last executing test programs: 21.864954101s ago: executing program 2 (id=4370): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xf, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) (fail_nth: 3) 21.351245648s ago: executing program 2 (id=4375): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x1, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="170000000000000004000000ff0000000000000006b70d61700f1713a3ec5d5438fe23dfc40b281cbde39fbb81bf7913f128c9ff60894e2bc8b7c405e3efbf4ee034347693778947d223a1b274018010e4d5bdd1847db3665a7c351be8c7d31db6cdbc06e0d2b7f01a7069c2375ef8c1ce00be4f9cce0530a62dc6af9efb1c6fabc647313ffc4f58ea7162de1ec44d8e5a7fc317195e8d5168ed51d3d9cb3dfd1df2a3896f1ca71b", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x10, 0xfff, @void, @value}, 0xffffffffffffffdf) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x10, 0xfff, @void, @value}, 0xffffffffffffffdf) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x6988b500, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x6988b500, 0x0, 0x0, 0x0, 0x0, 0x0) 20.537946561s ago: executing program 2 (id=4383): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xc, 0xe, &(0x7f0000001140)=ANY=[@ANYBLOB="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"/3493], &(0x7f0000000340)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="f6ea090003000060009ba538a44c", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 20.476540637s ago: executing program 2 (id=4388): ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) (async) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r0, 0x20, &(0x7f00000001c0)={&(0x7f0000000040)=""/156, 0x9c, 0x0, &(0x7f0000000100)=""/176, 0xb0}}, 0x10) (async) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r1, &(0x7f00000002c0)="8139a0b9cb4d76aec228ba2a93a1bffdb1da08e549d65c626046503e315eedb68bd90c47242ccaeb600067ff088538e9cfdd8a7e16ddb74ab1cdc71e1e2f0fb2a91ae8e246ae48b55d3a9f7dc6405d04d4c2ed19f69ba9198c1bfc0190160792928eeb59ca8ebd6c0678e824c5a29e6dc82b3dc87b17c8df7be4dd0923410a869157eedbd64d5841a21ea581748d06a2cb3d74bf2d053cb594401b9ec3d1ba6ea3b5dea7670cfb86efd3ad8c89df4ed2d5c9d579e8b65bfb74c45f8dd1d235e99530d38d58e1134085002aa8355c3076c406a2d3a444362723f1b7dae52893979865696539f8f90d2e939d59937d6e3341796361d78c5996db339af6fa5c", &(0x7f00000003c0)=""/155}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xec, &(0x7f0000000580)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0xea, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c80)={0xffffffffffffffff, 0xe0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa, &(0x7f0000000a00)=[0x0], &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x82, &(0x7f0000000a80)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0x91, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x3, 0x28, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0x10}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x359d}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}, @ldst={0x3, 0x2, 0x0, 0x6, 0xa, 0xffffffffffffffc0, 0x8}, @generic={0xd, 0x2, 0x6, 0x6, 0x7ff}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x6}, @ldst={0x1, 0x3, 0x2, 0x9, 0xb, 0x18}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0x5c, &(0x7f0000000940)=""/92, 0x40f00, 0x10, '\x00', r5, @fallback=0x28, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000cc0)={0x3, 0x8, 0x1000}, 0x10, r3, 0xffffffffffffffff, 0xa, &(0x7f0000000d00)=[r1, r1, r1, 0xffffffffffffffff, r1, r1], &(0x7f0000000d40)=[{0x0, 0x3, 0x10, 0x6}, {0x4, 0x1, 0x9, 0x8}, {0x0, 0x5, 0xb, 0x1}, {0x2, 0x3, 0x1, 0x1}, {0x0, 0x4, 0x7, 0xa}, {0x5, 0x3, 0x5, 0x2}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x3, 0x4, 0xa}, {0x1, 0x1, 0x0, 0x9}, {0x3, 0x1, 0xe, 0x5}], 0x10, 0x8000, @void, @value}, 0x94) (async) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000001000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x6, [@func={0x8, 0x0, 0x0, 0xc, 0x5}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x7, 0x80}, {0x3, 0x2000}, {0x7, 0x3}, {0x0, 0x9}]}, @const={0x4}, @enum={0x5, 0x3, 0x0, 0x6, 0x4, [{0x8, 0x4}, {0xd, 0x1}, {0xf, 0x1}]}, @const={0x0, 0x0, 0x0, 0xa, 0x2}, @var={0xa, 0x0, 0x0, 0xe, 0x3, 0x2}, @enum64={0x1, 0x4, 0x0, 0x13, 0x1, 0x2, [{0xd, 0x2, 0x9}, {0xb, 0x9, 0xc3e4}, {0xd, 0x8, 0x3}, {0xa, 0x8, 0x101}]}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0x4a, 0x0, 0x34}]}, {0x0, [0x4f, 0x1f87da2ba23197a9, 0x0, 0x2e]}}, &(0x7f0000001100)=""/19, 0xee, 0x13, 0x1, 0xffffffff, 0x10000, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000012c0)={0x6, 0x7, &(0x7f0000000ec0)=@raw=[@map_idx={0x18, 0x9, 0x5, 0x0, 0x5}, @exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x1}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000f00)='GPL\x00', 0x8, 0xb8, &(0x7f0000000f40)=""/184, 0x41100, 0x41, '\x00', r5, 0x25, r7, 0x8, &(0x7f0000001180)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0xff}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001200)=[r1, r1], &(0x7f0000001240)=[{0x0, 0x3, 0xf, 0xc}, {0x3, 0x1, 0x9, 0x5}, {0x4, 0x4, 0xd, 0xb}, {0x0, 0x5, 0x3, 0x4}, {0x1, 0x2, 0xa}, {0x5, 0x5, 0x1, 0x1}], 0x10, 0xe, @void, @value}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001380)={0x1b, 0x0, 0x0, 0x4, 0x0, r1, 0x5, '\x00', 0x0, r0, 0x5, 0x1, 0x4, 0x0, @void, @value, @void, @value}, 0x50) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r10 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001440)='syz1\x00', 0x200002, 0x0) r11 = openat$cgroup_ro(r10, &(0x7f0000001480)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001640)={r8, &(0x7f00000014c0)="a0a0ec69a1e9e7645b1eba2ab84ab8c2fa8f21152120cd5eb58b726e9d14865efe894d6bb7ccd051609686c2a216368f2ca18fdd1aeb90fee95faea3fb2afc655bf78e82ad3c26f4e7763fcf6da13eb23260972908e111316280bcaa4144a0544c7952891fc6ceb17b612acd226b9ee79be51cd8a0f9cd2a413c8975f6e895079ddbb62578b3c6807d2de37a62dd2713483be788497d3df7501c793736cd028ea14a390690f7bc721209734671067791465281e6a0da8c0868811dca69fd47664fd1", &(0x7f00000015c0)=""/105}, 0x20) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000018c0)={&(0x7f0000001680)="9b4feb82b193680ca6afc8bb8a4e75de90fc86ed46b4a8bc81c2c3d434c536fc5b686e726291da1d3ca315c503ee836a64641bc49559464d73c239f3b11fc0079ab3602bd9dd2c591ea067e3d879b7a6b5ee5466ef6c7490e18e3395ec92dc4fd2da4f78a5426d9e763061144c35616241b7a3eae166b33fd02e4c9165fde63078224d", &(0x7f0000001740)=""/133, &(0x7f0000001800)="326f7ab63a0f", &(0x7f0000001840)="24962d778664825b6feeb87354c8c22be5333053c0854b5bf6f84188974e11a417abf9052403a8dc52d2296404c7c68e3fdb8629b083c885a5959e7fc6094558b12ef53aa155fe4858b741d2ba67f68304c1713416369fece7416a33dc5e288d23d09c6272886f2990734a978c", 0x0, r11, 0x4}, 0x38) (async) openat$cgroup_devices(r9, &(0x7f0000001900)='devices.allow\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001980)={&(0x7f0000001940)='kyber_latency\x00', r6, 0x0, 0x20cc72e9}, 0x18) (async) r12 = syz_clone(0x99840000, &(0x7f0000001a80)="74333c1114c19c56a7249feaa3af6ebeca8cfa0d3328d1704350161ab69d831f8c9adf6e37b8e5a7b7577bb4cd2dc22f262a1c34a8b32ff88df1298bf1083115a900c8b36c3bc94039190880223e81a920c4ebb2902f6930c71cddb3a1cf1a375b15f1e505a6fe322e8cc6402792ca09a4fb480991f366deea3a", 0x7a, &(0x7f0000001b00), &(0x7f0000001b40), &(0x7f0000001b80)="a2e1726ec3dabce4efd50f7d36b49cd31119") perf_event_open(&(0x7f0000001a00)={0x3, 0x80, 0x8, 0x8, 0x1, 0xc, 0x0, 0x0, 0x404cc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f00000019c0), 0x1}, 0x0, 0x1, 0x4, 0x6, 0x6, 0x18f80000, 0x3, 0x0, 0x7f, 0x0, 0x7}, r12, 0x8, r11, 0x1) (async) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x19, 0xd, &(0x7f0000001bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x0, 0x7, 0x3, 0xf, 0x18, 0xfffffffffffffff1}, @generic={0x2, 0xf, 0x3, 0x3f, 0x6a9f}, @func, @alu={0x4, 0x1, 0xb, 0x4, 0x7, 0xffffffffffffffc0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x2}, @generic={0x4, 0x1, 0x0, 0x8, 0x2a7}, @exit, @map_idx={0x18, 0xa}]}, &(0x7f0000001c40)='GPL\x00', 0x5, 0x35, &(0x7f0000001c80)=""/53, 0x40f00, 0x10, '\x00', 0x0, @cgroup_sockopt=0x15, r7, 0x8, &(0x7f0000001cc0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000001d00)={0x2, 0x3, 0x6, 0x8000}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000001d40)=[r8, r1, r8, r1, r11, r8, r11, r11, r1], &(0x7f0000001d80)=[{0x0, 0x5, 0x2, 0x6}, {0x3, 0x2, 0x0, 0x8}, {0x5, 0x3, 0xa, 0x8}, {0x4, 0x4, 0x2, 0xc}], 0x10, 0x8, @void, @value}, 0x94) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={r8, 0x58, &(0x7f0000001e80)}, 0x10) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002300)={&(0x7f0000002180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf7, 0xf7, 0x5, [@var={0xc, 0x0, 0x0, 0xe, 0x5}, @datasec={0x3, 0x6, 0x0, 0xf, 0x1, [{0x5}, {0x1, 0x1, 0x9}, {0x2, 0x9, 0x8}, {0x3, 0xfffffffc, 0x7d000000}, {0x2, 0xffff7fff, 0x5}, {0x4, 0x0, 0x4}], "ab"}, @enum64={0x9, 0x2, 0x0, 0x13, 0x0, 0x8, [{0x7, 0x66, 0x4}, {0xf, 0x2, 0x2}]}, @restrict={0x9, 0x0, 0x0, 0xb, 0x5}, @datasec={0xb, 0x7, 0x0, 0xf, 0x2, [{0x1, 0x2, 0x4}, {0x4, 0x2, 0x6c8d}, {0x1, 0x8001, 0x7}, {0x4, 0x8001, 0x94}, {0x5, 0x2, 0xff}, {0x5, 0x10001, 0x9e5}, {0x3, 0x4a, 0x4c}], "e71a"}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000022c0), 0x115, 0x0, 0x1, 0x80000001, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000002400)={0x19, 0x1a, &(0x7f0000001f40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5d9, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@alu={0x7, 0x1, 0xd, 0x9, 0xa, 0xc}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1000}, @generic={0x3, 0x7, 0x7, 0x3ff, 0x2}, @map_val={0x18, 0x0, 0x2, 0x0, r11, 0x0, 0x0, 0x0, 0x7}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002040)='GPL\x00', 0x5, 0xf9, &(0x7f0000002080)=""/249, 0x100, 0x8, '\x00', r2, @cgroup_sockopt=0x15, r14, 0x8, &(0x7f0000002340)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000002380)={0x4, 0xb, 0x5, 0xf}, 0x10, 0x0, r13, 0x2, 0x0, &(0x7f00000023c0)=[{0x4, 0x1, 0x0, 0x8}, {0x2, 0x2, 0x1, 0xb}], 0x10, 0xd9, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000024c0)={0x0, r13}, 0x8) sendmsg$unix(r11, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002500)="059bfa7eff26ab4294a8a3feb02ffaa1db3a50fe2f7bbedc9f414186b6335757b1a589daad5196c34dea6efef273202932014550bdebbd69024eab10dd433ddf41a958ff3995c020aa41741da36cb5900fc7910b047f0415d5f14006283aee06cb1e64483e8401", 0x67}, {&(0x7f0000002580)="18df9c8bf05ce2791037a9ef6dc6ec44056eb4a0b9ea55679a326762cf0f6923a91e72da98b5a1b404a0f6242061528c3477f60414ad4e971d062b525d8f85241d5533ba424920", 0x47}, {&(0x7f0000002600)="b1347605901152368b6e265f481357ead2eceaaf613ef6c8108399bb231131915ef5ea2e926010a24dc0192b3621f8012def6fab0483419fd4e53d1c93d7a95051295989c9d13222474cc47dfefd18034a16be808327a8937ab85d1b69490002ca397b9473661750d40e", 0x6a}], 0x3, &(0x7f00000026c0)=[@rights={{0x14, 0x1, 0x1, [r14]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r12, 0xee01, 0xee01}}}], 0x58}, 0x4c040) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002c00)={r13, 0xe0, &(0x7f0000002b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000002940)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000002980)=[0x0], &(0x7f00000029c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe0, &(0x7f0000002a00)=[{}], 0x8, 0x10, &(0x7f0000002a40), &(0x7f0000002a80), 0x8, 0xb2, 0x8, 0x8, &(0x7f0000002ac0)}}, 0x10) r16 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002c40)={r4}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000002d00)={0x11, 0x9, &(0x7f0000002780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x3, 0x0, 0x2, 0xa, 0x3, 0xfffffffffffffffe}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffb}, @jmp={0x5, 0x0, 0xc, 0x7, 0x5, 0x80, 0xfffffffffffffff0}]}, &(0x7f0000002800)='GPL\x00', 0x3, 0xf3, &(0x7f0000002840)=""/243, 0x21780, 0x1, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r15, r16, 0x3, &(0x7f0000002c80)=[r11, r1, r11], &(0x7f0000002cc0)=[{0x1, 0x5, 0x6}, {0x4, 0x4, 0x1, 0x5}, {0x4, 0x2, 0xc, 0xa}], 0x10, 0x78b, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002e00)={&(0x7f0000002dc0)='track_foreign_dirty\x00', r13, 0x0, 0xdf7}, 0x18) 20.471252717s ago: executing program 2 (id=4391): mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x8) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000000000000000ab03bc2e13bd1966c5cc926d1be0d09b928e44fab077012b42e20777d6d843a5076d70260830a844972c31044295fbc60c0372c5358d72", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800000000000000790000007900000005000000100000000000000a020000000100000000000009000000000f00000000000011010000000700000004000000000000110300000001000000080000000100000fad08000000000000070000000002000000020000060400000008000000ff7f00000800000005000000000000002e613000"], &(0x7f0000000340)=""/60, 0x99, 0x3c, 0x1, 0xa4000000, 0x0, @void, @value}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r4}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB="000000f100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="cecb1fc3adcdd1fae5cf9d33c335e589d9b57e31b9083f497331ec822d63b5063a5b7bb57cede27d617b700f25808c2650e7a401", @ANYRES32=r6, @ANYRESDEC=r0, @ANYRESDEC=r3, @ANYRES32=r5, @ANYRESHEX=r1], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) 19.842838614s ago: executing program 2 (id=4409): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x9, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000007900400", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000002000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x50) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x11, &(0x7f00000013c0)=ANY=[], &(0x7f0000001340)='GPL\x00', 0x0, 0xdf, &(0x7f0000001480)=""/223, 0x40e00, 0x40, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000001580), 0x8, 0x10, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x60, &(0x7f00000002c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000300), 0x0, 0x0, 0x56, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000040e473313b40467c6520000000000001185246feb29ba1d5868642c9941ba157b2e612cade0e5aac86b8a8bc7f6df6d3c8546adc4e016f0b9f21742f885bc819619c88ac25f6f30e75f315d085ac77998ac52a4", @ANYRES32=r3, @ANYRES64=r2, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x5, 0x80000, 0x1, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000b00)={&(0x7f00000005c0)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000a40)=[{&(0x7f0000000600)="efb11e7b1a08792ea540f717121b06aea7", 0x11}, {&(0x7f0000000780)="b0b48a6c5199d5df031d8631fc8364d02d0e8d4c1ef15d4a238d21780bd6c810a46f340ecb5634954f97ff", 0x2b}, {&(0x7f00000007c0)="a80f8821ddcc619a48dd007543961d4525bbd5130b9b488330c0a543191792abadde2ca3dc579737db324808eb0c3ad5aa2aef505a96e4c4d3073b5e4d5fb95a785742a97d7e864aad9b6a13a64d07ad7a2d46a0a3ff91929a12b942edb4a93a5e776fe052d4e877c08f5d76bdbcfe8eb2a787bec6c03d0690b708884971bdf900288c", 0x83}, {&(0x7f0000000880)="32f7b2d24883edeb0bed6ebb4b11e38916e423f47792b79fe6beb464af04493fc0d2ce53bbef7509e02db54f7edc67a103f4f14500848318ee11c47f800ab3feb1dcba00e00dbbd3107d6f7ada2c878c936b2189aa6cfcc6de73d14a94a717a34f25e3ce1c4087a37e01b5123c48b49fb828a6948e6e1822414c035398632bc56220af2710a98f25624be24a3b8fdf6ee2a51eb859c6", 0x96}, {&(0x7f0000000940)="caa3a222b8f71db003beb8477e52cb10e3a59af358fe5f926f70117d8ffe7ce93fa6cabfce72dcf7a2bfe017511e31153ee0978cd6b882be5eeae5607e7de7bb18ea6be883f3b4728017740fc32a0eac14d512a51e33d29e45df17b77712331b21861bc629875e99773a71", 0x6b}, {&(0x7f0000001700)="c922a5b6570f09b78601665d1ee4b514633f7551337bcf093e26d3c12ac5617b0667eedb77ede6c0699dfe6c3df41e58f31f8981d6825edbbeb0cadd006a9c0b524503c4cc4103ed33a4a9b8d6b61f1eb38351abfc02e7d9217a5d8b475d631471601b8f3d4c2103ba7e94f7b48080cdd2e3cb8d0dd07a4988c625ddccea6bd8269f7f17261fdf37b097198bb12855ba7fd681c7fd53b5be85aed9bc31d45f75a1965af65456ac2449b686e2c2d5cdaf4f4f74b4d2a880a41d50efb9939f9f080a52b1504b3af4dd3e332b380e78162aaab4bd4e68b869a2191d063bea5aa4159a2ce0d4bf7ff41f3b38a341bdb828dbbdba5af302b58276cb097977271fa2834d08c54b756b20bf6b226c7e76d0dfc385249afcf9018c873ed0af01c7328b021b10b9a297d31fcf9ad0c0e67a6cb2152441c5664b5840bba8e15e8dc9b4b2db5682d2300994491f19c44181e689b40dc94c462c50a218991f2a567b0059a30a29a1f20cf60de670ef069e5203da1502fb3014803e429561c38c4ce8b3a3f58aadff981a0cea371b4c7cb76bde506d84c73863fe9831d2dde98d511a6bbfe429cbfd46fca12ada4251f0cf63679dd025531468a48afb6e50736e9954ff025d712e510486f01a5d1f5c45f7834802b8c14a565505e8ae65b93f5ee35249b8083c8df596088af898d784bf3bbf95b053398065d083f6787711cf3ef65b883c0af3eba05ff4e65ab3e1083a798bf5b71e1e6d8daf900b44defdb60de24d95c8ef10d9c4053189cfb90f469cba946246af72bd33fa258b1bc7d4421be834f63e97c1c23916d80c6a8b1259eec0764440c7e6f67708edf7321ba8b890ffb2124a557d2f6f039e3b5a599e9b86887560b66d064a9ef22588c6162497c3c7c81864551c6aea0b8b6d2502ffffc1f88addd2fce9a936816f9d6bc6f6cc165ab8d67a5cc0c9cafc30409c1e0682924527d08bdd97ad1ca842fe8803fbbdaf7c17c0cab242866fa4a5f0acfe28ce08664ed57fcf2f54f9df12566b63e5e68223c36db3dbde60c96e7c24c8e5155059ea947b9e7387130ebc935b40b61d865e7b6c93f526f5cfda5b24daa29cc0c85521b83156ec5a435f54329d66fed132f7f40d2b95bf29701eddfaca00211c30e246f1c6acf399c497136deaf272d32d4cd8a4ee065b499e9e07baa4803b020ce55ca5ed1e19547c1c2c188d8ee0561cd366e895e7c414efbcc37e5917f186cb250f7682f10ddba2ca6cfc9fc8e1986f4a874fa8ecb88916044189f9a795b1f558a94235ca79795d305057e4aee0abe15e4fc23e90ad536c7c678b03e68bdfbb0d9840418a88260c10f74cd258353e30d90e4681739606389f299f4fe4f9f3025b027ff1d6cdad729aefe3e8860dc1b51af119f1cb097d2fed14ebfc8e86af629eee0214db37a217c4c807adf6a5cea3a17355535fc83f84590a5ebd3582080e56c1e20a641b7909377fe51f48f3102f62aa20bb8ec71aab47e5454cfa865b16297b3c10e357097fc623c6a930b9617b13348faacee8808f5a9f9d6682caf792690b6e55423fdbae6e21fe331b920a410340e4e2f71204f5dc101272416fe991965f5c9fb40631a29e4dcfc23715a894ad73a43e7102e7a0a7fcf5cc59d8273429dfea96575e76bc1129cda5c07bd8cdde8d9f80cc8c3bb273085cc16fc13999a2d493030676a4cb74695ebd1e8f4470bbc0ab8a9708b89510ae32a62cf7d1c4b94e6ffcef7ae0a52ac5b165660991b6ca241ae347f238987e265d08ea850d83ada4ceebeeb4b3b3b15cb157c38453c6bc57c47c719c016d13f508a3cbfc2761e8c944e130f6765b2d9b09e6c1313fb88a6e82adbca6a1e9addd70911d70c11995b07fa08bbe1b138b593cb0b0e06dde3aede8f0ebc2b8d3ee42488e8f4609ba65a8af2e1d56fb8e4beefbdd1ca050560ed69e637b370fb60a93fca0cfdc5b6062bc713ace5255634a0eae797112a1e186a38af15fdd7650809918cfe453458ada9e3a51310bc67eb315e6e83f2d05740dcecef0f1a1fd14c4cccd4de0c288bd29837abe9a210858df8c96eaa2c6de0dff8a6a7ac81b65618ff3c276afa55a697f31429d9873ab82020d4efb88c4671c4c09f75bb57890e4e7b4be59fb18ffe9600c59e45dc14f68e9d50a0ce895666cd270e35e9941202f1b3c5f98e2a240605ffd984f0597a911645fc761d90a2d016f2f4bb777372f1684ccebede0b4349aba0a60587b6a193bd890c5f69fdf25dc0aafa24baa08ed09277756ca3760420bcc3c02c4288ed97c9bf5f03e345de9ab2ebbfb0ff65cdb5599aaac315f24aea718f1e0037ef5414635efb24494e00bbd0b83770002e9fd9d49905aa9ffcd29cb5cc3b36e49685d3d734642488945cf59bf6a49093ab29a211e507b69b237c06f807b241030cd506c36c2ffe9e0ea038bfd0e6671d19e16e469f1ffd85a8b57746c5c291e81fabd03ae5fb5fa8b583a08dd2470b49f7f13527ef7d9a8d4b0f991fb369f4fba2b34a20db4597fd4d3e5dd76008d26719974c371459679cd222f08406674ead43d0c959979fa7e272612fb200a873057be2db9c09706f459abcee74fdf2b3a3257dd5adb363252f7716bfebed4eda74bb40297613699b07cac63d381d89a90ff5dbc9e65d9ce194f8b26ff6291b9736029fbed72a499bb3b5cbfd275729c2c066db808f1a2906d629fdd39159a9f9ca91fdfef24a680d0b556faa06d8b2302be1dfc88f685410b896cab64b945b39f31013c4b80bbd5d18f920034016f98665f3640e610192e9809038dce451edea0483f835aff3263cfc53b4b66476f4934c3270261f3176b70eafc6ddd17f74e88fbf84a3d9dc62e994ed1e214a71875a1c065fec76865e019d5d925065fc92791f1b83ff96fdb0239425c910f61f0bf27477af1534f0730393fab302f93abe13c053a9f9c885cefa9248290922c63a720a3024130c60e928fb8c0c71bf0473ae0b2c33cc40e9a8f2d6af65acc0b18b94b689a1ceb6d6b428245e3193544653734d2208dd7dbc572b0bb8fec85fcfbe1bf0b0a3b5f4d3a0573c5695d2f01c02a146435833dd4dc907122973a974375f31b06c35bb880e99c1fafdb32044f10d6cd0aac2724ff4c4f796bcc7878a0bb0adb2d0b7ed74170fa0a2f783e2ef0fd7e8fc33b8bd990bc4a8dbdb7aaa6bf25215d968986b94ab276f7b0d1f857eabe704b1ec1c44bf14ec06a3e14c7c9a0cb6597f15935be84df0fb8de1d2ba27ff021af535a871c17e3ce92519548a58284da575e412576bc6ec5e22446e88f1ec76290c65e5f5a454edf8ac4971f9c8bbcc96237c23e4dfb3e567b015e8a6eb69c1847a0b755bf27a0b6663fb251c3518f96f50be6654979681964014fd4d0cd983e2ae4dc5d8e3104e510a475ec5a9cb94f0b72dfb62750d54499d7ce8a0d90842b397d38c3fbf7532e5f1e9450ad0e2cfa5c6c418f5e74062f87e28e95f96b311c3ecf095bbcee199919cc12aeb4dceaa1d62bc74b8dfece659e0492ccdb0a5a2e6b0528f8f07cdb2c3667ee4ab3a18c2a84fc7c437c7c212aad2c9af1c0415fc2cb7c7578aa5fca822c4eaa7166e20dc12e691a4abad132594ad7ea78800f546a96982da4b57a5ab09e4adf522d12185681e594409735467bd896de638ec461242297e29c25a8203e8b1d70ac2ffe67fc26b7c8c05272b0bfca8731743794d945c55a8100db142ad7a54ce47331862c3ed8ad9e7ebd2508ba8c4065b9b18c792087ad4be0d4257ba25cc1925f35c08cc086a4d630ad96623d25bcd5a47f057df55446117b3f83407f691c6860b67038a4cf3bbe688a0a8ae2e71fe5af40f4490dac1fa8069ef80334997e3d5aa011247c85d9ecf5c828319bdffce548f31a141e74f7b99e2652707f212ef018c9d7eb1939754088452b824ef2a0c41e4b73cba18eba7fba18590c924d4467313435357ac98ed82df894fcea320781aec177b8dbccdb903f4a0720abc4165063193c192f97a21605e6267564e016890e422a91a71abc716ed15380d3388f418523b3e5bebaac1d9be6d71f18ee5c15c796ee6fb31ae77c13b1a0321bfedf4efb1502f970361e903f84ba23e2b6c27787f221a7dc923234bb96a1f39a0b21890a3b3567d07fc9d2c29d43ea5dc6a2a9227dfd221d86e5033075fc75ed02bcdc712f3ccfe02c17845e777ddabb81c7a6d61753897f4586917e902ac1f1229971a801d08b3e199385f17f07126736e9520e2839504e6162377a27cc0d414055e840e5ac69209053aee0effb970a56efb8fda84d03249772393c7f9959e16c86f0722c786d280dd04ade2e1e889375dbd9609c65527349d2e9941c122e15b745b6358bab188f0793261d3d186cbfb057e22c6d746a8435c09a0781c252abccce613cafcf5516a49700edeaf27e2d00d38101c68276b13b3025c8fbb15a4b6699ce7ca9a4af9e1d353236e5e4f97cf3e858cf0b696d900964c345b9de6bc22d9515a5990a7829c22673cbf1dc1ccb31ea8517ce9d5a89686166f76bbd81767b364ed820e4f949d54ea556a326bc4074343013060981943aae175f72a1557f07663ad75c4391612ce3054fa399e44d31875223357bf112ec65735a17faa96e28c94888ceb4fad6f33792e410890a32fd15f9684562a2be66a1cfed642f7b0026be506f6ee0f2d26055dbc347097c41015236316776851948b5d6e9d732532212b2367a71c1e2d84d35c7b2bc4dad0e119d8da9509fca8c86c0324c70ae988eeea06fab03598ea4fa7648e0320410444b90edadaf7b70e3d024511847f785cb716704b537fbfc3f40135d1d5df79c8c53e7478ff362807b79ae757c3d0590be93434b720b249905322069aa6c2e434bd9b6a357cf2ab293e53395451f71b0555b726fa8cbb45c153686fd4dcf8ad570d290fee5c690981430516256f6d541ba20c32f4616ff79b8b3caee9c1a96830b427fed2df9041f2494609e9bf09734f06ebb918e589c4b71dcbf27109d01586f10d1ebc585f1d280bbf76808e186760ceed98729a41443cfd5ea00466a3eeafcc8cc9567c2f75f3759f2d46cee08fa9eda73fa3801f2b59faccda756f0e999890b65c05eb3c10f433a84b0ee7fca8fed63fadd7256b9bf5be034a1214808b8ee7da69e18f9067e251733b2c7798ce57dcb3c0319251ca47db41a028036d08bfba74bc7a01b8a6f46112aa8792f8b0c53d1091dd33b0bf1870e9fccb395aac54016756fb9e676a9cec5cd27eb6cbeda0f1a3af253272540562ae52180389e9fb128dd74362b416597455b4ef8fe29d63b09a00da78a762eb6496387473bf05235a378933aaf8490831c7710a77b8658b0a157248638712de14b082c90780d6365daf4d3602bb226b4d242b792ce1f77d3a65faa0caa7f3aa7cf604d0b2f9dc7eb401fed8d3226a97e7ded4973e7c0bef26202a4f2ab54598c1b5e417705d3562c262d9630b3f305a1042027be519958c25254ed8f13ae98037bcd69c17889fc8c025c6222d5f87826fdb0220551c408deadce150df9ecd9df7bf3f6f9d1f5cde7cf016d6a90ab36ec338b03d9b28af29daedec63962fd62bd7cd9dc65c7dd991ef05fb26d730598784840ec3d612d38b3e186217312741ba3440ead5aef7d0326a008e7a2cf9708107a7cfe6877bd6911192d92ac322781a5aba279abf09bb629225130000a0af1a764bfe0c54dcbaee578eeea9e5f4889c2a386217dd6bed2316645aff4b1ea051315e04d4b012863bfd8499c9f1487c75c3ad08f861da38f4a64a445719c43936bf832b743", 0x1000}, {&(0x7f00000009c0)="e7ae7065048cacde5c496b8964096bcc00724f309ef7cb78edecbaf9310f39c3c5e8b8bbefccff64e1602b30c5c0a90869943d1a7281e62e53fae3d54a47ef95eb668986063618c84e10fdf78d443cc0d1ab4336d8045923", 0x58}], 0x7, &(0x7f0000000ac0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x15}}], 0x18}, 0x4000) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_freezer_state(r9, &(0x7f0000000140), 0x2, 0x0) r11 = openat$cgroup_procs(r9, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x1d, 0x6, &(0x7f0000000b40)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @map_val={0x18, 0x6, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000b80)='GPL\x00', 0x5, 0x1000, &(0x7f0000002700)=""/4096, 0x40f00, 0x79, '\x00', 0x0, @lsm=0x2b, r1, 0x8, &(0x7f0000000bc0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000c00)={0x4, 0x7, 0x7f, 0x1}, 0x10, 0xffffffffffffffff, r4, 0x2, &(0x7f0000000c40)=[r0, 0xffffffffffffffff, r5, r8], &(0x7f0000000c80)=[{0x4, 0x1, 0x3, 0x7}, {0x5, 0x5, 0xc, 0xc}], 0x10, 0x7, @void, @value}, 0x94) write$cgroup_pid(r11, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r10, 0x0, 0x0) write$cgroup_freezer_state(r10, &(0x7f0000000200)='FROZEN\x00', 0x7) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, 0x0, 0x0) 5.608270172s ago: executing program 0 (id=4482): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 4.072769661s ago: executing program 0 (id=4483): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x200, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x4080b000, 0x0, 0x0, &(0x7f0000000e40), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000005c1fed7e555e2c00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0900000000000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000066cc51f191a7f71bd1b17ac5a12161aa5326006867aab722d499d96b3d89e1e0eb0c150a169cb97a999951ac18b297c5e7e9e1f5a9c86a9c1b28a101b3c91d6f64f72558f3b399106f44e08b84daac465f8fb81d1ebddb24a1e0ed49acafe53062fab32d769b863501583dd8abcadea7c7e961c87e3930948c6a7736181561338cec8d8792697a56b9b15796dc1c08ef49f08b9f18", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) socketpair(0x10, 0x1, 0x6, &(0x7f0000001840)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='devices.list\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x5, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000090000000000000000000018d70000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000002a000000bf0900000000000066090600000003e704000000060000001801000001006c2500000000002020207d9af8ff00000000ad9107000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b70000000000000095000000b187b1fea2504e"], &(0x7f0000000a00)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 4.059559602s ago: executing program 32 (id=4409): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x9, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000007900400", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000002000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x50) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x11, &(0x7f00000013c0)=ANY=[], &(0x7f0000001340)='GPL\x00', 0x0, 0xdf, &(0x7f0000001480)=""/223, 0x40e00, 0x40, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000001580), 0x8, 0x10, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x60, &(0x7f00000002c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000300), 0x0, 0x0, 0x56, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000040e473313b40467c6520000000000001185246feb29ba1d5868642c9941ba157b2e612cade0e5aac86b8a8bc7f6df6d3c8546adc4e016f0b9f21742f885bc819619c88ac25f6f30e75f315d085ac77998ac52a4", @ANYRES32=r3, @ANYRES64=r2, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x5, 0x80000, 0x1, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000b00)={&(0x7f00000005c0)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000a40)=[{&(0x7f0000000600)="efb11e7b1a08792ea540f717121b06aea7", 0x11}, {&(0x7f0000000780)="b0b48a6c5199d5df031d8631fc8364d02d0e8d4c1ef15d4a238d21780bd6c810a46f340ecb5634954f97ff", 0x2b}, {&(0x7f00000007c0)="a80f8821ddcc619a48dd007543961d4525bbd5130b9b488330c0a543191792abadde2ca3dc579737db324808eb0c3ad5aa2aef505a96e4c4d3073b5e4d5fb95a785742a97d7e864aad9b6a13a64d07ad7a2d46a0a3ff91929a12b942edb4a93a5e776fe052d4e877c08f5d76bdbcfe8eb2a787bec6c03d0690b708884971bdf900288c", 0x83}, {&(0x7f0000000880)="32f7b2d24883edeb0bed6ebb4b11e38916e423f47792b79fe6beb464af04493fc0d2ce53bbef7509e02db54f7edc67a103f4f14500848318ee11c47f800ab3feb1dcba00e00dbbd3107d6f7ada2c878c936b2189aa6cfcc6de73d14a94a717a34f25e3ce1c4087a37e01b5123c48b49fb828a6948e6e1822414c035398632bc56220af2710a98f25624be24a3b8fdf6ee2a51eb859c6", 0x96}, {&(0x7f0000000940)="caa3a222b8f71db003beb8477e52cb10e3a59af358fe5f926f70117d8ffe7ce93fa6cabfce72dcf7a2bfe017511e31153ee0978cd6b882be5eeae5607e7de7bb18ea6be883f3b4728017740fc32a0eac14d512a51e33d29e45df17b77712331b21861bc629875e99773a71", 0x6b}, {&(0x7f0000001700)="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", 0x1000}, {&(0x7f00000009c0)="e7ae7065048cacde5c496b8964096bcc00724f309ef7cb78edecbaf9310f39c3c5e8b8bbefccff64e1602b30c5c0a90869943d1a7281e62e53fae3d54a47ef95eb668986063618c84e10fdf78d443cc0d1ab4336d8045923", 0x58}], 0x7, &(0x7f0000000ac0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x15}}], 0x18}, 0x4000) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_freezer_state(r9, &(0x7f0000000140), 0x2, 0x0) r11 = openat$cgroup_procs(r9, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x1d, 0x6, &(0x7f0000000b40)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @map_val={0x18, 0x6, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000b80)='GPL\x00', 0x5, 0x1000, &(0x7f0000002700)=""/4096, 0x40f00, 0x79, '\x00', 0x0, @lsm=0x2b, r1, 0x8, &(0x7f0000000bc0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000c00)={0x4, 0x7, 0x7f, 0x1}, 0x10, 0xffffffffffffffff, r4, 0x2, &(0x7f0000000c40)=[r0, 0xffffffffffffffff, r5, r8], &(0x7f0000000c80)=[{0x4, 0x1, 0x3, 0x7}, {0x5, 0x5, 0xc, 0xc}], 0x10, 0x7, @void, @value}, 0x94) write$cgroup_pid(r11, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r10, 0x0, 0x0) write$cgroup_freezer_state(r10, &(0x7f0000000200)='FROZEN\x00', 0x7) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, 0x0, 0x0) 4.052711573s ago: executing program 3 (id=4486): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES16=r1, @ANYBLOB='\x00'/19, @ANYRES8=r0, @ANYRES32, @ANYBLOB="000000000000000000dca4572205"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b000000070000000100010008000000", @ANYRES32, @ANYBLOB="00430e00000000000000000000a3e8c83d43b49a1b10182b509e3e9e5abdd11acb85c0d53080d5c5c8e07bf5074bfd6d599aedae28d521329926e24101e73a6229720fba22c29079da9383c7e7e528ee9b959bcf507bbdc9783d7411795e6c8ec09ded67986a150388ee60797711a6dfe366ee0117590c54cb00"/133, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r11}, 0x10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 3.931351194s ago: executing program 4 (id=4405): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="ff0a000000000000000000000000000000020000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB='1-2:5/', @ANYRESHEX], 0x31) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r7}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) syz_clone(0x2108000, &(0x7f0000000540)="03a179a24b19c1812a68c127ba20979d022216d5018d5bb01d50836e22f7edee636cf98562e5afc9fa049152978569756af3b7a01aca19e76f09ebafb4ab2867801e311c2f6b8ff3db74def31991e4fe96303e2394cfc5fbd4b8f8283ff5939315edcdd9ed501c1c3e08cb235e84caaf64170b2e981d0fd08d6d12fb38fe1b03b929034a02da79f9ebea78e99994cbf87ab1a484667e7751201e085f185563bcb40f08867fbc5ed82ef53e76c48ba73361d60dec36f60bdcb5664668aacc5c9d8e5b", 0xc2, 0x0, &(0x7f0000000380), 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="6112a8000000000061134c0000000000bf2000000000000015000500541b48013d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586162c17600674290ca9d8d6413b8199e34f67ceaaa78710f9f8aba4765c91382f497585ca39c595b21afa6bce62b5ab0d44e9c32ad6f0349d92962a58d39494a19a9183362382792ac85578d3de07b7e155cf4ee5e3dd51212d2831bd8e2655b2fbd88791e4c66c832a774919b28b8a62711f0f156e636804e1d3f44a5ff3d63a3a51f0c7ec0c8c25e072194ddd83aa155a537e15c0d91f502deef03f83e826718705c9aef9613ac4a325a428d147c1749196e94226671fd9573ab0d079d44b13b56f793e98ab571c58e98e022f18a3be3f318e0690fff93f44f22473dc"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 3.845371842s ago: executing program 5 (id=4485): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) close(r2) 3.820791334s ago: executing program 3 (id=4489): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000b2ec3dbda15ba8822350b5068c6fbaac180627ececae77bcb61b713d9a3769b81f7c022eafb76a3dacbf02b01937976914e9b0bf90f9b765b39f9297b9437c7936774df682f9404afc6fefc8f22eb127991c81984836cfba69", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r0, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x3, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x2, 0x65bf, &(0x7f00000006c0)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9426}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_clone(0xf080200, &(0x7f0000000700)="09319d13b490a07f90e78adb", 0xc, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)="2c107a801ae09b8e14014c10558e3f9a1687dca3d96a02230f35e3d39e3e23") gettid() getpid() socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000018360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd6, 0xd6, 0xb, [@float={0xe, 0x0, 0x0, 0x10, 0x10}, @enum={0xd, 0x4, 0x0, 0x6, 0x4, [{0xf, 0x4b24c6ff}, {0x5, 0x4}, {0x2, 0x1}, {0xc, 0x563}]}, @func={0x4, 0x0, 0x0, 0xc, 0x2}, @datasec={0x6, 0x1, 0x0, 0xf, 0x2, [{0x3, 0xa, 0x9}], "9e78"}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x7, 0x5}, {0x1, 0x3}, {0x1, 0x5}, {0x4, 0x3}, {0xf, 0x4}, {0x2, 0x1}]}, @ptr={0x5, 0x0, 0x0, 0x2, 0x2}, @typedef={0x8, 0x0, 0x0, 0x8, 0x2}, @type_tag={0xe, 0x0, 0x0, 0x12, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xc6a8}}]}, {0x0, [0x2e, 0x2e, 0x5f, 0x61, 0x61, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000e00)=""/4096, 0xfb, 0x1000, 0x1, 0x9, 0x0, @void, @value}, 0x28) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000cc0)=""/254, 0x2e, 0xfe, 0x1, 0x0, 0x0, @void, @value}, 0x28) 3.596604664s ago: executing program 4 (id=4405): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="ff0a000000000000000000000000000000020000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB='1-2:5/', @ANYRESHEX], 0x31) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r7}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) syz_clone(0x2108000, &(0x7f0000000540)="03a179a24b19c1812a68c127ba20979d022216d5018d5bb01d50836e22f7edee636cf98562e5afc9fa049152978569756af3b7a01aca19e76f09ebafb4ab2867801e311c2f6b8ff3db74def31991e4fe96303e2394cfc5fbd4b8f8283ff5939315edcdd9ed501c1c3e08cb235e84caaf64170b2e981d0fd08d6d12fb38fe1b03b929034a02da79f9ebea78e99994cbf87ab1a484667e7751201e085f185563bcb40f08867fbc5ed82ef53e76c48ba73361d60dec36f60bdcb5664668aacc5c9d8e5b", 0xc2, 0x0, &(0x7f0000000380), 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.743511952s ago: executing program 0 (id=4492): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0)='FREEZING\x00', 0x9) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 1.738431652s ago: executing program 5 (id=4485): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) close(r2) 1.730231863s ago: executing program 3 (id=4494): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x6, 0x0, 0x5, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x2, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000800000001811000008562586b9c6ea5a52558c249c03822ccbd0443d81734f19bf27e29c7956f7374f62c014e3127093158486b25adce2e619621bc3c4b22fc9174bd3ce0b0dcec230036d09531c34f43f9a4d7c1ee92485a5f7916b9c4a3200002d79f430c5025554c136ea76d607bf88ff2d34296f68ceb1df051f6819c980c07c6ef74d3394440f5599f0052041703d9dd2c25e56f5784959b5af0b", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a', @ANYRES32, @ANYRES32=r4, @ANYBLOB], 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x2, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r7}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000001900000000000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, 0x0, &(0x7f0000000200)=""/166}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r8, &(0x7f0000000000), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61123000000000006113340000000000bf1000000000000015000200091b00003d030100000000008701000000000000bc26000000000000bf67000000000000560300000ee600f06702000014000000160300000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586e3f640f9f7e9a73b761ad4f0952a70046270d2b6436fdeecd791614ed46de741eb8cf91c046ef9beca574b350021c7ec6ef130f53748068ca432dae4e248b22b9ad8b2811f67916a1764578cba4b069037bfb3362d5691ac397f7e207145d970f0d97867552629b146645c785fb77dbeca38e49a9d5221f1f45f0a25890d04d91a15a05ae7e7ed6252c3d6c1973fb858de1da70d67317e7872b0603ce47ed2c1520e71b527bb42aa2e20e1e85df73736ed0a782ab7e7278dd54358cfdf6313d40f926332623625b49626481054787ab2dff85a9bebd6b317f26c691a65aa97bb3d1506a3a565e9c7ea5ad4611d2d77ee8a5c1b23814a26b6a20061fbb65bdd03770fa849f2a29ba69f90625f42592a70ba890f7a92878ae73574c3a233ee5954119931a1905210715fa77a8795f2fbec3797cb90f59fe8a4abec25f40c87bf25b750bbaa"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.673669918s ago: executing program 0 (id=4495): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x8000, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r4}, 0x18) openat$cgroup_freezer_state(r3, &(0x7f0000000380), 0x2, 0x0) close(0xffffffffffffffff) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x5, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r5, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r5, &(0x7f0000000040), 0x0}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000200000008000000000000000018110000", @ANYRES32=r6, @ANYRES32, @ANYRESDEC=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x4b, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.671671909s ago: executing program 1 (id=4496): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r1, &(0x7f00000006c0)="d65393e0a4481d99ef764b339a3b0f082257f8223aea2eca173e2f321b7d97e14c3e8fb485bd1e0a865a30e22fa4eda75f757f49fd46e499d55cab56ffceda27b41271272afd4589c5cdd6d04d7c6f9dbc14710a9ab324e1267052819dc88a051572e0c6155056aa8ff54cf1f9a92c30a37f0bb6d7daa44d59415750573a40164f0f106732261fa67a1feb35449f903e544bb8e97ee8b8fc1989fbbc928ef98a4b89a7d80867a8e34a771f251eed4cbe07b4aa5506e79f2c4d657ca6ea22c3794f92bc73150598d43d49f7d95e0db561ecaed9f21fa48506bd965e8b4618"}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000380)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r0}, 0x10) r7 = syz_clone(0x80008000, &(0x7f00000004c0)="176dc46f7002689e190a5c7d5188682493a33b9b77ff1f0c75643d4ddba3f174862adf81f91d5c73775456ad155f362a734e0e405296e04929675ba6cb44b323f391ef432900c4b896d8b8eb2c6dbeab4987a0c33b75717a0bd34574705b289c16e33d9326341e46443795506a2ac8c2528226130ed7bf6db20896f0b0b1bfb74d00df820a0371", 0x87, &(0x7f0000000180), &(0x7f0000000300), &(0x7f0000000340)="8edba1ac56951eb9d77e9638ec1a2ef675ccb0ac8f5c6812039b964ec67722732ec93ee118af6b1d38f3a0117394f128ba9fcf1ac2b412a206230e48d1ba") perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x4, 0x9, 0xa, 0x3, 0x0, 0xfffffffffffffff0, 0x1, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10, 0x1, @perf_config_ext={0xab77, 0xe93}, 0x111435, 0x0, 0x7, 0x2, 0xa6f, 0x1, 0x6, 0x0, 0x578, 0x0, 0x9}, r7, 0x5, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.671122399s ago: executing program 3 (id=4497): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.598168095s ago: executing program 1 (id=4498): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008e17fa7d71cf8e18e1e7624ae4f7bc1b47"], 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1952], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x40047451, 0x2000000c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000001a000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xcf44}, 0xa261, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, r6, 0x1) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280)={0x0, r5}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="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"/313], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000440)='erofs_destroy_inode\x00', r7}, 0xfffffffffffffdb3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r8, &(0x7f0000000480), 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r9, &(0x7f0000000180)='syz0\x00', 0x1ff) 1.54618236s ago: executing program 5 (id=4485): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) close(r2) 1.43484186s ago: executing program 0 (id=4499): perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000b6f2946c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r4, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000c) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000b6f2946c"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) sendmsg$tipc(r4, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(r4, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) (async) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) (async) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000c) (async) 1.43424531s ago: executing program 4 (id=4405): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="ff0a000000000000000000000000000000020000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB='1-2:5/', @ANYRESHEX], 0x31) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r7}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) syz_clone(0x2108000, &(0x7f0000000540)="03a179a24b19c1812a68c127ba20979d022216d5018d5bb01d50836e22f7edee636cf98562e5afc9fa049152978569756af3b7a01aca19e76f09ebafb4ab2867801e311c2f6b8ff3db74def31991e4fe96303e2394cfc5fbd4b8f8283ff5939315edcdd9ed501c1c3e08cb235e84caaf64170b2e981d0fd08d6d12fb38fe1b03b929034a02da79f9ebea78e99994cbf87ab1a484667e7751201e085f185563bcb40f08867fbc5ed82ef53e76c48ba73361d60dec36f60bdcb5664668aacc5c9d8e5b", 0xc2, 0x0, &(0x7f0000000380), 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.194192031s ago: executing program 5 (id=4485): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) close(r2) 1.112038759s ago: executing program 3 (id=4500): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3000000, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000000000)=ANY=[@ANYBLOB="180800001b000000000000000000001018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b5090000000000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018260000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000005000000b7000000000000009500000000000000d7e33f418f25268440942f5a443b142d5349c6efb27f5ee26d2b7abf044226b03285244397b4c479f0e13e842d6fb9a322eb3757e83458a082012b"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.111395989s ago: executing program 4 (id=4405): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="ff0a000000000000000000000000000000020000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB='1-2:5/', @ANYRESHEX], 0x31) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r7}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) syz_clone(0x2108000, &(0x7f0000000540)="03a179a24b19c1812a68c127ba20979d022216d5018d5bb01d50836e22f7edee636cf98562e5afc9fa049152978569756af3b7a01aca19e76f09ebafb4ab2867801e311c2f6b8ff3db74def31991e4fe96303e2394cfc5fbd4b8f8283ff5939315edcdd9ed501c1c3e08cb235e84caaf64170b2e981d0fd08d6d12fb38fe1b03b929034a02da79f9ebea78e99994cbf87ab1a484667e7751201e085f185563bcb40f08867fbc5ed82ef53e76c48ba73361d60dec36f60bdcb5664668aacc5c9d8e5b", 0xc2, 0x0, &(0x7f0000000380), 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 845.937963ms ago: executing program 1 (id=4501): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0x2, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random="2d19f7018a18"}) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000200)={'veth0_to_batadv\x00'}) 845.427073ms ago: executing program 5 (id=4485): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) close(r2) 736.173893ms ago: executing program 3 (id=4502): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000000000004200000040000000020100008281fb1e2d21864b629f6d218b6b141d50ebe0ce4c877b9304547c44e20d2bebf7726f70917b0202814940830029faa94c03312f", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r0}, 0x38) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x2e, 0x61]}}, &(0x7f0000000380)=""/187, 0x32, 0xbb, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xb, 0xff, 0x2, 0x9, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, 0x0, 0x35, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x1910, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x126b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffd, 0x4}, 0x10, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1e) 735.089353ms ago: executing program 0 (id=4503): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x200, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d649379071c33390e418ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad95a1c57a05f4f979ea13201bafe4f0f6ea508000000a0c548552b5708005647323c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177dc46c4604bca492ecec37e83efceefd7ca2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6fe2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679043e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d264e77124d18d4f5987baab97a9bfbd8f185b5631820420b75b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21579fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b1a4090631e1b9e16587bb5f721303e6b89e5c54d680ac66d09af0a1f5b83e69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e0bb24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868ffd08cd0e05023f4d8f95712207450e39a7550f42419bf30b31cac3fa1404e449c1cee0fff0d86a98dc9bf38a1e0b4fa5225dae5e781b43545b51681b2158f41bab1"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x4080b000, 0x0, 0x0, &(0x7f0000000e40), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000005c1fed7e555e2c00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0900000000000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000066cc51f191a7f71bd1b17ac5a12161aa5326006867aab722d499d96b3d89e1e0eb0c150a169cb97a999951ac18b297c5e7e9e1f5a9c86a9c1b28a101b3c91d6f64f72558f3b399106f44e08b84daac465f8fb81d1ebddb24a1e0ed49acafe53062fab32d769b863501583dd8abcadea7c7e961c87e3930948c6a7736181561338cec8d8792697a56b9b15796dc1c08ef49f08b9f18", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) socketpair(0x10, 0x1, 0x6, &(0x7f0000001840)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='devices.list\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x5, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000090000000000000000000018d70000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000002a000000bf0900000000000066090600000003e704000000060000001801000001006c2500000000002020207d9af8ff00000000ad9107000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b70000000000000095000000b187b1fea2504e"], &(0x7f0000000a00)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 734.282903ms ago: executing program 1 (id=4504): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000319faf07783e342ec08508000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x900, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'veth1_to_bond\x00', 0x10}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000380)='timer_start\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18004000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ff1900b802000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x6835, 0x9, 0x15, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f00000002c0)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) 733.574693ms ago: executing program 4 (id=4405): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="ff0a000000000000000000000000000000020000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB='1-2:5/', @ANYRESHEX], 0x31) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r7}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) syz_clone(0x2108000, &(0x7f0000000540)="03a179a24b19c1812a68c127ba20979d022216d5018d5bb01d50836e22f7edee636cf98562e5afc9fa049152978569756af3b7a01aca19e76f09ebafb4ab2867801e311c2f6b8ff3db74def31991e4fe96303e2394cfc5fbd4b8f8283ff5939315edcdd9ed501c1c3e08cb235e84caaf64170b2e981d0fd08d6d12fb38fe1b03b929034a02da79f9ebea78e99994cbf87ab1a484667e7751201e085f185563bcb40f08867fbc5ed82ef53e76c48ba73361d60dec36f60bdcb5664668aacc5c9d8e5b", 0xc2, 0x0, &(0x7f0000000380), 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 555.93593ms ago: executing program 1 (id=4505): socketpair(0x1, 0x1, 0x0, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) close(r1) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0xf31e, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000), 0xfdef) 554.796779ms ago: executing program 5 (id=4485): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) close(r2) 451.77µs ago: executing program 1 (id=4506): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r2, 0x20, &(0x7f0000000280)={&(0x7f0000000240)=""/9, 0x9, 0x0, &(0x7f0000000340)=""/204, 0xcc}}, 0x10) socketpair(0x11, 0x2, 0x6, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r2, 0x20, &(0x7f0000000280)={&(0x7f0000000240)=""/9, 0x9, 0x0, &(0x7f0000000340)=""/204, 0xcc}}, 0x10) (async) socketpair(0x11, 0x2, 0x6, &(0x7f00000004c0)) (async) 0s ago: executing program 4 (id=4405): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="ff0a000000000000000000000000000000020000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB='1-2:5/', @ANYRESHEX], 0x31) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r7}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) syz_clone(0x2108000, &(0x7f0000000540)="03a179a24b19c1812a68c127ba20979d022216d5018d5bb01d50836e22f7edee636cf98562e5afc9fa049152978569756af3b7a01aca19e76f09ebafb4ab2867801e311c2f6b8ff3db74def31991e4fe96303e2394cfc5fbd4b8f8283ff5939315edcdd9ed501c1c3e08cb235e84caaf64170b2e981d0fd08d6d12fb38fe1b03b929034a02da79f9ebea78e99994cbf87ab1a484667e7751201e085f185563bcb40f08867fbc5ed82ef53e76c48ba73361d60dec36f60bdcb5664668aacc5c9d8e5b", 0xc2, 0x0, &(0x7f0000000380), 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) kernel console output (not intermixed with test programs): +0x340/0x340 [ 51.960089][ T1483] ? security_file_ioctl+0x84/0xb0 [ 51.965037][ T1483] ? sock_poll+0x340/0x340 [ 51.969293][ T1483] __se_sys_ioctl+0x114/0x190 [ 51.973797][ T1483] __x64_sys_ioctl+0x7b/0x90 [ 51.978226][ T1483] do_syscall_64+0x34/0x70 [ 51.982479][ T1483] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.988204][ T1483] RIP: 0033:0x7f85764d6719 [ 51.992460][ T1483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.011984][ T1483] RSP: 002b:00007f857514f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 52.020233][ T1483] RAX: ffffffffffffffda RBX: 00007f857668df80 RCX: 00007f85764d6719 [ 52.028133][ T1483] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 52.035939][ T1483] RBP: 00007f857514f090 R08: 0000000000000000 R09: 0000000000000000 [ 52.043749][ T1483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.051650][ T1483] R13: 0000000000000000 R14: 00007f857668df80 R15: 00007ffcfbd37fe8 [ 52.710031][ T1492] tap0: tun_chr_ioctl cmd 1074025677 [ 52.724262][ T1492] tap0: linktype set to 65534 [ 53.644403][ T1521] FAULT_INJECTION: forcing a failure. [ 53.644403][ T1521] name failslab, interval 1, probability 0, space 0, times 0 [ 53.656871][ T1521] CPU: 0 PID: 1521 Comm: syz.0.349 Tainted: G W 5.10.226-syzkaller #0 [ 53.666088][ T1521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 53.675979][ T1521] Call Trace: [ 53.679121][ T1521] dump_stack_lvl+0x1e2/0x24b [ 53.683622][ T1521] ? panic+0x812/0x812 [ 53.687529][ T1521] ? bfq_pos_tree_add_move+0x43b/0x43b [ 53.692827][ T1521] dump_stack+0x15/0x17 [ 53.696816][ T1521] should_fail+0x3c6/0x510 [ 53.701073][ T1521] ? __alloc_skb+0x80/0x510 [ 53.705413][ T1521] __should_failslab+0xa4/0xe0 [ 53.710014][ T1521] should_failslab+0x9/0x20 [ 53.714346][ T1521] kmem_cache_alloc+0x3d/0x2e0 [ 53.718952][ T1521] ? _raw_spin_lock+0x1b0/0x1b0 [ 53.723633][ T1521] __alloc_skb+0x80/0x510 [ 53.727805][ T1521] fdb_notify+0x77/0x120 [ 53.731881][ T1521] fdb_delete+0x839/0xac0 [ 53.736048][ T1521] fdb_delete_local+0x3ce/0x470 [ 53.740737][ T1521] br_fdb_changeaddr+0x1bb/0x1c0 [ 53.745509][ T1521] br_device_event+0x3c6/0x7c0 [ 53.750107][ T1521] ? br_boolopt_multi_get+0xc0/0xc0 [ 53.755137][ T1521] ? packet_notifier+0x8af/0x8c0 [ 53.759918][ T1521] ? ipv6_mc_netdev_event+0x91/0x2f0 [ 53.765035][ T1521] raw_notifier_call_chain+0x8c/0xf0 [ 53.770171][ T1521] dev_set_mac_address+0x325/0x470 [ 53.775112][ T1521] ? dev_pre_changeaddr_notify+0x220/0x220 [ 53.780753][ T1521] dev_set_mac_address_user+0x31/0x50 [ 53.785953][ T1521] dev_ifsioc+0x657/0xae0 [ 53.790119][ T1521] ? dev_ioctl+0xb40/0xb40 [ 53.794373][ T1521] ? dev_get_by_name_rcu+0xc5/0xf0 [ 53.799316][ T1521] dev_ioctl+0x526/0xb40 [ 53.803400][ T1521] sock_do_ioctl+0x295/0x3a0 [ 53.807823][ T1521] ? sock_show_fdinfo+0xa0/0xa0 [ 53.812514][ T1521] ? kernel_write+0x3d0/0x3d0 [ 53.817024][ T1521] ? selinux_file_ioctl+0x3cc/0x540 [ 53.822062][ T1521] sock_ioctl+0x4a6/0x760 [ 53.826222][ T1521] ? sock_poll+0x340/0x340 [ 53.830487][ T1521] ? security_file_ioctl+0x84/0xb0 [ 53.835421][ T1521] ? sock_poll+0x340/0x340 [ 53.839678][ T1521] __se_sys_ioctl+0x114/0x190 [ 53.844188][ T1521] __x64_sys_ioctl+0x7b/0x90 [ 53.848614][ T1521] do_syscall_64+0x34/0x70 [ 53.852873][ T1521] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 53.858596][ T1521] RIP: 0033:0x7fcf79747719 [ 53.862850][ T1521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.882287][ T1521] RSP: 002b:00007fcf783c0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 53.890535][ T1521] RAX: ffffffffffffffda RBX: 00007fcf798fef80 RCX: 00007fcf79747719 [ 53.898347][ T1521] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000007 [ 53.906246][ T1521] RBP: 00007fcf783c0090 R08: 0000000000000000 R09: 0000000000000000 [ 53.914054][ T1521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 53.921868][ T1521] R13: 0000000000000000 R14: 00007fcf798fef80 R15: 00007ffc07d73968 [ 54.122328][ T24] audit: type=1400 audit(1731011709.760:148): avc: denied { create } for pid=1526 comm="syz.1.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 54.580999][ T1540] device wg2 entered promiscuous mode [ 55.330444][ T1560] device veth0_vlan left promiscuous mode [ 55.358669][ T1560] device veth0_vlan entered promiscuous mode [ 55.443471][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.456972][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.488000][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.455637][ T1600] device veth1_macvtap left promiscuous mode [ 56.468512][ T24] audit: type=1400 audit(1731011712.110:149): avc: denied { remove_name } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 56.491352][ T24] audit: type=1400 audit(1731011712.110:150): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 56.664728][ T1612] device syzkaller0 entered promiscuous mode [ 56.676631][ T1612] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 56.900624][ T24] audit: type=1400 audit(1731011712.540:151): avc: denied { create } for pid=1647 comm="syz.3.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 56.903366][ T1644] device syzkaller0 entered promiscuous mode [ 56.950896][ T1644] device syzkaller0 left promiscuous mode [ 57.008660][ T24] audit: type=1400 audit(1731011712.560:152): avc: denied { create } for pid=1647 comm="syz.3.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 58.189949][ T1713] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 58.692479][ T24] audit: type=1400 audit(1731011714.330:153): avc: denied { create } for pid=1752 comm="syz.2.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 58.752641][ T1754] device sit0 left promiscuous mode [ 58.920481][ T1754] device sit0 entered promiscuous mode [ 59.412269][ T1762] device veth0_vlan left promiscuous mode [ 59.425753][ T1762] device veth0_vlan entered promiscuous mode [ 59.544326][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.553306][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.579990][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.746745][ T1788] syz.2.426[1788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.746804][ T1788] syz.2.426[1788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.913303][ T1832] device wg2 entered promiscuous mode [ 62.723874][ T1873] device syzkaller0 entered promiscuous mode [ 64.556517][ T1946] device veth1_macvtap left promiscuous mode [ 64.624800][ T1948] device wg2 left promiscuous mode [ 64.716658][ T1948] device wg2 entered promiscuous mode [ 64.947589][ T1976] device pim6reg1 entered promiscuous mode [ 64.984700][ T1969] device pim6reg1 entered promiscuous mode [ 65.841916][ T24] audit: type=1400 audit(1731011721.480:154): avc: denied { create } for pid=1980 comm="syz.3.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 66.989511][ T2036] device wg2 left promiscuous mode [ 67.053681][ T2038] device wg2 entered promiscuous mode [ 67.162552][ T2039] device syzkaller0 entered promiscuous mode [ 68.235763][ T2074] device sit0 entered promiscuous mode [ 69.191076][ T2091] device syzkaller0 entered promiscuous mode [ 69.841506][ T2116] syz.4.522[2116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.841564][ T2116] syz.4.522[2116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.941555][ T2116] syz.4.522[2116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.973203][ T2116] syz.4.522[2116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.009524][ T2116] syz.4.522[2116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.112523][ T2116] syz.4.522[2116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.807802][ T24] audit: type=1400 audit(1731011726.440:155): avc: denied { create } for pid=2136 comm="syz.3.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 72.701313][ T2190] device pim6reg1 entered promiscuous mode [ 73.811025][ T2230] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 73.929126][ T2230] device syzkaller0 entered promiscuous mode [ 73.966232][ T2237] device pim6reg1 entered promiscuous mode [ 74.331047][ T2258] syz.1.560[2258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.335635][ T2258] syz.1.560[2258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.290849][ T2300] device wg2 left promiscuous mode [ 75.530342][ T2300] device wg2 entered promiscuous mode [ 76.322640][ T2366] device syzkaller0 entered promiscuous mode [ 77.187239][ T2402] device wg2 left promiscuous mode [ 77.210259][ T2409] ref_ctr_offset mismatch. inode: 0x218 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 77.226500][ T2402] device wg2 entered promiscuous mode [ 77.307161][ T2408] device syzkaller0 entered promiscuous mode [ 77.529457][ T2419] device veth0_vlan left promiscuous mode [ 77.557568][ T2419] device veth0_vlan entered promiscuous mode [ 77.669983][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.683072][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.697478][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.178926][ T2478] syz.3.621[2478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.178983][ T2478] syz.3.621[2478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.602762][ T2483] device wg2 left promiscuous mode [ 80.110423][ T2499] device pim6reg1 entered promiscuous mode [ 80.399561][ T2511] device syzkaller0 entered promiscuous mode [ 80.406367][ T2507] ÿÿÿÿÿÿ: renamed from vlan1 [ 81.290770][ T2547] device wg2 entered promiscuous mode [ 81.611913][ T2561] device syzkaller0 entered promiscuous mode [ 82.019843][ T24] audit: type=1400 audit(1731011737.660:156): avc: denied { create } for pid=2578 comm="syz.0.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 82.452024][ T2597] device pim6reg1 entered promiscuous mode [ 83.335593][ T2625] device pim6reg1 entered promiscuous mode [ 83.361450][ T2620] device syzkaller0 entered promiscuous mode [ 83.796547][ T2646] device bridge_slave_1 left promiscuous mode [ 83.837834][ T2646] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.901350][ T2646] device bridge_slave_0 left promiscuous mode [ 83.929110][ T2646] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.118594][ T2775] syz.0.710[2775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.118656][ T2775] syz.0.710[2775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.087741][ T2806] device veth0_vlan left promiscuous mode [ 89.132384][ T2806] device veth0_vlan entered promiscuous mode [ 89.890707][ T2815] device macsec0 entered promiscuous mode [ 91.138320][ T2833] device wg2 entered promiscuous mode [ 91.693806][ T2856] device vxcan1 entered promiscuous mode [ 91.863897][ T2860] device pim6reg1 entered promiscuous mode [ 92.446368][ T2880] device sit0 entered promiscuous mode [ 92.947110][ T2899] device sit0 entered promiscuous mode [ 93.923108][ T24] audit: type=1400 audit(1731011749.540:157): avc: denied { create } for pid=2958 comm="syz.0.759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 94.952778][ T2985] syz.4.767[2985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.952858][ T2985] syz.4.767[2985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.154007][ T2997] syz.4.770[2997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.443291][ T3050] device sit0 left promiscuous mode [ 97.615720][ T3052] device sit0 entered promiscuous mode [ 99.290034][ T3103] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.297078][ T3103] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.957763][ T24] audit: type=1400 audit(1731011755.560:158): avc: denied { create } for pid=3121 comm="syz.4.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 100.489038][ T24] audit: type=1400 audit(1731011756.130:159): avc: denied { append } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.591716][ T24] audit: type=1400 audit(1731011756.130:160): avc: denied { open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.736951][ T24] audit: type=1400 audit(1731011756.130:161): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 101.362311][ T3185] device pim6reg1 entered promiscuous mode [ 101.721983][ T3196] device bridge_slave_1 left promiscuous mode [ 101.749307][ T3196] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.791987][ T3196] device bridge_slave_0 left promiscuous mode [ 101.831052][ T3196] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.798553][ T3282] device wg2 left promiscuous mode [ 103.805280][ T3284] device wg2 left promiscuous mode [ 103.816443][ T3284] syz.0.845[3284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.816501][ T3284] syz.0.845[3284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.832649][ T3282] device wg2 entered promiscuous mode [ 103.961321][ T3284] device wg2 entered promiscuous mode [ 104.714103][ T3332] device pim6reg1 entered promiscuous mode [ 105.247548][ T3366] device syzkaller0 entered promiscuous mode [ 105.689453][ T3362] device wg2 left promiscuous mode [ 105.782354][ T3381] device wg2 entered promiscuous mode [ 105.990588][ T3388] device pim6reg1 entered promiscuous mode [ 106.355004][ T3412] device pim6reg1 entered promiscuous mode [ 107.867747][ T3455] device pim6reg1 entered promiscuous mode [ 111.229661][ T3531] syz.4.914[3531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.229717][ T3531] syz.4.914[3531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.870000][ T3545] syz.1.920[3545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.919978][ T3545] syz.1.920[3545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.577388][ T3574] device pim6reg1 entered promiscuous mode [ 112.630321][ T3576] device pim6reg1 entered promiscuous mode [ 112.689361][ T3576] device syzkaller0 entered promiscuous mode [ 113.109065][ T24] audit: type=1400 audit(1731011768.740:162): avc: denied { create } for pid=3593 comm="syz.3.933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 113.479450][ T3620] syz.2.940[3620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.479510][ T3620] syz.2.940[3620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.529885][ T3620] syz.2.940[3620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.548195][ T3620] syz.2.940[3620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.570508][ T3620] syz.2.940[3620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.784669][ T3666] device pim6reg1 entered promiscuous mode [ 116.304888][ T24] audit: type=1400 audit(1731011771.930:163): avc: denied { ioctl } for pid=3709 comm="syz.2.968" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 116.437381][ T3720] syz.2.971[3720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.437452][ T3720] syz.2.971[3720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.450961][ T3720] syz.2.971[3720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.479457][ T3720] syz.2.971[3720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.888152][ T3726] device pim6reg1 entered promiscuous mode [ 117.562217][ T3764] device pim6reg1 entered promiscuous mode [ 117.947119][ T3775] device syzkaller0 entered promiscuous mode [ 118.437344][ T3784] device syzkaller0 entered promiscuous mode [ 118.713852][ T3804] device pim6reg1 entered promiscuous mode [ 118.876508][ T285] cgroup: fork rejected by pids controller in /syz0 [ 118.890298][ T3817] device pim6reg1 entered promiscuous mode [ 119.228657][ T3860] device pim6reg1 entered promiscuous mode [ 119.259875][ T3864] device wg2 left promiscuous mode [ 119.399047][ T3864] device wg2 entered promiscuous mode [ 119.521706][ T3862] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.555828][ T3862] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.596747][ T3862] device bridge_slave_0 entered promiscuous mode [ 119.663856][ T3862] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.720068][ T3862] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.738601][ T3862] device bridge_slave_1 entered promiscuous mode [ 119.789467][ T24] audit: type=1400 audit(1731011775.430:164): avc: denied { create } for pid=3862 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 119.853595][ T3862] device veth0_vlan entered promiscuous mode [ 119.870571][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 119.902767][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 119.915843][ T24] audit: type=1400 audit(1731011775.430:165): avc: denied { write } for pid=3862 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 119.949654][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 119.981741][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.025237][ T24] audit: type=1400 audit(1731011775.430:166): avc: denied { read } for pid=3862 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 120.046899][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.086805][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.122300][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.160067][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.199507][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 120.236188][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 120.247915][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.254815][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.266977][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 120.291785][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 120.305113][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.312005][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.326077][ T3862] device veth1_macvtap entered promiscuous mode [ 120.358264][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 120.367681][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 120.504882][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 120.588688][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 120.707715][ T3903] device pim6reg1 entered promiscuous mode [ 120.816074][ T24] audit: type=1400 audit(1731011776.450:167): avc: denied { mounton } for pid=3862 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 121.393185][ T3920] device syzkaller0 entered promiscuous mode [ 121.794474][ T9] device bridge_slave_1 left promiscuous mode [ 121.814718][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.829393][ T9] device bridge_slave_0 left promiscuous mode [ 121.840894][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.854519][ T9] device veth1_macvtap left promiscuous mode [ 122.154837][ T3955] device pim6reg1 entered promiscuous mode [ 122.998341][ T4015] device veth0_vlan left promiscuous mode [ 123.073117][ T4015] device veth0_vlan entered promiscuous mode [ 123.195095][ T4012] device pim6reg1 entered promiscuous mode [ 123.212586][ T4022] device pim6reg1 entered promiscuous mode [ 123.376133][ T4040] syz.4.1068[4040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.376192][ T4040] syz.4.1068[4040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.424310][ T4040] syz.4.1068[4040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.455867][ T4040] syz.4.1068[4040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.075076][ T4079] device macsec0 entered promiscuous mode [ 124.205737][ T4091] syz.4.1082[4091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.205791][ T4091] syz.4.1082[4091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.302255][ T4091] syz.4.1082[4091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.387284][ T4091] syz.4.1082[4091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.290082][ T4172] syz.0.1100[4172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.337523][ T4172] syz.0.1100[4172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.906577][ T4252] device pim6reg1 entered promiscuous mode [ 128.517260][ T4283] device pim6reg1 entered promiscuous mode [ 129.314019][ T4302] device syzkaller0 entered promiscuous mode [ 129.394171][ T4306] device veth0_to_bond entered promiscuous mode [ 129.810319][ T4330] device syzkaller0 entered promiscuous mode [ 129.929938][ T4340] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.936976][ T4340] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.096971][ T4349] device pim6reg1 entered promiscuous mode [ 130.115131][ T4350] device bridge_slave_1 left promiscuous mode [ 130.165305][ T4350] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.239991][ T4350] device bridge_slave_0 left promiscuous mode [ 130.287966][ T4350] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.949037][ T4354] device syzkaller0 entered promiscuous mode [ 130.982733][ T4376] device veth1_macvtap left promiscuous mode [ 130.988624][ T4376] device macsec0 left promiscuous mode [ 131.142423][ T4394] bpf_get_probe_write_proto: 2 callbacks suppressed [ 131.142432][ T4394] syz.3.1166[4394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.153206][ T4394] syz.3.1166[4394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.465684][ T4414] syz.1.1172[4414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.528418][ T4414] syz.1.1172[4414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.540414][ T4418] syz.1.1172[4418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.599981][ T4418] syz.1.1172[4418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.606321][ T4419] device syzkaller0 entered promiscuous mode [ 132.919364][ T4456] device veth0_vlan left promiscuous mode [ 132.965220][ T4456] device veth0_vlan entered promiscuous mode [ 134.679986][ T4489] syz.1.1196[4489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.680044][ T4489] syz.1.1196[4489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.700115][ T4489] syz.1.1196[4489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.777971][ T4489] syz.1.1196[4489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.450504][ T4512] device pim6reg1 entered promiscuous mode [ 136.382481][ T4554] device pim6reg1 entered promiscuous mode [ 136.663388][ T4570] device pim6reg1 entered promiscuous mode [ 137.320033][ T4594] ÿÿÿÿÿÿ: renamed from vlan1 [ 137.571254][ T4613] device pim6reg1 entered promiscuous mode [ 139.003443][ T4681] device veth0_vlan left promiscuous mode [ 139.045906][ T4681] device veth0_vlan entered promiscuous mode [ 139.307679][ T4689] device pim6reg1 entered promiscuous mode [ 139.704920][ T4700] bpf_get_probe_write_proto: 6 callbacks suppressed [ 139.704929][ T4700] syz.1.1257[4700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.711703][ T4700] syz.1.1257[4700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.383102][ T4715] syz.0.1262[4715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.409427][ T4715] syz.0.1262[4715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.278613][ T4748] device pimreg0 entered promiscuous mode [ 141.947136][ T4789] device pim6reg1 entered promiscuous mode [ 142.120037][ T24] audit: type=1400 audit(1731011797.760:168): avc: denied { create } for pid=4796 comm="syz.3.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 151.132621][ T4840] device pim6reg1 entered promiscuous mode [ 151.279729][ T4843] device pim6reg1 entered promiscuous mode [ 151.479985][ T4846] device sit0 left promiscuous mode [ 155.202549][ T5050] syz.3.1326[5050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.202605][ T5050] syz.3.1326[5050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.247729][ T4951] device syzkaller0 entered promiscuous mode [ 156.011111][ T5060] syz.3.1329 (5060) used obsolete PPPIOCDETACH ioctl [ 158.792074][ T5143] device pim6reg1 entered promiscuous mode [ 159.158930][ T5155] device veth0_vlan left promiscuous mode [ 159.225855][ T5155] device veth0_vlan entered promiscuous mode [ 159.301463][ T5161] device pim6reg1 entered promiscuous mode [ 159.322210][ T5156] device pim6reg1 entered promiscuous mode [ 159.773470][ T5177] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.780488][ T5177] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.983247][ T5177] device bridge_slave_1 left promiscuous mode [ 160.075247][ T5177] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.102092][ T5177] device bridge_slave_0 left promiscuous mode [ 160.111555][ T5177] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.302350][ T5194] device wg2 left promiscuous mode [ 160.438229][ T5202] device wg2 entered promiscuous mode [ 160.544012][ T5203] device syzkaller0 entered promiscuous mode [ 161.005019][ T5217] device pim6reg1 entered promiscuous mode [ 162.132552][ T5271] device pim6reg1 entered promiscuous mode [ 162.270728][ T5278] syz.4.1387[5278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.270784][ T5278] syz.4.1387[5278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.700580][ T5308] device syzkaller0 entered promiscuous mode [ 164.408033][ T5327] device pim6reg1 entered promiscuous mode [ 164.482667][ T5321] device sit0 entered promiscuous mode [ 164.993511][ T5350] device sit0 left promiscuous mode [ 165.048121][ T5357] cgroup: fork rejected by pids controller in /syz4 [ 165.270956][ T5378] device pim6reg1 entered promiscuous mode [ 165.465902][ T5374] device veth0_vlan left promiscuous mode [ 165.498608][ T5374] device veth0_vlan entered promiscuous mode [ 165.505570][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.537513][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.614352][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 166.050098][ T5389] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.057143][ T5389] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.087140][ T5389] device bridge_slave_0 entered promiscuous mode [ 166.110094][ T5389] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.116960][ T5389] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.149250][ T5389] device bridge_slave_1 entered promiscuous mode [ 166.472437][ T5389] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.479327][ T5389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.486419][ T5389] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.493223][ T5389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.533322][ T5425] device veth0_vlan left promiscuous mode [ 166.555457][ T5425] device veth0_vlan entered promiscuous mode [ 166.709920][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.722098][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.735220][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.745249][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.753001][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.775834][ T5431] device pim6reg1 entered promiscuous mode [ 166.823906][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.832422][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.922044][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.930395][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.938795][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.945668][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.954595][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.962834][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.980333][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.987206][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.065649][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.077988][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.096258][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.112934][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.206905][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.220380][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.266019][ T5389] device veth0_vlan entered promiscuous mode [ 167.332384][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.343700][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.377118][ T5389] device veth1_macvtap entered promiscuous mode [ 167.465674][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.475869][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.495477][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 167.512406][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.530258][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.581552][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.602010][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.617034][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 167.632145][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 167.747442][ T5460] -: renamed from syzkaller0 [ 167.861552][ T5464] syz.3.1438[5464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.861612][ T5464] syz.3.1438[5464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.880219][ T5462] device veth1_macvtap entered promiscuous mode [ 168.008292][ T5462] device macsec0 entered promiscuous mode [ 168.045378][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 168.182941][ T5476] device pim6reg1 entered promiscuous mode [ 168.423906][ T5480] device veth0_vlan left promiscuous mode [ 168.445181][ T5480] device veth0_vlan entered promiscuous mode [ 168.929765][ T5521] device pim6reg1 entered promiscuous mode [ 169.351154][ T5524] device syzkaller0 entered promiscuous mode [ 170.752646][ T5558] device pim6reg1 entered promiscuous mode [ 171.233104][ T24] audit: type=1400 audit(1731011826.870:169): avc: denied { create } for pid=5570 comm="syz.3.1471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 171.256323][ T5576] device sit0 left promiscuous mode [ 171.668109][ T5580] device sit0 entered promiscuous mode [ 172.223927][ T5604] device pim6reg1 entered promiscuous mode [ 172.612780][ T5623] device pim6reg1 entered promiscuous mode [ 172.647102][ T24] audit: type=1400 audit(1731011828.280:170): avc: denied { create } for pid=5624 comm="syz.0.1485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 172.719819][ T5623] device syzkaller0 entered promiscuous mode [ 173.346189][ T5639] device veth0_vlan left promiscuous mode [ 173.415160][ T5639] device veth0_vlan entered promiscuous mode [ 174.150199][ T5662] device syzkaller0 entered promiscuous mode [ 174.204127][ T5663] device pim6reg1 entered promiscuous mode [ 174.728848][ T5712] device pim6reg1 entered promiscuous mode [ 175.293836][ T5792] device pim6reg1 entered promiscuous mode [ 176.138497][ T5836] device veth0_vlan left promiscuous mode [ 176.147471][ T5836] device veth0_vlan entered promiscuous mode [ 176.285713][ T5845] device pim6reg1 entered promiscuous mode [ 176.319755][ T5834] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.329637][ T5834] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.337659][ T5834] device bridge_slave_0 entered promiscuous mode [ 176.368628][ T5834] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.375550][ T5834] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.383001][ T5834] device bridge_slave_1 entered promiscuous mode [ 176.401811][ T5848] device syzkaller0 entered promiscuous mode [ 176.458707][ T387] device bridge_slave_1 left promiscuous mode [ 176.464668][ T387] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.529037][ T387] device bridge_slave_0 left promiscuous mode [ 176.535007][ T387] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.589201][ T387] device veth1_macvtap left promiscuous mode [ 176.595044][ T387] device veth0_vlan left promiscuous mode [ 180.052674][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.060402][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.092577][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.102423][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.161312][ T387] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.168216][ T387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.206794][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.235281][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.244597][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.253153][ T387] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.260033][ T387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.267829][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.277569][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.296253][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 180.307725][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.318772][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.326073][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.334664][ T5834] device veth0_vlan entered promiscuous mode [ 180.371324][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 180.394458][ T5834] device veth1_macvtap entered promiscuous mode [ 180.418396][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 180.428249][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 180.918380][ T5902] device pim6reg1 entered promiscuous mode [ 181.125900][ T5910] Â: renamed from pim6reg1 [ 181.376852][ T95] udevd[95]: worker [5859] terminated by signal 33 (Unknown signal 33) [ 181.447226][ T95] udevd[95]: worker [5859] failed while handling '/devices/virtual/block/loop0' [ 181.518808][ T5939] device sit0 left promiscuous mode [ 181.576310][ T95] udevd[95]: worker [5854] terminated by signal 33 (Unknown signal 33) [ 181.699831][ T95] udevd[95]: worker [5854] failed while handling '/devices/virtual/block/loop3' [ 181.715712][ T5942] device sit0 entered promiscuous mode [ 181.737514][ T95] udevd[95]: worker [5947] terminated by signal 33 (Unknown signal 33) [ 181.747708][ T95] udevd[95]: worker [5947] failed while handling '/devices/virtual/block/loop4' [ 182.126091][ T5948] device pim6reg1 entered promiscuous mode [ 182.395877][ T5966] device pim6reg1 entered promiscuous mode [ 182.649624][ T5989] syz.4.1570[5989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.649681][ T5989] syz.4.1570[5989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.690101][ T5991] device sit0 left promiscuous mode [ 182.934681][ T6000] device sit0 entered promiscuous mode [ 183.385570][ T6020] device pim6reg1 entered promiscuous mode [ 183.394151][ T6022] device sit0 left promiscuous mode [ 183.528491][ T6022] device pim6reg1 entered promiscuous mode [ 183.716247][ T6028] Â: renamed from pim6reg1 [ 183.846834][ T6039] syz.4.1584[6039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.846901][ T6039] syz.4.1584[6039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.916157][ T6041] device veth1_macvtap left promiscuous mode [ 183.954607][ T6044] syz.1.1585[6044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.954670][ T6044] syz.1.1585[6044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.974634][ T6041] device macsec0 left promiscuous mode [ 184.058243][ T6045] device veth1_macvtap entered promiscuous mode [ 184.079687][ T6045] device macsec0 entered promiscuous mode [ 184.244373][ T6057] device pim6reg1 entered promiscuous mode [ 184.289949][ T6061] device pim6reg1 entered promiscuous mode [ 184.487142][ T6083] device wg2 left promiscuous mode [ 185.205469][ T6114] device pim6reg1 entered promiscuous mode [ 186.798562][ T6171] device pim6reg1 entered promiscuous mode [ 188.569052][ T6216] device pim6reg1 entered promiscuous mode [ 188.666795][ T6220] device pim6reg1 entered promiscuous mode [ 189.675041][ T6285] device pim6reg1 entered promiscuous mode [ 190.080027][ T6304] device veth1_macvtap left promiscuous mode [ 190.164447][ T6304] device macsec0 left promiscuous mode [ 190.341062][ T6311] device pim6reg1 entered promiscuous mode [ 190.408765][ T6311] device pim6reg1 left promiscuous mode [ 190.463555][ T6311] device pim6reg1 entered promiscuous mode [ 190.779901][ T6330] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.789227][ T6330] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.563723][ T6384] syz.1.1682[6384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.563781][ T6384] syz.1.1682[6384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.915212][ T6403] device veth0_vlan left promiscuous mode [ 191.982087][ T6403] device veth0_vlan entered promiscuous mode [ 192.084655][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.093070][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.101033][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.110819][ T6430] device veth0_vlan left promiscuous mode [ 192.171060][ T6430] device veth0_vlan entered promiscuous mode [ 192.931031][ T6463] device wg2 entered promiscuous mode [ 193.207229][ T6479] device pim6reg1 entered promiscuous mode [ 194.158621][ T6548] device syzkaller0 entered promiscuous mode [ 194.413039][ T6562] device veth0_vlan left promiscuous mode [ 194.489857][ T6562] device veth0_vlan entered promiscuous mode [ 194.702758][ T6569] device syzkaller0 entered promiscuous mode [ 195.526814][ T6600] device pim6reg1 entered promiscuous mode [ 195.553669][ T6584] device pim6reg1 entered promiscuous mode [ 195.785824][ T6607] device syzkaller0 entered promiscuous mode [ 196.042312][ T6642] device pim6reg1 entered promiscuous mode [ 196.141367][ T6652] device sit0 left promiscuous mode [ 196.368136][ T6652] device sit0 entered promiscuous mode [ 197.241182][ T6673] device syzkaller0 entered promiscuous mode [ 198.723627][ T6698] device pim6reg1 entered promiscuous mode [ 201.855657][ T6797] device syzkaller0 entered promiscuous mode [ 203.472149][ T6875] device syzkaller0 entered promiscuous mode [ 203.790704][ T6887] device pim6reg1 entered promiscuous mode [ 203.990585][ T6900] device pim6reg1 entered promiscuous mode [ 204.062676][ T6908] Â: renamed from pim6reg1 [ 204.166466][ T6916] syz.0.1839 uses obsolete (PF_INET,SOCK_PACKET) [ 204.291109][ T6920] device pim6reg1 entered promiscuous mode [ 204.805734][ T6929] device veth0_vlan left promiscuous mode [ 204.830739][ T6929] device veth0_vlan entered promiscuous mode [ 204.914706][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.926380][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.953754][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 205.163480][ T6943] device pim6reg1 entered promiscuous mode [ 205.710176][ T6954] device wg2 entered promiscuous mode [ 205.758540][ T6960] device wg2 left promiscuous mode [ 206.003494][ T6984] device syzkaller0 entered promiscuous mode [ 206.333295][ T6994] syz.2.1858[6994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.333352][ T6994] syz.2.1858[6994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.334645][ T6993] syz.2.1858[6993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.359213][ T6994] syz.2.1858[6994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.915627][ T7006] device syzkaller0 entered promiscuous mode [ 207.065842][ T7017] device syzkaller0 entered promiscuous mode [ 207.620520][ T7033] device pim6reg1 entered promiscuous mode [ 208.166653][ T7048] device pim6reg1 entered promiscuous mode [ 208.669444][ T7063] device veth0_vlan left promiscuous mode [ 208.722723][ T7063] device veth0_vlan entered promiscuous mode [ 209.235811][ T7085] device pim6reg1 entered promiscuous mode [ 209.497101][ T24] audit: type=1400 audit(1731011865.130:171): avc: denied { create } for pid=7087 comm="syz.2.1885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 209.762834][ T24] audit: type=1400 audit(1731011865.400:172): avc: denied { attach_queue } for pid=7117 comm="syz.0.1893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 211.064464][ T7230] device wg2 left promiscuous mode [ 211.211506][ T7239] device pim6reg1 entered promiscuous mode [ 211.906159][ T7268] syz.0.1936[7268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.906219][ T7268] syz.0.1936[7268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.284725][ T7280] device sit0 entered promiscuous mode [ 213.815801][ T7329] device pim6reg1 entered promiscuous mode [ 213.883994][ T7339] device syzkaller0 entered promiscuous mode [ 215.699250][ T7420] device syzkaller0 entered promiscuous mode [ 215.783700][ T7435] syz.3.1982[7435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.783755][ T7435] syz.3.1982[7435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.899453][ T24] audit: type=1400 audit(1731011871.530:173): avc: denied { create } for pid=7434 comm="syz.3.1982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 217.528317][ T7500] device veth0_vlan left promiscuous mode [ 217.578982][ T7500] device veth0_vlan entered promiscuous mode [ 219.111110][ T7563] device syzkaller0 entered promiscuous mode [ 227.781351][ T7612] device pim6reg1 entered promiscuous mode [ 228.206645][ T7646] device syzkaller0 entered promiscuous mode [ 231.839597][ T7708] device syzkaller0 entered promiscuous mode [ 232.334827][ T7717] device veth0_vlan left promiscuous mode [ 232.359680][ T7717] device veth0_vlan entered promiscuous mode [ 232.454740][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.462795][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.473109][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 232.571196][ T7720] device wg2 left promiscuous mode [ 232.780565][ T7721] device wg2 entered promiscuous mode [ 233.651680][ T7753] device sit0 entered promiscuous mode [ 234.079255][ T7760] device wg2 entered promiscuous mode [ 234.568994][ T7788] device pim6reg1 entered promiscuous mode [ 240.963033][ T7855] device syzkaller0 entered promiscuous mode [ 241.457602][ T7863] device syzkaller0 entered promiscuous mode [ 242.807783][ T7884] device veth1_macvtap left promiscuous mode [ 242.816277][ T7884] device macsec0 left promiscuous mode [ 242.969746][ T7887] device veth1_macvtap entered promiscuous mode [ 242.975906][ T7887] device macsec0 entered promiscuous mode [ 244.397890][ T7938] device pim6reg1 entered promiscuous mode [ 244.537740][ T7940] device pim6reg1 entered promiscuous mode [ 245.361593][ T7971] device syzkaller0 entered promiscuous mode [ 246.041939][ T7998] device pim6reg1 entered promiscuous mode [ 246.480992][ T8013] device syzkaller0 entered promiscuous mode [ 246.724848][ T8016] device syzkaller0 entered promiscuous mode [ 247.108870][ T8046] device pim6reg1 entered promiscuous mode [ 247.465718][ T8053] device pim6reg1 entered promiscuous mode [ 248.020548][ T8080] device syzkaller0 entered promiscuous mode [ 248.799529][ T8130] device pim6reg1 entered promiscuous mode [ 249.358557][ T8169] device pim6reg1 entered promiscuous mode [ 249.492088][ T8180] device pim6reg1 entered promiscuous mode [ 249.894959][ T8209] device syzkaller0 entered promiscuous mode [ 250.103081][ T8206] device syzkaller0 entered promiscuous mode [ 250.228470][ T8222] device pim6reg1 entered promiscuous mode [ 250.713978][ T8231] device syzkaller0 entered promiscuous mode [ 251.603584][ T8263] device veth0_vlan left promiscuous mode [ 251.635972][ T8263] device veth0_vlan entered promiscuous mode [ 251.850958][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.860094][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.867749][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.978944][ T8271] device syzkaller0 entered promiscuous mode [ 252.317231][ T8280] device pim6reg1 entered promiscuous mode [ 252.330512][ T8285] device bridge0 entered promiscuous mode [ 252.866229][ T24] audit: type=1400 audit(1731011908.500:174): avc: denied { create } for pid=8313 comm="syz.4.2237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 253.621476][ T8324] device pim6reg1 entered promiscuous mode [ 254.635685][ T8355] device macsec0 entered promiscuous mode [ 254.720451][ T8366] device pim6reg1 entered promiscuous mode [ 256.271803][ T8422] device pim6reg1 entered promiscuous mode [ 257.700399][ T8474] device pim6reg1 entered promiscuous mode [ 258.212240][ T8492] device syzkaller0 entered promiscuous mode [ 258.510045][ T8496] device syzkaller0 entered promiscuous mode [ 258.559207][ T8523] device pim6reg1 entered promiscuous mode [ 259.281852][ T8581] device pim6reg1 entered promiscuous mode [ 259.682331][ T8580] device pim6reg1 entered promiscuous mode [ 259.930530][ T8594] syz.2.2317[8594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.930597][ T8594] syz.2.2317[8594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.999114][ T8594] syz.2.2317[8594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.041908][ T8594] syz.2.2317[8594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.488385][ T8627] device pim6reg1 entered promiscuous mode [ 261.251913][ T8673] device pim6reg1 entered promiscuous mode [ 261.737015][ T24] audit: type=1400 audit(1731011917.370:175): avc: denied { create } for pid=8691 comm="syz.1.2344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 262.188161][ T8688] device veth0_vlan left promiscuous mode [ 262.254955][ T8688] device veth0_vlan entered promiscuous mode [ 262.449400][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.457343][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.550551][ T387] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 262.582590][ T8717] device syzkaller0 entered promiscuous mode [ 262.747780][ T8722] device pim6reg1 entered promiscuous mode [ 263.936075][ T8748] device syzkaller0 entered promiscuous mode [ 264.643118][ T8780] device pim6reg1 entered promiscuous mode [ 264.985694][ T8791] device veth0_vlan left promiscuous mode [ 264.992038][ T8791] device veth0_vlan entered promiscuous mode [ 265.147190][ T8799] device veth1_macvtap entered promiscuous mode [ 265.153362][ T8799] device macsec0 entered promiscuous mode [ 265.171833][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.237939][ T8801] device veth0_vlan left promiscuous mode [ 265.298016][ T8801] device veth0_vlan entered promiscuous mode [ 265.678290][ T8832] device pim6reg1 entered promiscuous mode [ 265.866096][ T8841] device veth0_vlan left promiscuous mode [ 265.916554][ T8841] device veth0_vlan entered promiscuous mode [ 266.202559][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.219085][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.246821][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 266.729025][ T8868] device syzkaller0 entered promiscuous mode [ 266.819829][ T8872] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 266.825145][ T8872] dvmrp1: linktype set to 768 [ 267.047801][ T8889] device pim6reg1 entered promiscuous mode [ 267.334145][ T8912] device pim6reg1 entered promiscuous mode [ 267.916002][ T8929] device syzkaller0 entered promiscuous mode [ 268.447944][ T8944] device pim6reg1 entered promiscuous mode [ 269.205020][ T8989] device pim6reg1 entered promiscuous mode [ 270.002636][ T9013] device veth1_virt_wifi entered promiscuous mode [ 270.079978][ T9021] device pim6reg1 entered promiscuous mode [ 270.779644][ T9053] : renamed from ipvlan1 [ 271.536182][ T9069] device syzkaller0 entered promiscuous mode [ 271.578536][ T9075] device pim6reg1 entered promiscuous mode [ 272.587587][ T9130] device pim6reg1 entered promiscuous mode [ 272.967683][ T9147] device pim6reg1 entered promiscuous mode [ 273.285102][ T9171] device pim6reg1 entered promiscuous mode [ 273.450078][ T24] audit: type=1400 audit(1731011929.090:176): avc: denied { create } for pid=9186 comm="syz.1.2484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 273.477480][ T9183] device syzkaller0 entered promiscuous mode [ 273.511773][ T9188] syz.3.2481[9188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.511832][ T9188] syz.3.2481[9188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.974583][ T9205] syz.1.2487[9205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.098076][ T9205] syz.1.2487[9205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.133910][ T9212] device pim6reg1 entered promiscuous mode [ 274.557897][ T9242] FAULT_INJECTION: forcing a failure. [ 274.557897][ T9242] name failslab, interval 1, probability 0, space 0, times 0 [ 274.601904][ T9242] CPU: 0 PID: 9242 Comm: syz.2.2499 Tainted: G W 5.10.226-syzkaller #0 [ 274.611272][ T9242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 274.621316][ T9242] Call Trace: [ 274.624405][ T9242] dump_stack_lvl+0x1e2/0x24b [ 274.628895][ T9242] ? bfq_pos_tree_add_move+0x43b/0x43b [ 274.634191][ T9242] ? pcpu_memcg_post_alloc_hook+0x1c8/0x360 [ 274.639913][ T9242] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 274.646429][ T9242] ? find_next_bit+0xc7/0x100 [ 274.650936][ T9242] dump_stack+0x15/0x17 [ 274.654923][ T9242] should_fail+0x3c6/0x510 [ 274.659186][ T9242] ? kvmalloc_node+0x82/0x130 [ 274.663697][ T9242] __should_failslab+0xa4/0xe0 [ 274.668296][ T9242] should_failslab+0x9/0x20 [ 274.672631][ T9242] __kmalloc+0x60/0x330 [ 274.676627][ T9242] kvmalloc_node+0x82/0x130 [ 274.680965][ T9242] pfifo_fast_init+0x110/0x7a0 [ 274.685567][ T9242] qdisc_create_dflt+0x138/0x3d0 [ 274.690346][ T9242] ? _raw_spin_lock+0xa4/0x1b0 [ 274.694935][ T9242] dev_activate+0x2e0/0x1310 [ 274.699367][ T9242] __dev_open+0x3bf/0x4e0 [ 274.703531][ T9242] ? dev_open+0x260/0x260 [ 274.707705][ T9242] ? _raw_spin_unlock_bh+0x51/0x60 [ 274.712643][ T9242] ? dev_set_rx_mode+0x245/0x2e0 [ 274.717416][ T9242] ? __kasan_check_read+0x11/0x20 [ 274.722284][ T9242] __dev_change_flags+0x1db/0x6e0 [ 274.727138][ T9242] ? dev_get_flags+0x1e0/0x1e0 [ 274.731742][ T9242] ? selinux_capable+0x2f1/0x430 [ 274.736514][ T9242] ? selinux_capset+0xf0/0xf0 [ 274.741047][ T9242] dev_change_flags+0x8c/0x1a0 [ 274.745644][ T9242] dev_ifsioc+0x115/0xae0 [ 274.749801][ T9242] ? dev_ioctl+0xb40/0xb40 [ 274.754046][ T9242] ? dev_get_by_name_rcu+0xc5/0xf0 [ 274.758991][ T9242] dev_ioctl+0x526/0xb40 [ 274.763073][ T9242] sock_do_ioctl+0x295/0x3a0 [ 274.767499][ T9242] ? sock_show_fdinfo+0xa0/0xa0 [ 274.772185][ T9242] ? kernel_write+0x3d0/0x3d0 [ 274.776786][ T9242] ? selinux_file_ioctl+0x3cc/0x540 [ 274.781821][ T9242] sock_ioctl+0x4a6/0x760 [ 274.785985][ T9242] ? sock_poll+0x340/0x340 [ 274.790242][ T9242] ? security_file_ioctl+0x84/0xb0 [ 274.795186][ T9242] ? sock_poll+0x340/0x340 [ 274.799440][ T9242] __se_sys_ioctl+0x114/0x190 [ 274.803951][ T9242] __x64_sys_ioctl+0x7b/0x90 [ 274.808394][ T9242] do_syscall_64+0x34/0x70 [ 274.812632][ T9242] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 274.818357][ T9242] RIP: 0033:0x7f7b3cd73719 [ 274.822629][ T9242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 274.842048][ T9242] RSP: 002b:00007f7b3b9ec038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.850294][ T9242] RAX: ffffffffffffffda RBX: 00007f7b3cf2af80 RCX: 00007f7b3cd73719 [ 274.858103][ T9242] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 274.865913][ T9242] RBP: 00007f7b3b9ec090 R08: 0000000000000000 R09: 0000000000000000 [ 274.873905][ T9242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 274.881700][ T9242] R13: 0000000000000000 R14: 00007f7b3cf2af80 R15: 00007ffee52e5538 [ 274.908158][ T9242] device pim6reg1 entered promiscuous mode [ 275.026259][ T9250] syz.0.2501[9250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.026321][ T9250] syz.0.2501[9250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.957988][ T9258] device syzkaller0 entered promiscuous mode [ 275.976014][ T9275] device veth0_vlan left promiscuous mode [ 276.002415][ T9275] device veth0_vlan entered promiscuous mode [ 276.025637][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.036227][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.054757][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.219616][ T9294] FAULT_INJECTION: forcing a failure. [ 276.219616][ T9294] name failslab, interval 1, probability 0, space 0, times 0 [ 276.248032][ T9294] CPU: 0 PID: 9294 Comm: syz.0.2514 Tainted: G W 5.10.226-syzkaller #0 [ 276.257403][ T9294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 276.267292][ T9294] Call Trace: [ 276.270428][ T9294] dump_stack_lvl+0x1e2/0x24b [ 276.274947][ T9294] ? bfq_pos_tree_add_move+0x43b/0x43b [ 276.280232][ T9294] dump_stack+0x15/0x17 [ 276.284217][ T9294] should_fail+0x3c6/0x510 [ 276.288470][ T9294] ? kvmalloc_node+0x82/0x130 [ 276.292981][ T9294] __should_failslab+0xa4/0xe0 [ 276.297582][ T9294] should_failslab+0x9/0x20 [ 276.301936][ T9294] __kmalloc+0x60/0x330 [ 276.305918][ T9294] ? kvmalloc_node+0x82/0x130 [ 276.310427][ T9294] kvmalloc_node+0x82/0x130 [ 276.314765][ T9294] pfifo_fast_init+0x25e/0x7a0 [ 276.319367][ T9294] qdisc_create_dflt+0x138/0x3d0 [ 276.324142][ T9294] ? _raw_spin_lock+0xa4/0x1b0 [ 276.328752][ T9294] dev_activate+0x2e0/0x1310 [ 276.333170][ T9294] __dev_open+0x3bf/0x4e0 [ 276.337332][ T9294] ? dev_open+0x260/0x260 [ 276.341499][ T9294] ? _raw_spin_unlock_bh+0x51/0x60 [ 276.346453][ T9294] ? dev_set_rx_mode+0x245/0x2e0 [ 276.351222][ T9294] ? __kasan_check_read+0x11/0x20 [ 276.356081][ T9294] __dev_change_flags+0x1db/0x6e0 [ 276.360941][ T9294] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 276.367534][ T9294] ? dev_get_flags+0x1e0/0x1e0 [ 276.372237][ T9294] ? selinux_capset+0xf0/0xf0 [ 276.376737][ T9294] dev_change_flags+0x8c/0x1a0 [ 276.381339][ T9294] dev_ifsioc+0x115/0xae0 [ 276.385502][ T9294] ? dev_ioctl+0xb40/0xb40 [ 276.389758][ T9294] ? dev_get_by_name_rcu+0xc5/0xf0 [ 276.394701][ T9294] dev_ioctl+0x526/0xb40 [ 276.398784][ T9294] sock_do_ioctl+0x295/0x3a0 [ 276.403210][ T9294] ? sock_show_fdinfo+0xa0/0xa0 [ 276.407895][ T9294] ? kernel_write+0x3d0/0x3d0 [ 276.412412][ T9294] ? selinux_file_ioctl+0x3cc/0x540 [ 276.417444][ T9294] sock_ioctl+0x4a6/0x760 [ 276.421617][ T9294] ? sock_poll+0x340/0x340 [ 276.425866][ T9294] ? security_file_ioctl+0x84/0xb0 [ 276.431331][ T9294] ? sock_poll+0x340/0x340 [ 276.435596][ T9294] __se_sys_ioctl+0x114/0x190 [ 276.440094][ T9294] __x64_sys_ioctl+0x7b/0x90 [ 276.444521][ T9294] do_syscall_64+0x34/0x70 [ 276.448777][ T9294] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 276.454505][ T9294] RIP: 0033:0x7f34f1e5b719 [ 276.458760][ T9294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 276.478198][ T9294] RSP: 002b:00007f34f0ad4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 276.486445][ T9294] RAX: ffffffffffffffda RBX: 00007f34f2012f80 RCX: 00007f34f1e5b719 [ 276.494250][ T9294] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 276.502083][ T9294] RBP: 00007f34f0ad4090 R08: 0000000000000000 R09: 0000000000000000 [ 276.509879][ T9294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.517685][ T9294] R13: 0000000000000000 R14: 00007f34f2012f80 R15: 00007ffc795ceb98 [ 276.631180][ T9294] device pim6reg1 entered promiscuous mode [ 277.043222][ T9333] device pim6reg1 entered promiscuous mode [ 277.278539][ T9356] FAULT_INJECTION: forcing a failure. [ 277.278539][ T9356] name failslab, interval 1, probability 0, space 0, times 0 [ 277.291664][ T9356] CPU: 1 PID: 9356 Comm: syz.1.2533 Tainted: G W 5.10.226-syzkaller #0 [ 277.301031][ T9356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 277.310914][ T9356] Call Trace: [ 277.314050][ T9356] dump_stack_lvl+0x1e2/0x24b [ 277.318559][ T9356] ? bfq_pos_tree_add_move+0x43b/0x43b [ 277.323852][ T9356] dump_stack+0x15/0x17 [ 277.327842][ T9356] should_fail+0x3c6/0x510 [ 277.332098][ T9356] ? kvmalloc_node+0x82/0x130 [ 277.336610][ T9356] __should_failslab+0xa4/0xe0 [ 277.341209][ T9356] should_failslab+0x9/0x20 [ 277.345548][ T9356] __kmalloc+0x60/0x330 [ 277.349545][ T9356] ? kvmalloc_node+0x82/0x130 [ 277.354057][ T9356] kvmalloc_node+0x82/0x130 [ 277.358400][ T9356] pfifo_fast_init+0x3aa/0x7a0 [ 277.363000][ T9356] qdisc_create_dflt+0x138/0x3d0 [ 277.367771][ T9356] ? _raw_spin_lock+0xa4/0x1b0 [ 277.372367][ T9356] dev_activate+0x2e0/0x1310 [ 277.376892][ T9356] __dev_open+0x3bf/0x4e0 [ 277.381048][ T9356] ? dev_open+0x260/0x260 [ 277.385214][ T9356] ? _raw_spin_unlock_bh+0x51/0x60 [ 277.390163][ T9356] ? dev_set_rx_mode+0x245/0x2e0 [ 277.394947][ T9356] ? __kasan_check_read+0x11/0x20 [ 277.399793][ T9356] __dev_change_flags+0x1db/0x6e0 [ 277.404661][ T9356] ? dev_get_flags+0x1e0/0x1e0 [ 277.409257][ T9356] ? selinux_capable+0x2f1/0x430 [ 277.414033][ T9356] ? selinux_capset+0xf0/0xf0 [ 277.418542][ T9356] dev_change_flags+0x8c/0x1a0 [ 277.423142][ T9356] dev_ifsioc+0x115/0xae0 [ 277.427308][ T9356] ? dev_ioctl+0xb40/0xb40 [ 277.431561][ T9356] ? dev_get_by_name_rcu+0xc5/0xf0 [ 277.436510][ T9356] dev_ioctl+0x526/0xb40 [ 277.440592][ T9356] sock_do_ioctl+0x295/0x3a0 [ 277.445034][ T9356] ? sock_show_fdinfo+0xa0/0xa0 [ 277.449706][ T9356] ? kernel_write+0x3d0/0x3d0 [ 277.454220][ T9356] ? selinux_file_ioctl+0x3cc/0x540 [ 277.459250][ T9356] sock_ioctl+0x4a6/0x760 [ 277.463418][ T9356] ? sock_poll+0x340/0x340 [ 277.467671][ T9356] ? security_file_ioctl+0x84/0xb0 [ 277.472618][ T9356] ? sock_poll+0x340/0x340 [ 277.476871][ T9356] __se_sys_ioctl+0x114/0x190 [ 277.481382][ T9356] __x64_sys_ioctl+0x7b/0x90 [ 277.485807][ T9356] do_syscall_64+0x34/0x70 [ 277.490063][ T9356] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 277.495784][ T9356] RIP: 0033:0x7fd11df5d719 [ 277.500040][ T9356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 277.519479][ T9356] RSP: 002b:00007fd11cbd6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.527728][ T9356] RAX: ffffffffffffffda RBX: 00007fd11e114f80 RCX: 00007fd11df5d719 [ 277.535532][ T9356] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 277.543344][ T9356] RBP: 00007fd11cbd6090 R08: 0000000000000000 R09: 0000000000000000 [ 277.551167][ T9356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.558975][ T9356] R13: 0000000000000000 R14: 00007fd11e114f80 R15: 00007ffca6f89518 [ 277.578147][ T9356] device pim6reg1 entered promiscuous mode [ 278.227179][ T9388] device syzkaller0 entered promiscuous mode [ 278.389310][ T9394] device syzkaller0 entered promiscuous mode [ 278.470977][ T9399] device pim6reg1 entered promiscuous mode [ 278.634108][ T9417] device pim6reg1 entered promiscuous mode [ 278.640250][ T9417] FAULT_INJECTION: forcing a failure. [ 278.640250][ T9417] name failslab, interval 1, probability 0, space 0, times 0 [ 278.659733][ T9417] CPU: 0 PID: 9417 Comm: syz.2.2549 Tainted: G W 5.10.226-syzkaller #0 [ 278.669187][ T9417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 278.679079][ T9417] Call Trace: [ 278.682245][ T9417] dump_stack_lvl+0x1e2/0x24b [ 278.686737][ T9417] ? bfq_pos_tree_add_move+0x43b/0x43b [ 278.692015][ T9417] ? wake_up_klogd+0xc1/0xf0 [ 278.696439][ T9417] ? vprintk_emit+0x2f3/0x380 [ 278.701217][ T9417] dump_stack+0x15/0x17 [ 278.705205][ T9417] should_fail+0x3c6/0x510 [ 278.709596][ T9417] ? __alloc_skb+0x80/0x510 [ 278.713923][ T9417] __should_failslab+0xa4/0xe0 [ 278.718523][ T9417] should_failslab+0x9/0x20 [ 278.722865][ T9417] kmem_cache_alloc+0x3d/0x2e0 [ 278.727473][ T9417] __alloc_skb+0x80/0x510 [ 278.731713][ T9417] ? if_nlmsg_size+0x59c/0x5f0 [ 278.736315][ T9417] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 278.741457][ T9417] rtmsg_ifinfo+0x78/0x120 [ 278.745684][ T9417] __dev_notify_flags+0xdd/0x610 [ 278.750466][ T9417] ? __dev_change_flags+0x6e0/0x6e0 [ 278.755589][ T9417] ? __dev_change_flags+0x56c/0x6e0 [ 278.760624][ T9417] ? dev_get_flags+0x1e0/0x1e0 [ 278.765213][ T9417] ? selinux_capable+0x2f1/0x430 [ 278.769986][ T9417] ? selinux_capset+0xf0/0xf0 [ 278.774502][ T9417] dev_change_flags+0xf0/0x1a0 [ 278.779107][ T9417] dev_ifsioc+0x115/0xae0 [ 278.783349][ T9417] ? dev_ioctl+0xb40/0xb40 [ 278.787603][ T9417] ? dev_get_by_name_rcu+0xc5/0xf0 [ 278.792557][ T9417] dev_ioctl+0x526/0xb40 [ 278.796638][ T9417] sock_do_ioctl+0x295/0x3a0 [ 278.801059][ T9417] ? sock_show_fdinfo+0xa0/0xa0 [ 278.805745][ T9417] ? kernel_write+0x3d0/0x3d0 [ 278.810260][ T9417] ? selinux_file_ioctl+0x3cc/0x540 [ 278.815292][ T9417] sock_ioctl+0x4a6/0x760 [ 278.819455][ T9417] ? sock_poll+0x340/0x340 [ 278.823715][ T9417] ? security_file_ioctl+0x84/0xb0 [ 278.828654][ T9417] ? sock_poll+0x340/0x340 [ 278.832906][ T9417] __se_sys_ioctl+0x114/0x190 [ 278.837429][ T9417] __x64_sys_ioctl+0x7b/0x90 [ 278.841855][ T9417] do_syscall_64+0x34/0x70 [ 278.846105][ T9417] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 278.851824][ T9417] RIP: 0033:0x7f7b3cd73719 [ 278.856074][ T9417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.875521][ T9417] RSP: 002b:00007f7b3b9ec038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 278.883772][ T9417] RAX: ffffffffffffffda RBX: 00007f7b3cf2af80 RCX: 00007f7b3cd73719 [ 278.891581][ T9417] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 278.899521][ T9417] RBP: 00007f7b3b9ec090 R08: 0000000000000000 R09: 0000000000000000 [ 278.907334][ T9417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.915130][ T9417] R13: 0000000000000000 R14: 00007f7b3cf2af80 R15: 00007ffee52e5538 [ 279.135630][ T9423] device veth1_macvtap left promiscuous mode [ 279.298952][ T9455] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 279.363821][ T9455] device syzkaller0 entered promiscuous mode [ 279.903887][ T9490] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 280.021060][ T9490] device syzkaller0 entered promiscuous mode [ 280.483463][ T9550] device pim6reg1 entered promiscuous mode [ 281.001379][ T9563] device syzkaller0 entered promiscuous mode [ 281.132848][ T24] audit: type=1400 audit(1731011936.770:177): avc: denied { create } for pid=9583 comm="syz.1.2597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 281.461443][ T9599] device pim6reg1 entered promiscuous mode [ 281.583429][ T9605] device pim6reg1 entered promiscuous mode [ 281.659455][ T9605] FAULT_INJECTION: forcing a failure. [ 281.659455][ T9605] name failslab, interval 1, probability 0, space 0, times 0 [ 281.718411][ T9605] CPU: 1 PID: 9605 Comm: syz.3.2604 Tainted: G W 5.10.226-syzkaller #0 [ 281.727787][ T9605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 281.737678][ T9605] Call Trace: [ 281.740811][ T9605] dump_stack_lvl+0x1e2/0x24b [ 281.745325][ T9605] ? bfq_pos_tree_add_move+0x43b/0x43b [ 281.750628][ T9605] ? __kasan_check_write+0x14/0x20 [ 281.755573][ T9605] dump_stack+0x15/0x17 [ 281.759561][ T9605] should_fail+0x3c6/0x510 [ 281.763817][ T9605] ? ____ip_mc_inc_group+0x1fb/0x890 [ 281.768931][ T9605] __should_failslab+0xa4/0xe0 [ 281.773532][ T9605] should_failslab+0x9/0x20 [ 281.777871][ T9605] kmem_cache_alloc_trace+0x3a/0x2e0 [ 281.782993][ T9605] ____ip_mc_inc_group+0x1fb/0x890 [ 281.788117][ T9605] ? __ip_mc_inc_group+0x30/0x30 [ 281.792884][ T9605] ? __kasan_check_write+0x14/0x20 [ 281.797833][ T9605] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 281.803127][ T9605] ? __kasan_check_read+0x11/0x20 [ 281.808001][ T9605] ip_mc_up+0x10f/0x1e0 [ 281.812162][ T9605] inetdev_event+0xbed/0x1040 [ 281.816800][ T9605] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 281.822421][ T9605] ? ipv4_doint_and_flush+0x150/0x150 [ 281.827623][ T9605] ? __kasan_check_write+0x14/0x20 [ 281.832575][ T9605] raw_notifier_call_chain+0x8c/0xf0 [ 281.837691][ T9605] __dev_notify_flags+0x304/0x610 [ 281.842638][ T9605] ? __dev_change_flags+0x6e0/0x6e0 [ 281.847840][ T9605] ? __dev_change_flags+0x56c/0x6e0 [ 281.852871][ T9605] ? dev_get_flags+0x1e0/0x1e0 [ 281.857479][ T9605] ? selinux_capable+0x2f1/0x430 [ 281.862250][ T9605] ? selinux_capset+0xf0/0xf0 [ 281.866760][ T9605] dev_change_flags+0xf0/0x1a0 [ 281.871451][ T9605] dev_ifsioc+0x115/0xae0 [ 281.875616][ T9605] ? dev_ioctl+0xb40/0xb40 [ 281.879867][ T9605] ? dev_get_by_name_rcu+0xc5/0xf0 [ 281.884918][ T9605] dev_ioctl+0x526/0xb40 [ 281.888981][ T9605] sock_do_ioctl+0x295/0x3a0 [ 281.893404][ T9605] ? sock_show_fdinfo+0xa0/0xa0 [ 281.898091][ T9605] ? kernel_write+0x3d0/0x3d0 [ 281.902609][ T9605] ? selinux_file_ioctl+0x3cc/0x540 [ 281.907635][ T9605] sock_ioctl+0x4a6/0x760 [ 281.912075][ T9605] ? sock_poll+0x340/0x340 [ 281.916313][ T9605] ? security_file_ioctl+0x84/0xb0 [ 281.921275][ T9605] ? sock_poll+0x340/0x340 [ 281.925610][ T9605] __se_sys_ioctl+0x114/0x190 [ 281.930129][ T9605] __x64_sys_ioctl+0x7b/0x90 [ 281.934547][ T9605] do_syscall_64+0x34/0x70 [ 281.938805][ T9605] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 281.944528][ T9605] RIP: 0033:0x7f85764d6719 [ 281.948781][ T9605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 281.968311][ T9605] RSP: 002b:00007f857514f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 281.976556][ T9605] RAX: ffffffffffffffda RBX: 00007f857668df80 RCX: 00007f85764d6719 [ 281.984365][ T9605] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 281.992175][ T9605] RBP: 00007f857514f090 R08: 0000000000000000 R09: 0000000000000000 [ 281.999986][ T9605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.007794][ T9605] R13: 0000000000000000 R14: 00007f857668df80 R15: 00007ffcfbd37fe8 [ 282.184150][ T9617] device sit0 left promiscuous mode [ 282.300197][ T9619] device sit0 entered promiscuous mode [ 282.837776][ T9666] device pim6reg1 entered promiscuous mode [ 282.853812][ T9666] FAULT_INJECTION: forcing a failure. [ 282.853812][ T9666] name failslab, interval 1, probability 0, space 0, times 0 [ 282.866306][ T9666] CPU: 1 PID: 9666 Comm: syz.0.2622 Tainted: G W 5.10.226-syzkaller #0 [ 282.875849][ T9666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 282.886166][ T9666] Call Trace: [ 282.889302][ T9666] dump_stack_lvl+0x1e2/0x24b [ 282.893810][ T9666] ? bfq_pos_tree_add_move+0x43b/0x43b [ 282.899199][ T9666] ? ____ip_mc_inc_group+0x1fb/0x890 [ 282.904318][ T9666] dump_stack+0x15/0x17 [ 282.908299][ T9666] should_fail+0x3c6/0x510 [ 282.912554][ T9666] ? __hw_addr_add_ex+0x16c/0x590 [ 282.917416][ T9666] __should_failslab+0xa4/0xe0 [ 282.922016][ T9666] should_failslab+0x9/0x20 [ 282.926350][ T9666] kmem_cache_alloc_trace+0x3a/0x2e0 [ 282.931539][ T9666] ? _raw_spin_lock+0xa4/0x1b0 [ 282.936073][ T9666] __hw_addr_add_ex+0x16c/0x590 [ 282.940762][ T9666] dev_mc_add+0x76/0xd0 [ 282.944754][ T9666] igmp_group_added+0x1b4/0x800 [ 282.949439][ T9666] ? igmpv3_del_delrec+0x740/0x740 [ 282.954385][ T9666] ? igmpv3_del_delrec+0x667/0x740 [ 282.959336][ T9666] ____ip_mc_inc_group+0x650/0x890 [ 282.964278][ T9666] ? __ip_mc_inc_group+0x30/0x30 [ 282.969061][ T9666] ? __kasan_check_write+0x14/0x20 [ 282.974008][ T9666] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 282.979483][ T9666] ? __kasan_check_read+0x11/0x20 [ 282.984352][ T9666] ip_mc_up+0x10f/0x1e0 [ 282.988343][ T9666] inetdev_event+0xbed/0x1040 [ 282.992848][ T9666] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 282.998482][ T9666] ? ipv4_doint_and_flush+0x150/0x150 [ 283.003694][ T9666] ? __kasan_check_write+0x14/0x20 [ 283.008723][ T9666] raw_notifier_call_chain+0x8c/0xf0 [ 283.013848][ T9666] __dev_notify_flags+0x304/0x610 [ 283.018716][ T9666] ? __dev_change_flags+0x6e0/0x6e0 [ 283.023830][ T9666] ? __dev_change_flags+0x56c/0x6e0 [ 283.028865][ T9666] ? dev_get_flags+0x1e0/0x1e0 [ 283.033467][ T9666] ? selinux_capset+0xf0/0xf0 [ 283.037979][ T9666] dev_change_flags+0xf0/0x1a0 [ 283.042582][ T9666] dev_ifsioc+0x115/0xae0 [ 283.046746][ T9666] ? dev_ioctl+0xb40/0xb40 [ 283.050997][ T9666] ? dev_get_by_name_rcu+0xc5/0xf0 [ 283.055952][ T9666] dev_ioctl+0x526/0xb40 [ 283.060029][ T9666] sock_do_ioctl+0x295/0x3a0 [ 283.064469][ T9666] ? sock_show_fdinfo+0xa0/0xa0 [ 283.069137][ T9666] ? kernel_write+0x3d0/0x3d0 [ 283.073657][ T9666] ? selinux_file_ioctl+0x3cc/0x540 [ 283.078806][ T9666] sock_ioctl+0x4a6/0x760 [ 283.082961][ T9666] ? sock_poll+0x340/0x340 [ 283.087217][ T9666] ? security_file_ioctl+0x84/0xb0 [ 283.092164][ T9666] ? sock_poll+0x340/0x340 [ 283.096410][ T9666] __se_sys_ioctl+0x114/0x190 [ 283.100924][ T9666] __x64_sys_ioctl+0x7b/0x90 [ 283.105351][ T9666] do_syscall_64+0x34/0x70 [ 283.109628][ T9666] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 283.115331][ T9666] RIP: 0033:0x7f34f1e5b719 [ 283.119587][ T9666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.139201][ T9666] RSP: 002b:00007f34f0ad4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 283.147444][ T9666] RAX: ffffffffffffffda RBX: 00007f34f2012f80 RCX: 00007f34f1e5b719 [ 283.155345][ T9666] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 283.163155][ T9666] RBP: 00007f34f0ad4090 R08: 0000000000000000 R09: 0000000000000000 [ 283.170965][ T9666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 283.178777][ T9666] R13: 0000000000000000 R14: 00007f34f2012f80 R15: 00007ffc795ceb98 [ 283.674288][ T9682] device pim6reg1 entered promiscuous mode [ 283.815012][ T9678] syz.3.2626[9678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.818111][ T9678] syz.3.2626[9678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.662669][ T9725] device wg2 left promiscuous mode [ 285.881333][ T9736] syzkaller0: create flow: hash 2816448482 index 3 [ 285.970080][ T9737] device syzkaller0 entered promiscuous mode [ 286.040704][ T9725] device wg2 entered promiscuous mode [ 286.172761][ T2266] syzkaller0: tun_net_xmit 48 [ 286.177598][ T9747] syzkaller0: delete flow: hash 2816448482 index 3 [ 286.646839][ T9769] device veth0_vlan left promiscuous mode [ 286.703421][ T9769] device veth0_vlan entered promiscuous mode [ 286.785585][ T9782] syz.3.2653[9782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.785658][ T9782] syz.3.2653[9782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.785702][ T9783] syz.3.2653[9783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.809415][ T9783] syz.3.2653[9783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.825115][ T9775] device veth1_macvtap left promiscuous mode [ 286.843418][ T9775] device macsec0 left promiscuous mode [ 286.862377][ T9786] device veth1_macvtap entered promiscuous mode [ 286.875605][ T9786] device macsec0 entered promiscuous mode [ 286.919702][ T9782] device syzkaller0 entered promiscuous mode [ 286.938627][ T9790] device pim6reg1 entered promiscuous mode [ 286.966370][ T9799] device pim6reg1 entered promiscuous mode [ 287.505376][ T9833] device pim6reg1 entered promiscuous mode [ 287.885782][ T9846] device bond_slave_0 entered promiscuous mode [ 287.893580][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 287.905804][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 288.074049][ T9847] device syzkaller0 entered promiscuous mode [ 289.018463][ T9858] device pim6reg1 entered promiscuous mode [ 290.400387][ T9877] device veth0_vlan left promiscuous mode [ 290.512080][ T9877] device veth0_vlan entered promiscuous mode [ 290.659682][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.689175][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.747449][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.167816][ T9892] device syzkaller0 entered promiscuous mode [ 291.191597][ T9890] device pim6reg1 entered promiscuous mode [ 292.277891][ T9936] device pim6reg1 entered promiscuous mode [ 292.555895][ T9961] syz.4.2701[9961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.555954][ T9961] syz.4.2701[9961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.668340][ T9962] syz.4.2701[9962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.689728][ T9962] syz.4.2701[9962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.009806][T10132] syz.2.2741[10132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.021164][T10132] syz.2.2741[10132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.734189][T10149] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 296.448441][T10173] syz.1.2753[10173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.448497][T10173] syz.1.2753[10173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.378964][T10218] syz.2.2765[10218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.478397][T10218] syz.2.2765[10218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.148571][T10329] geneve1: tun_chr_ioctl cmd 1074025677 [ 300.206894][T10329] geneve1: linktype set to 6 [ 300.633041][ T95] udevd[95]: worker [7827] terminated by signal 33 (Unknown signal 33) [ 300.680626][ T95] udevd[95]: worker [7827] failed while handling '/devices/virtual/block/loop2' [ 301.243066][T10378] ¯Ê®¸}p: renamed from pim6reg1 [ 301.291669][T10368] device veth1_macvtap entered promiscuous mode [ 301.310750][T10368] device macsec0 entered promiscuous mode [ 301.395080][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 301.914909][T10399] device pim6reg1 entered promiscuous mode [ 302.115196][T10430] device syzkaller0 entered promiscuous mode [ 302.758600][T10454] device pim6reg1 entered promiscuous mode [ 302.879858][T10460] device sit0 entered promiscuous mode [ 303.260686][T10475] device veth1_macvtap left promiscuous mode [ 303.266923][T10475] device macsec0 left promiscuous mode [ 303.335379][T10481] device veth1_macvtap entered promiscuous mode [ 303.346021][T10481] device macsec0 entered promiscuous mode [ 303.420002][T10489] ÿÿÿÿÿÿ: renamed from vlan1 [ 305.537458][T10551] device syzkaller0 entered promiscuous mode [ 305.951515][T10567] device veth0_vlan left promiscuous mode [ 305.986062][T10567] device veth0_vlan entered promiscuous mode [ 306.972705][T10589] device pim6reg1 entered promiscuous mode [ 307.067564][T10594] syz.3.2873[10594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.067628][T10594] syz.3.2873[10594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.122204][T10591] syz.2.2872[10591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.168124][T10591] syz.2.2872[10591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.791501][T10632] syz.2.2884[10632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.908447][T10632] syz.2.2884[10632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.959124][T10642] device syzkaller0 entered promiscuous mode [ 309.239416][T10679] syz.0.2898[10679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.239476][T10679] syz.0.2898[10679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.834389][T10716] syz.2.2909[10716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.899573][T10718] syz.3.2910[10718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.340133][T10761] device syzkaller0 entered promiscuous mode [ 310.738169][T10783] device pim6reg1 entered promiscuous mode [ 310.814220][T10797] device wg2 entered promiscuous mode [ 311.231937][T10815] device pim6reg1 entered promiscuous mode [ 311.270420][T10827] device wg2 left promiscuous mode [ 311.453527][T10832] device syzkaller0 entered promiscuous mode [ 311.724287][T10866] device sit0 entered promiscuous mode [ 312.871664][T10913] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.888807][T10913] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.898779][T10913] device bridge_slave_0 entered promiscuous mode [ 312.949152][T10913] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.956040][T10913] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.988524][T10913] device bridge_slave_1 entered promiscuous mode [ 313.143455][T10941] bpf_get_probe_write_proto: 6 callbacks suppressed [ 313.143467][T10941] syz.0.2974[10941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.150194][T10941] syz.0.2974[10941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.666626][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.738401][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.778747][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.798618][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.817706][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.824594][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.900195][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 313.908667][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.917012][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.925752][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.932643][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.006469][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.014737][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.101256][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 314.109702][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.187822][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 314.195950][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.206602][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.214380][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.225260][T10913] device veth0_vlan entered promiscuous mode [ 314.297510][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 314.309058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 314.324689][T10913] device veth1_macvtap entered promiscuous mode [ 314.396783][T11008] device syzkaller0 entered promiscuous mode [ 314.406522][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 314.414829][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 314.426746][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 314.460596][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 314.473280][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 314.510490][ T513] device veth1_macvtap left promiscuous mode [ 314.516494][ T513] device veth0_vlan left promiscuous mode [ 314.898911][T11025] syz.3.2997[11025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.898969][T11025] syz.3.2997[11025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.991303][T11033] syz.3.3001[11033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.003291][T11033] syz.3.3001[11033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.174937][T11045] syz.0.3005[11045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.193194][T11045] syz.0.3005[11045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.221810][T11047] device syzkaller0 entered promiscuous mode [ 315.455965][T11062] device syzkaller0 entered promiscuous mode [ 316.383168][T11086] ªªªªªª: renamed from vlan0 [ 316.463368][T11101] device veth0_vlan left promiscuous mode [ 316.477650][T11101] device veth0_vlan entered promiscuous mode [ 317.056977][T11157] device veth0_vlan left promiscuous mode [ 317.074269][T11157] device veth0_vlan entered promiscuous mode [ 317.115974][T11160] syz.0.3040[11160] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.116036][T11160] syz.0.3040[11160] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.272213][T11179] device pim6reg1 entered promiscuous mode [ 318.509520][T11246] device pim6reg1 entered promiscuous mode [ 319.669086][T11335] bridge_slave_0: mtu greater than device maximum [ 321.080406][T11380] device sit0 entered promiscuous mode [ 321.480134][T11396] device pim6reg1 entered promiscuous mode [ 322.549236][T11422] device syzkaller0 entered promiscuous mode [ 323.141905][T11442] device syzkaller0 entered promiscuous mode [ 324.428479][T11462] syz.0.3127[11462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.428539][T11462] syz.0.3127[11462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.804793][T11480] device syzkaller0 entered promiscuous mode [ 324.886637][T11481] device wg2 entered promiscuous mode [ 325.425961][T11494] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.558263][T11494] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.665329][T11494] device bridge_slave_0 entered promiscuous mode [ 325.839045][T11494] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.845990][T11494] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.931705][T11494] device bridge_slave_1 entered promiscuous mode [ 326.596848][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 326.605064][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 326.753359][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.793924][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.848592][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.855496][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.964474][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.039685][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.088483][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.095369][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.188179][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 327.359508][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 327.375429][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.396349][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 327.428888][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 327.507165][ T513] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.516808][ T513] device bridge_slave_0 left promiscuous mode [ 327.533099][ T513] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.548317][ T513] device veth1_macvtap left promiscuous mode [ 327.554233][ T513] device veth0_vlan left promiscuous mode [ 327.722108][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 327.730330][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 327.784069][T11535] device syzkaller0 entered promiscuous mode [ 327.930189][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 327.938453][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 327.947303][T11494] device veth0_vlan entered promiscuous mode [ 327.953852][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 327.961412][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 327.976610][T11494] device veth1_macvtap entered promiscuous mode [ 327.984458][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 327.992870][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 328.009320][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 328.060756][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 328.069360][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 328.118218][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 328.154828][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 328.416629][T11562] device syzkaller0 entered promiscuous mode [ 329.833192][T11609] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.883119][T11609] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.918509][T11609] device bridge_slave_0 entered promiscuous mode [ 329.931585][T11609] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.983347][T11609] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.012639][T11609] device bridge_slave_1 entered promiscuous mode [ 330.137540][T11624] syz.0.3174[11624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.137605][T11624] syz.0.3174[11624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.214575][T11609] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.232649][T11609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.239769][T11609] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.246529][T11609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.602587][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.619080][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.003058][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 331.038531][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.155026][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.176436][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.215799][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.222706][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.229956][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 331.238730][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.247394][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.254287][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.468128][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 331.476075][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.569652][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 331.642003][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.654746][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 331.664970][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 331.683044][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 331.691042][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.700310][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.708382][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.716013][T11609] device veth0_vlan entered promiscuous mode [ 331.764957][T11661] syz.0.3186[11661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.765042][T11661] syz.0.3186[11661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.946911][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 331.971783][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 332.135086][T11609] device veth1_macvtap entered promiscuous mode [ 332.150396][ T24] audit: type=1400 audit(1731011987.790:178): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 332.230250][ T24] audit: type=1400 audit(1731011987.790:179): avc: denied { unlink } for pid=77 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 332.252973][ T24] audit: type=1400 audit(1731011987.790:180): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 332.277254][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 332.288425][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 332.358533][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 332.444073][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 332.452322][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 333.023139][ T513] device veth1_macvtap left promiscuous mode [ 335.080894][T11742] syzkaller0: refused to change device tx_queue_len [ 339.509367][T11853] device pim6reg1 entered promiscuous mode [ 340.558571][T11878] device pim6reg1 entered promiscuous mode [ 341.550810][T11898] device pim6reg1 entered promiscuous mode [ 341.570251][T11904] device pim6reg1 left promiscuous mode [ 341.813008][T11912] device syzkaller0 entered promiscuous mode [ 344.753827][ T24] audit: type=1400 audit(1731012000.380:181): avc: denied { create } for pid=11969 comm="syz.3.3279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 347.534476][T12024] syz.1.3293[12024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.534548][T12024] syz.1.3293[12024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.455393][T12074] device pim6reg1 entered promiscuous mode [ 350.558325][T12078] device veth1_macvtap left promiscuous mode [ 350.690915][T12084] device veth1_macvtap entered promiscuous mode [ 350.697013][T12084] device macsec0 entered promiscuous mode [ 351.323850][T12116] syz.4.3320[12116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.323909][T12116] syz.4.3320[12116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.639524][T12124] device pim6reg1 entered promiscuous mode [ 352.617402][T12138] device veth1_macvtap entered promiscuous mode [ 352.625373][T12138] device macsec0 entered promiscuous mode [ 352.703561][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 354.279560][T12165] device pim6reg1 entered promiscuous mode [ 354.806383][T12184] device veth1_macvtap left promiscuous mode [ 354.942230][T12184] device veth1_macvtap entered promiscuous mode [ 354.949683][T12184] device macsec0 entered promiscuous mode [ 355.012170][T12191] device pim6reg1 entered promiscuous mode [ 363.091960][T12243] device pim6reg1 entered promiscuous mode [ 365.910659][T12293] device veth1_macvtap left promiscuous mode [ 365.916858][T12293] device macsec0 left promiscuous mode [ 366.546685][T12314] device pim6reg1 entered promiscuous mode [ 367.376590][T12341] device veth1_macvtap left promiscuous mode [ 367.398510][T12341] device macsec0 left promiscuous mode [ 368.045116][T12358] device pim6reg1 entered promiscuous mode [ 368.930608][T12396] device pim6reg1 entered promiscuous mode [ 369.156615][T12399] device veth1_macvtap left promiscuous mode [ 369.622295][T12424] device syzkaller0 entered promiscuous mode [ 369.876351][T12436] device pim6reg1 entered promiscuous mode [ 371.289361][T12483] device pim6reg1 entered promiscuous mode [ 371.369731][ T24] audit: type=1400 audit(1731012027.010:182): avc: denied { setattr } for pid=12488 comm="syz.2.3428" path="/dev/net/tun" dev="devtmpfs" ino=146 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 372.257023][T12523] device pim6reg1 entered promiscuous mode [ 372.610054][T12533] device pim6reg1 entered promiscuous mode [ 373.325574][T12566] device pim6reg1 entered promiscuous mode [ 375.463661][T12629] device sit0 left promiscuous mode [ 376.033870][T12646] device syzkaller0 entered promiscuous mode [ 376.876231][T12668] ÿÿÿÿÿÿ: renamed from vlan1 [ 377.069931][T12676] bridge_slave_0: mtu greater than device maximum [ 378.063668][T12695] device veth0_vlan left promiscuous mode [ 378.177374][T12695] device veth0_vlan entered promiscuous mode [ 378.428657][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 378.446095][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 378.504439][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 379.148642][T12717] device veth1_macvtap left promiscuous mode [ 379.228278][T12717] device macsec0 left promiscuous mode [ 381.798822][T12820] syz.1.3526[12820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.798882][T12820] syz.1.3526[12820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.326335][T12836] device pim6reg1 entered promiscuous mode [ 385.483797][T12954] 8ûÅ: renamed from syzkaller0 [ 387.155979][T13029] bridge0: port 3(veth0) entered blocking state [ 387.169499][T13029] bridge0: port 3(veth0) entered disabled state [ 387.201575][T13029] device veth0 entered promiscuous mode [ 387.216467][T13029] bridge0: port 3(veth0) entered blocking state [ 387.222797][T13029] bridge0: port 3(veth0) entered forwarding state [ 390.883960][T13146] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.890983][T13146] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.003600][T13150] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.010477][T13150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.017647][T13150] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.024456][T13150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.128094][T13150] device bridge0 entered promiscuous mode [ 392.006424][T13184] device pim6reg1 entered promiscuous mode [ 392.069444][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 392.317856][T13193] device pim6reg1 entered promiscuous mode [ 392.706067][T13208] device pim6reg1 entered promiscuous mode [ 393.531802][T13250] device pim6reg1 entered promiscuous mode [ 394.519362][ T49] bridge0: port 3(veth0) entered disabled state [ 394.536871][T13278] syz.2.3659[13278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.536926][T13278] syz.2.3659[13278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.579317][T13278] syz.2.3659[13278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.621092][T13278] syz.2.3659[13278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.096461][T13402] device pim6reg1 entered promiscuous mode [ 400.044672][T13444] device pim6reg1 entered promiscuous mode [ 400.685862][T13482] device syzkaller0 entered promiscuous mode [ 403.576939][T13610] device pim6reg1 entered promiscuous mode [ 403.904830][T13633] device veth0_vlan left promiscuous mode [ 403.938494][T13633] device veth0_vlan entered promiscuous mode [ 403.945445][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 403.960694][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 404.028398][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 404.252073][T13663] device pim6reg1 entered promiscuous mode [ 404.831765][T13703] device pim6reg1 entered promiscuous mode [ 404.891887][T13706] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.946347][T13706] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.955848][T13706] device bridge_slave_0 entered promiscuous mode [ 404.962971][T13706] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.989018][T13706] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.006727][T13706] device bridge_slave_1 entered promiscuous mode [ 405.014600][T13711] bridge0: port 3(veth0_to_batadv) entered blocking state [ 405.021795][T13711] bridge0: port 3(veth0_to_batadv) entered disabled state [ 405.036793][T13711] device veth0_to_batadv entered promiscuous mode [ 405.056354][T13711] bridge0: port 3(veth0_to_batadv) entered blocking state [ 405.063490][T13711] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 405.631335][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 405.661456][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 405.773516][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 405.828931][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 405.919302][ T513] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.926166][ T513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.998083][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 406.006525][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 406.062760][ T513] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.069664][ T513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.123137][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 406.158268][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 406.188716][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 406.208180][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 406.216126][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 406.234293][ T49] device veth0_vlan left promiscuous mode [ 406.389404][T13774] device pim6reg1 entered promiscuous mode [ 406.467219][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 406.476093][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 406.491184][T13706] device veth0_vlan entered promiscuous mode [ 406.504171][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 406.512412][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 406.527268][T13706] device veth1_macvtap entered promiscuous mode [ 406.535349][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 406.554765][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 406.576409][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 406.585948][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 406.594527][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 406.628672][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 406.639100][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 406.651508][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 406.662967][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 406.861125][T13823] device veth0_vlan left promiscuous mode [ 406.881982][T13823] device veth0_vlan entered promiscuous mode [ 406.900095][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 406.924196][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 407.004101][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 407.065557][T13833] syz.4.3819[13833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.065622][T13833] syz.4.3819[13833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.227623][T13896] device wg2 left promiscuous mode [ 408.309083][T13907] device veth0_vlan left promiscuous mode [ 408.314901][T13907] device veth0_vlan entered promiscuous mode [ 408.922849][T13983] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 408.928717][T13983] pim6reg0: linktype set to 821 [ 409.139211][T14006] device wg2 left promiscuous mode [ 409.522778][T14031] device sit0 entered promiscuous mode [ 409.976079][T14045] device veth0_vlan left promiscuous mode [ 409.992026][T14045] device veth0_vlan entered promiscuous mode [ 410.090324][T14052] device pim6reg1 entered promiscuous mode [ 410.124594][T14059] syz.3.3885[14059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.124653][T14059] syz.3.3885[14059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.148794][T14057] device veth0_vlan left promiscuous mode [ 410.182811][T14057] device veth0_vlan entered promiscuous mode [ 410.206869][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 410.217175][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 410.230213][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 410.382185][T14070] device veth0_vlan left promiscuous mode [ 410.460808][T14070] device veth0_vlan entered promiscuous mode [ 412.124841][T14155] ref_ctr_offset mismatch. inode: 0xa42 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 412.492728][T14169] tun0: tun_chr_ioctl cmd 35092 [ 412.505856][T14170] syz.4.3916[14170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.505909][T14170] syz.4.3916[14170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.526265][T14169] syz.4.3916[14169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.609389][T14185] device pim6reg1 entered promiscuous mode [ 412.766072][T14206] device veth1_macvtap entered promiscuous mode [ 412.779205][T14206] device macsec0 entered promiscuous mode [ 412.795525][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 413.240242][T14233] device bridge_slave_1 left promiscuous mode [ 413.250120][T14233] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.335954][T14233] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.565074][T14243] device pim6reg1 entered promiscuous mode [ 413.859332][T14262] syz.1.3941[14262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.859397][T14262] syz.1.3941[14262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.033809][T14277] syz.3.3947[14277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.070187][T14277] syz.3.3947[14277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.428100][T14290] device pim6reg1 entered promiscuous mode [ 415.366627][T14318] device pim6reg1 entered promiscuous mode [ 415.673913][T14335] device pim6reg1 entered promiscuous mode [ 416.982616][T14386] device pim6reg1 entered promiscuous mode [ 418.015195][T14436] device pim6reg1 entered promiscuous mode [ 418.095060][T14443] ªªªªªª: renamed from vlan0 [ 419.774561][T14484] device pim6reg1 entered promiscuous mode [ 420.002079][T14490] device veth0_vlan left promiscuous mode [ 420.033176][T14490] device veth0_vlan entered promiscuous mode [ 420.110404][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 420.134050][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 420.154195][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 420.532683][T14526] device pim6reg1 entered promiscuous mode [ 421.289029][T14586] device syzkaller0 entered promiscuous mode [ 422.672290][T14619] device pim6reg1 entered promiscuous mode [ 422.725766][T14632] device pim6reg1 entered promiscuous mode [ 422.762205][T14633] device syzkaller0 entered promiscuous mode [ 422.768757][T14633] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 422.810624][T14635] device pim6reg1 entered promiscuous mode [ 422.979309][T14644] device sit0 left promiscuous mode [ 423.266803][T14654] device sit0 entered promiscuous mode [ 424.537659][T14692] device pim6reg1 entered promiscuous mode [ 424.635876][T14698] device pim6reg1 entered promiscuous mode [ 424.752309][T14706] GPL: port 1(erspan0) entered blocking state [ 424.805604][T14706] GPL: port 1(erspan0) entered disabled state [ 424.905300][T14706] device erspan0 entered promiscuous mode [ 425.000521][T14714] GPL: port 1(erspan0) entered blocking state [ 425.006451][T14714] GPL: port 1(erspan0) entered forwarding state [ 425.083729][T14723] device pim6reg1 entered promiscuous mode [ 425.317355][T14739] device pim6reg1 entered promiscuous mode [ 427.070462][T14802] ªªªªªª: renamed from vlan0 [ 427.308223][T14814] device veth0_vlan left promiscuous mode [ 427.318849][T14814] device veth0_vlan entered promiscuous mode [ 427.349187][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 427.357718][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 427.371592][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 428.106127][T14852] device syzkaller0 entered promiscuous mode [ 428.430100][T14863] syz.3.4125[14863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.430161][T14863] syz.3.4125[14863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.445417][T14866] device sit0 left promiscuous mode [ 428.501697][T14866] device sit0 entered promiscuous mode [ 430.798171][T14948] device pim6reg1 entered promiscuous mode [ 430.928280][T14949] device sit0 entered promiscuous mode [ 431.026445][T14958] tap0: tun_chr_ioctl cmd 1074812118 [ 431.263018][T14974] device sit0 left promiscuous mode [ 431.297317][T14974] device sit0 entered promiscuous mode [ 431.608923][T14987] device pim6reg1 entered promiscuous mode [ 431.896472][T15043] syz.3.4174[15043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.896539][T15043] syz.3.4174[15043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.012129][T15050] device pim6reg1 entered promiscuous mode [ 433.243157][T15116] device pim6reg1 entered promiscuous mode [ 433.266040][T15117] device veth0_vlan left promiscuous mode [ 433.293041][T15117] device veth0_vlan entered promiscuous mode [ 433.352014][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 433.360884][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 433.380877][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 433.424569][T15121] device pim6reg1 entered promiscuous mode [ 433.769875][T15127] device sit0 left promiscuous mode [ 433.978296][T15150] device pim6reg1 entered promiscuous mode [ 434.093672][T15160] cgroup: fork rejected by pids controller in /syz3 [ 434.575605][T15297] syz.1.4223[15297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.575670][T15297] syz.1.4223[15297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.927417][T15343] device veth0_vlan left promiscuous mode [ 435.048421][T15343] device veth0_vlan entered promiscuous mode [ 435.115975][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 435.137250][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 435.212785][ T513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 439.100525][T15457] device sit0 left promiscuous mode [ 439.390169][T15459] device sit0 entered promiscuous mode [ 439.886792][T15471] bridge0: port 3(veth0_to_batadv) entered blocking state [ 439.900402][T15471] bridge0: port 3(veth0_to_batadv) entered disabled state [ 439.940323][T15471] device veth0_to_batadv entered promiscuous mode [ 439.948832][T15471] bridge0: port 3(veth0_to_batadv) entered blocking state [ 439.950016][T15484] syz.4.4269[15484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.955891][T15471] bridge0: port 3(veth0_to_batadv) entered listening state [ 439.955995][T15484] syz.4.4269[15484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.874489][T15626] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.892756][T15626] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.989644][T15627] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.996550][T15627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.003669][T15627] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.010535][T15627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.258781][T15627] device bridge0 entered promiscuous mode [ 443.569062][T15649] device sit0 entered promiscuous mode [ 443.749562][T15657] device sit0 entered promiscuous mode [ 444.057463][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 444.632770][T15728] device veth1_macvtap left promiscuous mode [ 444.643715][T15734] FAULT_INJECTION: forcing a failure. [ 444.643715][T15734] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 444.657883][T15734] CPU: 1 PID: 15734 Comm: syz.2.4344 Tainted: G W 5.10.226-syzkaller #0 [ 444.667331][T15734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 444.677225][T15734] Call Trace: [ 444.680362][T15734] dump_stack_lvl+0x1e2/0x24b [ 444.684866][T15734] ? bfq_pos_tree_add_move+0x43b/0x43b [ 444.690167][T15734] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 444.696587][T15734] ? proc_fail_nth_write+0x20b/0x290 [ 444.701707][T15734] dump_stack+0x15/0x17 [ 444.705693][T15734] should_fail+0x3c6/0x510 [ 444.709951][T15734] should_fail_usercopy+0x1a/0x20 [ 444.714818][T15734] _copy_from_user+0x20/0xd0 [ 444.719241][T15734] sock_do_ioctl+0x20e/0x3a0 [ 444.723664][T15734] ? sock_show_fdinfo+0xa0/0xa0 [ 444.728352][T15734] ? kernel_write+0x3d0/0x3d0 [ 444.732867][T15734] ? selinux_file_ioctl+0x3cc/0x540 [ 444.737899][T15734] sock_ioctl+0x4a6/0x760 [ 444.742062][T15734] ? sock_poll+0x340/0x340 [ 444.746323][T15734] ? security_file_ioctl+0x84/0xb0 [ 444.751263][T15734] ? sock_poll+0x340/0x340 [ 444.755517][T15734] __se_sys_ioctl+0x114/0x190 [ 444.760469][T15734] __x64_sys_ioctl+0x7b/0x90 [ 444.764898][T15734] do_syscall_64+0x34/0x70 [ 444.769183][T15734] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 444.775316][T15734] RIP: 0033:0x7fc9fcd10719 [ 444.779557][T15734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 444.798991][T15734] RSP: 002b:00007fc9fb989038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 444.807231][T15734] RAX: ffffffffffffffda RBX: 00007fc9fcec7f80 RCX: 00007fc9fcd10719 [ 444.815042][T15734] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000b [ 444.822853][T15734] RBP: 00007fc9fb989090 R08: 0000000000000000 R09: 0000000000000000 [ 444.830666][T15734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 444.838476][T15734] R13: 0000000000000000 R14: 00007fc9fcec7f80 R15: 00007ffee5cb32d8 [ 444.868324][T15735] device veth1_macvtap entered promiscuous mode [ 444.875261][T15735] device macsec0 entered promiscuous mode [ 445.380575][T15775] FAULT_INJECTION: forcing a failure. [ 445.380575][T15775] name failslab, interval 1, probability 0, space 0, times 0 [ 445.393607][T15775] CPU: 1 PID: 15775 Comm: syz.1.4355 Tainted: G W 5.10.226-syzkaller #0 [ 445.403048][T15775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 445.412935][T15775] Call Trace: [ 445.416080][T15775] dump_stack_lvl+0x1e2/0x24b [ 445.420577][T15775] ? bfq_pos_tree_add_move+0x43b/0x43b [ 445.425879][T15775] dump_stack+0x15/0x17 [ 445.429865][T15775] should_fail+0x3c6/0x510 [ 445.434118][T15775] ? __request_module+0x28c/0x8d0 [ 445.438973][T15775] __should_failslab+0xa4/0xe0 [ 445.443573][T15775] should_failslab+0x9/0x20 [ 445.448008][T15775] kmem_cache_alloc_trace+0x3a/0x2e0 [ 445.453126][T15775] ? dev_load+0x5b/0xb0 [ 445.457116][T15775] __request_module+0x28c/0x8d0 [ 445.461799][T15775] ? selinux_capable+0x2f1/0x430 [ 445.466572][T15775] ? capable+0x78/0xe0 [ 445.470482][T15775] ? copy_regset_to_user+0x210/0x210 [ 445.475601][T15775] ? cap_capable+0x1ce/0x270 [ 445.480026][T15775] ? security_capable+0x87/0xb0 [ 445.484735][T15775] dev_load+0x5b/0xb0 [ 445.488536][T15775] dev_ioctl+0x513/0xb40 [ 445.492622][T15775] sock_do_ioctl+0x295/0x3a0 [ 445.497067][T15775] ? sock_show_fdinfo+0xa0/0xa0 [ 445.501732][T15775] ? kernel_write+0x3d0/0x3d0 [ 445.506245][T15775] ? selinux_file_ioctl+0x3cc/0x540 [ 445.511274][T15775] sock_ioctl+0x4a6/0x760 [ 445.515444][T15775] ? sock_poll+0x340/0x340 [ 445.519692][T15775] ? security_file_ioctl+0x84/0xb0 [ 445.524634][T15775] ? sock_poll+0x340/0x340 [ 445.528892][T15775] __se_sys_ioctl+0x114/0x190 [ 445.533401][T15775] __x64_sys_ioctl+0x7b/0x90 [ 445.537831][T15775] do_syscall_64+0x34/0x70 [ 445.542084][T15775] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 445.547809][T15775] RIP: 0033:0x7f404088e719 [ 445.552069][T15775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 445.571500][T15775] RSP: 002b:00007f403f507038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.579747][T15775] RAX: ffffffffffffffda RBX: 00007f4040a45f80 RCX: 00007f404088e719 [ 445.587561][T15775] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000b [ 445.595369][T15775] RBP: 00007f403f507090 R08: 0000000000000000 R09: 0000000000000000 [ 445.603181][T15775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 445.611006][T15775] R13: 0000000000000000 R14: 00007f4040a45f80 R15: 00007ffde5e7fd88 [ 445.627686][T15780] ÿÿÿÿÿÿ: renamed from vlan1 [ 445.632996][ T24] audit: type=1400 audit(1731012101.270:183): avc: denied { sys_module } for pid=15774 comm="syz.1.4355" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 446.291756][T15817] FAULT_INJECTION: forcing a failure. [ 446.291756][T15817] name failslab, interval 1, probability 0, space 0, times 0 [ 446.378247][T15817] CPU: 0 PID: 15817 Comm: syz.2.4370 Tainted: G W 5.10.226-syzkaller #0 [ 446.387713][T15817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 446.397674][T15817] Call Trace: [ 446.400812][T15817] dump_stack_lvl+0x1e2/0x24b [ 446.405317][T15817] ? panic+0x812/0x812 [ 446.409234][T15817] ? bfq_pos_tree_add_move+0x43b/0x43b [ 446.414518][T15817] dump_stack+0x15/0x17 [ 446.418512][T15817] should_fail+0x3c6/0x510 [ 446.422762][T15817] ? __request_module+0x2ad/0x8d0 [ 446.427621][T15817] __should_failslab+0xa4/0xe0 [ 446.432221][T15817] should_failslab+0x9/0x20 [ 446.436564][T15817] __kmalloc_track_caller+0x5f/0x320 [ 446.441683][T15817] ? __kasan_kmalloc+0x9/0x10 [ 446.446195][T15817] kstrdup+0x34/0x70 [ 446.449931][T15817] __request_module+0x2ad/0x8d0 [ 446.454614][T15817] ? selinux_capable+0x2f1/0x430 [ 446.459390][T15817] ? capable+0x78/0xe0 [ 446.463295][T15817] ? copy_regset_to_user+0x210/0x210 [ 446.468417][T15817] ? cap_capable+0x1ce/0x270 [ 446.472840][T15817] ? security_capable+0x87/0xb0 [ 446.477529][T15817] dev_load+0x5b/0xb0 [ 446.481347][T15817] dev_ioctl+0x513/0xb40 [ 446.485428][T15817] sock_do_ioctl+0x295/0x3a0 [ 446.489854][T15817] ? sock_show_fdinfo+0xa0/0xa0 [ 446.494538][T15817] ? kernel_write+0x3d0/0x3d0 [ 446.499055][T15817] ? selinux_file_ioctl+0x3cc/0x540 [ 446.504089][T15817] sock_ioctl+0x4a6/0x760 [ 446.508370][T15817] ? sock_poll+0x340/0x340 [ 446.512614][T15817] ? security_file_ioctl+0x84/0xb0 [ 446.517571][T15817] ? sock_poll+0x340/0x340 [ 446.521809][T15817] __se_sys_ioctl+0x114/0x190 [ 446.526343][T15817] __x64_sys_ioctl+0x7b/0x90 [ 446.530756][T15817] do_syscall_64+0x34/0x70 [ 446.535007][T15817] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 446.540734][T15817] RIP: 0033:0x7fc9fcd10719 [ 446.544978][T15817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 446.564432][T15817] RSP: 002b:00007fc9fb989038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 446.572688][T15817] RAX: ffffffffffffffda RBX: 00007fc9fcec7f80 RCX: 00007fc9fcd10719 [ 446.580472][T15817] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000b [ 446.588284][T15817] RBP: 00007fc9fb989090 R08: 0000000000000000 R09: 0000000000000000 [ 446.596208][T15817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 446.604020][T15817] R13: 0000000000000000 R14: 00007fc9fcec7f80 R15: 00007ffee5cb32d8 [ 446.668302][T15825] bridge0: port 3(veth0_to_batadv) entered disabled state [ 446.675351][T15825] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.682176][T15825] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.701363][T15825] device bridge0 left promiscuous mode [ 446.795432][T15827] bridge0: port 3(veth0_to_batadv) entered blocking state [ 446.802420][T15827] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 446.809604][T15827] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.816362][T15827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.823497][T15827] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.830438][T15827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.862073][T15827] device bridge0 entered promiscuous mode [ 447.669435][T15893] ÿÿÿÿÿÿ: renamed from vlan1 [ 447.731337][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 447.827790][T15902] device sit0 left promiscuous mode [ 448.583044][T15978] device veth0_vlan left promiscuous mode [ 448.621675][T15978] device veth0_vlan entered promiscuous mode [ 454.997948][ C0] bridge0: port 3(veth0_to_batadv) entered learning state [ 455.354239][T16134] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.361199][T16134] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.368440][T16134] device bridge0 left promiscuous mode [ 455.379760][T16134] device bridge_slave_1 left promiscuous mode [ 455.385726][T16134] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.393368][T16134] device bridge_slave_0 left promiscuous mode [ 455.399397][T16134] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.552627][T16141] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.085438][ T24] audit: type=1400 audit(1731012116.720:184): avc: denied { create } for pid=16236 comm="syz.0.4478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 466.662784][T16315] syz.0.4499[16315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=4405 state=3 status=67 (errno 9: Bad file descriptor) [ 466.662842][T16315] syz.0.4499[16315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.039028][ T513] device veth0_to_batadv left promiscuous mode [ 470.056339][ T513] bridge0: port 3(veth0_to_batadv) entered disabled state [ 470.063653][ T513] device bridge_slave_1 left promiscuous mode [ 470.069647][ T513] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.076998][ T513] device bridge_slave_0 left promiscuous mode [ 470.083073][ T513] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.357962][ C0] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 470.365089][ C0] bridge0: topology change detected, propagating [ 471.639243][ T513] device veth0_to_batadv left promiscuous mode [ 471.645251][ T513] bridge0: port 3(veth0_to_batadv) entered disabled state [ 471.652626][ T513] device bridge_slave_1 left promiscuous mode [ 471.658576][ T513] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.665711][ T513] device bridge_slave_0 left promiscuous mode [ 471.671698][ T513] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.679727][ T513] device veth1_macvtap left promiscuous mode [ 471.685535][ T513] device veth0_vlan left promiscuous mode [ 471.691339][ T513] device veth1_macvtap left promiscuous mode