_s+0x60/0x60 [ 460.494692][T13137] ? stack_trace_save+0x113/0x1c0 [ 460.499556][T13137] ? stack_trace_snprint+0xf0/0xf0 [ 460.504508][T13137] tun_get_user+0xf1b/0x3aa0 [ 460.509104][T13137] ? __x64_sys_openat+0x210/0x290 [ 460.513962][T13137] ? x64_sys_call+0x6bf/0x9a0 [ 460.518477][T13137] ? _kstrtoull+0x3a0/0x4a0 [ 460.522817][T13137] ? prepare_signal+0x920/0xc20 [ 460.527502][T13137] ? tun_do_read+0x2010/0x2010 [ 460.532104][T13137] ? send_sigqueue+0x650/0x650 [ 460.536706][T13137] ? __send_signal+0x96f/0xcb0 [ 460.541307][T13137] ? avc_policy_seqno+0x1b/0x70 [ 460.545987][T13137] ? selinux_file_permission+0x2c4/0x570 [ 460.551457][T13137] tun_chr_write_iter+0x1e1/0x2e0 [ 460.556318][T13137] vfs_write+0xd5d/0x1110 [ 460.560487][T13137] ? file_end_write+0x1c0/0x1c0 [ 460.565184][T13137] ? __fdget_pos+0x209/0x3a0 [ 460.569593][T13137] ? ksys_write+0x77/0x2c0 [ 460.573850][T13137] ksys_write+0x199/0x2c0 [ 460.578015][T13137] ? __ia32_sys_read+0x90/0x90 [ 460.582613][T13137] ? debug_smp_processor_id+0x17/0x20 [ 460.587845][T13137] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 460.593721][T13137] __x64_sys_write+0x7b/0x90 [ 460.598149][T13137] x64_sys_call+0x2f/0x9a0 [ 460.602402][T13137] do_syscall_64+0x3b/0xb0 [ 460.606654][T13137] ? clear_bhb_loop+0x35/0x90 [ 460.611167][T13137] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 460.616894][T13137] RIP: 0033:0x7fdd38ae4759 [ 460.621149][T13137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 460.645278][T13137] RSP: 002b:00007fdd3775d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 460.653537][T13137] RAX: ffffffffffffffda RBX: 00007fdd38c9bf80 RCX: 00007fdd38ae4759 [ 460.661516][T13137] RDX: 000000000000fdef RSI: 00000000200004c0 RDI: 00000000000000c8 [ 460.669325][T13137] RBP: 00007fdd3775d090 R08: 0000000000000000 R09: 0000000000000000 [ 460.677257][T13137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.685135][T13137] R13: 0000000000000000 R14: 00007fdd38c9bf80 R15: 00007ffc4b64e358 [ 460.692953][T13137] [ 461.167482][T13168] device veth0_vlan left promiscuous mode [ 461.179438][T13177] FAULT_INJECTION: forcing a failure. [ 461.179438][T13177] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 461.200848][T13168] device veth0_vlan entered promiscuous mode [ 461.214026][T13177] CPU: 0 PID: 13177 Comm: syz.4.3552 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 461.225238][T13177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 461.235128][T13177] Call Trace: [ 461.238254][T13177] [ 461.241030][T13177] dump_stack_lvl+0x151/0x1c0 [ 461.245544][T13177] ? io_uring_drop_tctx_refs+0x190/0x190 [ 461.251008][T13177] ? __kasan_check_write+0x14/0x20 [ 461.256041][T13177] ? __alloc_skb+0x355/0x550 [ 461.260600][T13177] dump_stack+0x15/0x20 [ 461.264580][T13177] should_fail+0x3c6/0x510 [ 461.268841][T13177] should_fail_usercopy+0x1a/0x20 [ 461.273694][T13177] _copy_from_iter+0x22f/0xdc0 [ 461.278301][T13177] ? copy_mc_pipe_to_iter+0x760/0x760 [ 461.283506][T13177] ? __check_object_size+0x2ec/0x3d0 [ 461.288623][T13177] skb_copy_datagram_from_iter+0x100/0x6d0 [ 461.294276][T13177] tun_get_user+0x112d/0x3aa0 [ 461.298865][T13177] ? __x64_sys_openat+0x210/0x290 [ 461.303747][T13177] ? x64_sys_call+0x6bf/0x9a0 [ 461.308238][T13177] ? _kstrtoull+0x3a0/0x4a0 [ 461.312580][T13177] ? tun_do_read+0x2010/0x2010 [ 461.317175][T13177] ? kstrtouint_from_user+0x20a/0x2a0 [ 461.322494][T13177] ? kstrtol_from_user+0x310/0x310 [ 461.327434][T13177] ? avc_policy_seqno+0x1b/0x70 [ 461.332122][T13177] ? selinux_file_permission+0x2c4/0x570 [ 461.337583][T13177] tun_chr_write_iter+0x1e1/0x2e0 [ 461.342444][T13177] vfs_write+0xd5d/0x1110 [ 461.346617][T13177] ? putname+0xfa/0x150 [ 461.350602][T13177] ? file_end_write+0x1c0/0x1c0 [ 461.355292][T13177] ? __fdget_pos+0x209/0x3a0 [ 461.359725][T13177] ? ksys_write+0x77/0x2c0 [ 461.363972][T13177] ksys_write+0x199/0x2c0 [ 461.368135][T13177] ? __ia32_sys_read+0x90/0x90 [ 461.372737][T13177] ? debug_smp_processor_id+0x17/0x20 [ 461.377948][T13177] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 461.383842][T13177] __x64_sys_write+0x7b/0x90 [ 461.388269][T13177] x64_sys_call+0x2f/0x9a0 [ 461.392519][T13177] do_syscall_64+0x3b/0xb0 [ 461.396860][T13177] ? clear_bhb_loop+0x35/0x90 [ 461.401380][T13177] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 461.407105][T13177] RIP: 0033:0x7ff5cd233759 [ 461.411363][T13177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 461.430794][T13177] RSP: 002b:00007ff5cbeac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 461.439056][T13177] RAX: ffffffffffffffda RBX: 00007ff5cd3eaf80 RCX: 00007ff5cd233759 [ 461.446851][T13177] RDX: 000000000000fdef RSI: 00000000200004c0 RDI: 00000000000000c8 [ 461.454666][T13177] RBP: 00007ff5cbeac090 R08: 0000000000000000 R09: 0000000000000000 [ 461.462470][T13177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 461.470284][T13177] R13: 0000000000000000 R14: 00007ff5cd3eaf80 R15: 00007fffa13289f8 [ 461.478117][T13177] [ 461.482296][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.491728][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 461.499205][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 462.068109][T13219] FAULT_INJECTION: forcing a failure. [ 462.068109][T13219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 462.154696][T13219] CPU: 1 PID: 13219 Comm: syz.2.3563 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 462.165907][T13219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 462.175799][T13219] Call Trace: [ 462.178928][T13219] [ 462.181794][T13219] dump_stack_lvl+0x151/0x1c0 [ 462.186298][T13219] ? io_uring_drop_tctx_refs+0x190/0x190 [ 462.191764][T13219] ? prepare_signal+0x920/0xc20 [ 462.196460][T13219] dump_stack+0x15/0x20 [ 462.200639][T13219] should_fail+0x3c6/0x510 [ 462.204879][T13219] should_fail_usercopy+0x1a/0x20 [ 462.209735][T13219] _copy_to_user+0x20/0x90 [ 462.214081][T13219] simple_read_from_buffer+0xc7/0x150 [ 462.219286][T13219] proc_fail_nth_read+0x1a3/0x210 [ 462.224148][T13219] ? proc_fault_inject_write+0x390/0x390 [ 462.229620][T13219] ? fsnotify_perm+0x269/0x5b0 [ 462.234212][T13219] ? security_file_permission+0x86/0xb0 [ 462.239618][T13219] ? proc_fault_inject_write+0x390/0x390 [ 462.245059][T13219] vfs_read+0x27d/0xd40 [ 462.249140][T13219] ? kernel_read+0x1f0/0x1f0 [ 462.253564][T13219] ? __kasan_check_write+0x14/0x20 [ 462.258774][T13219] ? mutex_lock+0xb6/0x1e0 [ 462.263025][T13219] ? wait_for_completion_killable_timeout+0x10/0x10 [ 462.269453][T13219] ? __fdget_pos+0x2e7/0x3a0 [ 462.273873][T13219] ? ksys_read+0x77/0x2c0 [ 462.278037][T13219] ksys_read+0x199/0x2c0 [ 462.282123][T13219] ? vfs_write+0x1110/0x1110 [ 462.286546][T13219] ? debug_smp_processor_id+0x17/0x20 [ 462.291751][T13219] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 462.297656][T13219] __x64_sys_read+0x7b/0x90 [ 462.301996][T13219] x64_sys_call+0x28/0x9a0 [ 462.306244][T13219] do_syscall_64+0x3b/0xb0 [ 462.310497][T13219] ? clear_bhb_loop+0x35/0x90 [ 462.315014][T13219] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 462.320741][T13219] RIP: 0033:0x7fdd38ae319c [ 462.325001][T13219] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 462.344632][T13219] RSP: 002b:00007fdd3775d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 462.352875][T13219] RAX: ffffffffffffffda RBX: 00007fdd38c9bf80 RCX: 00007fdd38ae319c [ 462.360682][T13219] RDX: 000000000000000f RSI: 00007fdd3775d0a0 RDI: 0000000000000005 [ 462.368497][T13219] RBP: 00007fdd3775d090 R08: 0000000000000000 R09: 0000000000000000 [ 462.376314][T13219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 462.384225][T13219] R13: 0000000000000000 R14: 00007fdd38c9bf80 R15: 00007ffc4b64e358 [ 462.392047][T13219] [ 462.462591][T13228] device syzkaller0 entered promiscuous mode [ 462.484226][T13236] device wg2 left promiscuous mode [ 462.507377][T13236] device wg2 entered promiscuous mode [ 463.516121][T13286] device lo entered promiscuous mode [ 463.839182][T13313] device wg2 entered promiscuous mode [ 464.812640][T13342] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.849997][T13357] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 464.914146][T13357] syzkaller0: linktype set to 768 [ 467.455172][T13446] device pim6reg1 entered promiscuous mode [ 472.647791][T13604] device macsec0 entered promiscuous mode [ 484.960593][T13907] device sit0 entered promiscuous mode [ 486.039947][T13942] device sit0 left promiscuous mode [ 487.736317][T13984] device pim6reg1 entered promiscuous mode [ 488.228537][T13993] device syzkaller0 entered promiscuous mode [ 488.464988][T14007] syz.5.3781[14007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.465071][T14007] syz.5.3781[14007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.822262][T14012] syz.5.3781[14012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 489.072005][T14012] syz.5.3781[14012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 491.705016][T14073] device veth0_vlan left promiscuous mode [ 491.826933][T14073] device veth0_vlan entered promiscuous mode [ 491.911194][T13730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 491.922889][T13730] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 491.935946][T13730] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 492.900245][T14111] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.025207][T14111] device bridge0 left promiscuous mode [ 493.078535][T14110] bridge0: port 2(bridge_slave_1) entered blocking state [ 493.086363][T14110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 493.138546][T14110] device bridge0 entered promiscuous mode [ 493.448604][T14124] device wg2 entered promiscuous mode [ 494.126288][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 496.604401][T14204] device macsec0 entered promiscuous mode [ 498.737911][T14276] syz.5.3850[14276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.737987][T14276] syz.5.3850[14276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.808220][T14472] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 508.963591][T14472] syzkaller0: linktype set to 804 [ 516.167438][T14585] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 516.238063][T14585] syzkaller0: linktype set to 804 [ 516.684459][T14607] device wg2 left promiscuous mode [ 516.743434][T14612] device wg2 entered promiscuous mode [ 517.788703][T14634] device bridge_slave_0 left promiscuous mode [ 522.542632][T14728] bridge0: port 3(veth0_to_batadv) entered blocking state [ 522.705034][T14728] bridge0: port 3(veth0_to_batadv) entered disabled state [ 522.712640][T14728] device veth0_to_batadv entered promiscuous mode [ 522.719115][T14728] bridge0: port 3(veth0_to_batadv) entered blocking state [ 522.726093][T14728] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 522.932094][T14723] device veth0_to_batadv left promiscuous mode [ 522.944702][T14723] bridge0: port 3(veth0_to_batadv) entered disabled state [ 523.327155][T14743] FAULT_INJECTION: forcing a failure. [ 523.327155][T14743] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 523.483901][T14743] CPU: 1 PID: 14743 Comm: syz.5.3985 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 523.495109][T14743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 523.505004][T14743] Call Trace: [ 523.508127][T14743] [ 523.510907][T14743] dump_stack_lvl+0x151/0x1c0 [ 523.515417][T14743] ? io_uring_drop_tctx_refs+0x190/0x190 [ 523.520887][T14743] dump_stack+0x15/0x20 [ 523.524876][T14743] should_fail+0x3c6/0x510 [ 523.529567][T14743] should_fail_usercopy+0x1a/0x20 [ 523.534424][T14743] _copy_from_user+0x20/0xd0 [ 523.538852][T14743] __sys_bpf+0x1e9/0x760 [ 523.542930][T14743] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 523.548135][T14743] ? bpf_trace_run2+0xf1/0x210 [ 523.552746][T14743] ? debug_smp_processor_id+0x17/0x20 [ 523.557944][T14743] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 523.563848][T14743] __x64_sys_bpf+0x7c/0x90 [ 523.568106][T14743] x64_sys_call+0x87f/0x9a0 [ 523.572442][T14743] do_syscall_64+0x3b/0xb0 [ 523.576699][T14743] ? clear_bhb_loop+0x35/0x90 [ 523.581210][T14743] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 523.587113][T14743] RIP: 0033:0x7fcf2b8a2759 [ 523.591643][T14743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 523.611438][T14743] RSP: 002b:00007fcf2a4fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 523.620561][T14743] RAX: ffffffffffffffda RBX: 00007fcf2ba5a058 RCX: 00007fcf2b8a2759 [ 523.628365][T14743] RDX: 0000000000000010 RSI: 00000000200002c0 RDI: 0000000000000011 [ 523.637117][T14743] RBP: 00007fcf2a4fa090 R08: 0000000000000000 R09: 0000000000000000 [ 523.645050][T14743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 523.653228][T14743] R13: 0000000000000000 R14: 00007fcf2ba5a058 R15: 00007fffed9501a8 [ 523.661922][T14743] [ 525.147580][T14773] syz.7.3994[14773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 525.147959][T14773] syz.7.3994[14773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.316909][T14803] FAULT_INJECTION: forcing a failure. [ 526.316909][T14803] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 526.504302][T14803] CPU: 0 PID: 14803 Comm: syz.7.4002 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 526.515513][T14803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 526.525401][T14803] Call Trace: [ 526.528524][T14803] [ 526.531300][T14803] dump_stack_lvl+0x151/0x1c0 [ 526.535819][T14803] ? io_uring_drop_tctx_refs+0x190/0x190 [ 526.541285][T14803] dump_stack+0x15/0x20 [ 526.545274][T14803] should_fail+0x3c6/0x510 [ 526.549537][T14803] should_fail_usercopy+0x1a/0x20 [ 526.554386][T14803] strncpy_from_user+0x24/0x2d0 [ 526.559073][T14803] ? fput_many+0x160/0x1b0 [ 526.563331][T14803] bpf_raw_tracepoint_open+0x2d4/0x950 [ 526.568719][T14803] ? do_send_sig_info+0xfb/0x230 [ 526.573482][T14803] ? bpf_obj_get_info_by_fd+0x3ce0/0x3ce0 [ 526.579359][T14803] ? group_send_sig_info+0x1ba/0x460 [ 526.584477][T14803] ? __lock_task_sighand+0x100/0x100 [ 526.589726][T14803] ? selinux_bpf+0xd2/0x100 [ 526.594060][T14803] ? security_bpf+0x82/0xb0 [ 526.598418][T14803] __sys_bpf+0x489/0x760 [ 526.602561][T14803] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 526.607772][T14803] ? debug_smp_processor_id+0x17/0x20 [ 526.612973][T14803] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 526.618878][T14803] __x64_sys_bpf+0x7c/0x90 [ 526.623130][T14803] x64_sys_call+0x87f/0x9a0 [ 526.627732][T14803] do_syscall_64+0x3b/0xb0 [ 526.632079][T14803] ? clear_bhb_loop+0x35/0x90 [ 526.636583][T14803] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 526.642309][T14803] RIP: 0033:0x7f5c40872759 [ 526.646655][T14803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 526.666092][T14803] RSP: 002b:00007f5c3f4a9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 526.674334][T14803] RAX: ffffffffffffffda RBX: 00007f5c40a2a130 RCX: 00007f5c40872759 [ 526.682148][T14803] RDX: 0000000000000010 RSI: 00000000200002c0 RDI: 0000000000000011 [ 526.689960][T14803] RBP: 00007f5c3f4a9090 R08: 0000000000000000 R09: 0000000000000000 [ 526.697776][T14803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 526.705581][T14803] R13: 0000000000000000 R14: 00007f5c40a2a130 R15: 00007ffd010cd2f8 [ 526.713398][T14803] [ 527.912961][T14830] ÿÿÿÿÿÿ: renamed from vlan1 [ 528.012558][T14837] device pim6reg1 entered promiscuous mode [ 528.476184][T14856] FAULT_INJECTION: forcing a failure. [ 528.476184][T14856] name failslab, interval 1, probability 0, space 0, times 0 [ 528.524123][T14856] CPU: 1 PID: 14856 Comm: syz.7.4017 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 528.535334][T14856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 528.545242][T14856] Call Trace: [ 528.548350][T14856] [ 528.551138][T14856] dump_stack_lvl+0x151/0x1c0 [ 528.555645][T14856] ? io_uring_drop_tctx_refs+0x190/0x190 [ 528.561110][T14856] ? prepare_signal+0x920/0xc20 [ 528.565801][T14856] dump_stack+0x15/0x20 [ 528.569792][T14856] should_fail+0x3c6/0x510 [ 528.574049][T14856] __should_failslab+0xa4/0xe0 [ 528.578641][T14856] should_failslab+0x9/0x20 [ 528.582980][T14856] slab_pre_alloc_hook+0x37/0xd0 [ 528.587767][T14856] kmem_cache_alloc_trace+0x48/0x210 [ 528.592879][T14856] ? bpf_raw_tracepoint_open+0x35c/0x950 [ 528.598361][T14856] bpf_raw_tracepoint_open+0x35c/0x950 [ 528.603637][T14856] ? do_send_sig_info+0xfb/0x230 [ 528.608499][T14856] ? bpf_obj_get_info_by_fd+0x3ce0/0x3ce0 [ 528.614052][T14856] ? group_send_sig_info+0x1ba/0x460 [ 528.619178][T14856] ? __lock_task_sighand+0x100/0x100 [ 528.624302][T14856] ? selinux_bpf+0xd2/0x100 [ 528.628637][T14856] ? security_bpf+0x82/0xb0 [ 528.633072][T14856] __sys_bpf+0x489/0x760 [ 528.637820][T14856] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 528.643190][T14856] ? debug_smp_processor_id+0x17/0x20 [ 528.648424][T14856] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 528.654300][T14856] __x64_sys_bpf+0x7c/0x90 [ 528.658557][T14856] x64_sys_call+0x87f/0x9a0 [ 528.662902][T14856] do_syscall_64+0x3b/0xb0 [ 528.667148][T14856] ? clear_bhb_loop+0x35/0x90 [ 528.671656][T14856] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 528.677475][T14856] RIP: 0033:0x7f5c40872759 [ 528.681725][T14856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 528.703995][T14856] RSP: 002b:00007f5c3f4ca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 528.712628][T14856] RAX: ffffffffffffffda RBX: 00007f5c40a2a058 RCX: 00007f5c40872759 [ 528.720563][T14856] RDX: 0000000000000010 RSI: 00000000200002c0 RDI: 0000000000000011 [ 528.729586][T14856] RBP: 00007f5c3f4ca090 R08: 0000000000000000 R09: 0000000000000000 [ 528.737681][T14856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 528.746333][T14856] R13: 0000000000000000 R14: 00007f5c40a2a058 R15: 00007ffd010cd2f8 [ 528.754187][T14856] [ 528.757611][T14845] device pim6reg1 entered promiscuous mode [ 529.214509][T14867] bond_slave_1: mtu greater than device maximum [ 530.017007][T14897] device sit0 left promiscuous mode [ 530.082887][T14900] device pim6reg1 entered promiscuous mode [ 530.113120][T14901] device sit0 entered promiscuous mode [ 530.682966][T14919] device macsec0 entered promiscuous mode [ 531.311577][T14940] device veth1_macvtap left promiscuous mode [ 531.357311][T14940] device macsec0 left promiscuous mode [ 531.963571][T14958] device sit0 entered promiscuous mode [ 532.526127][T14981] syz.6.4053[14981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.526202][T14981] syz.6.4053[14981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.774754][T15029] syz.7.4064[15029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.796498][T15029] syz.7.4064[15029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 534.530066][T15047] device veth0_vlan left promiscuous mode [ 534.742857][T15047] device veth0_vlan entered promiscuous mode [ 534.808079][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 534.837132][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 534.924154][ T2528] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 537.311072][T15106] device wg2 left promiscuous mode [ 540.034878][T15204] device sit0 left promiscuous mode [ 540.856983][T15235] device syzkaller0 entered promiscuous mode [ 541.923642][T15289] device wg2 left promiscuous mode [ 541.990889][T15289] device wg2 entered promiscuous mode [ 542.466102][ T30] audit: type=1400 audit(1732011105.639:180): avc: denied { create } for pid=15303 comm="syz.6.4140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 542.858354][T15311] device syzkaller0 entered promiscuous mode [ 543.086080][T15324] device veth0_vlan left promiscuous mode [ 543.132963][T15324] device veth0_vlan entered promiscuous mode [ 543.249963][T13730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 543.345484][T13730] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 543.382247][T13730] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 543.967732][T15345] bond_slave_1: mtu less than device minimum [ 544.593839][T15372] device pim6reg1 entered promiscuous mode [ 544.819060][T15385] syz.2.4164[15385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 544.819170][T15385] syz.2.4164[15385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.154852][T15386] device pim6reg1 entered promiscuous mode [ 547.787640][ T30] audit: type=1400 audit(1732011110.949:181): avc: denied { create } for pid=15455 comm="syz.7.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 550.778677][T15551] ÿÿÿÿÿÿ: renamed from vlan1 [ 550.984416][T15546] Â: renamed from pim6reg1 [ 551.762940][T15596] device syzkaller0 entered promiscuous mode [ 558.621046][T15732] device pim6reg1 entered promiscuous mode [ 838.445086][ T8] kworker/dying (8) used greatest stack depth: 19360 bytes left