last executing test programs: 1m15.254586627s ago: executing program 4 (id=2325): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="d40500000000000061"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 1m14.701057159s ago: executing program 4 (id=2330): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x5452, 0x800000020202000) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffda9) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8922, &(0x7f0000000080)) 1m14.50516309s ago: executing program 4 (id=2331): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095", @ANYRESDEC=0x0, @ANYRES16=0x0, @ANYRESDEC, @ANYRES8, @ANYRESDEC], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000723e27c10000000000000084b1000000000000"], 0x48) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x17, 0x10, &(0x7f0000000b40)=ANY=[@ANYRES16, @ANYBLOB="b91a1d8191135e1ad8a22d2bf1331c51053fdbe4f3f4772466bf853e03cce63d316b59acb67a404f2989140033bafcf9bb2e221321f4b1665efb680aae616b0951f77886ff48c267ac182c4818cbc5bcb1d8b5bef810d0807bd50d94eee983582cd7bd4e4a6128bda28e00e62ecdb6ac681d1ab9605c93682068c112b7f594eb052c3ecb4ed0f76702c6cee5ca151901d5efff72d12c6640f407615942983a90e6ca9870c70a3d6276ba49149d7463c8883eebdf1ba8da2caab4bbd575bef9d96b821b", @ANYBLOB="7622f472147f88fdab84925c3b8d980b5c6ebde699fed344237326ef8b5291d688dc61c4a3bbb47d2c"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x24, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80)=[{0x0}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0xc, 0x0, 0x4000, @void, @value}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40047451, 0x2000000c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1m13.472322716s ago: executing program 4 (id=2340): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="d405000000000000611014000000000025"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 1m12.44380534s ago: executing program 4 (id=2348): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0xb9, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000080074aad5a800000000f2ff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7f70000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000010140)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, &(0x7f0000010080)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095000000000000007b84cdec698bd1def814850ea80e9c02bd3419f8e23ff0"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xfffffffffffffd5c) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 1m12.178097622s ago: executing program 4 (id=2350): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x4, 0x0, &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9f00000000000002000006043de8a01a0000000000000003000000000003000000002e6100000000000000000000000000000000000000000000ef0a5f697aeed62323aff66f5f18354502c62ae7e5eb87543329513a95578302d30f2be179c9bced86e7d5ba99fc4db04c24334b78bec53f6ac8341fa27a1bce20b0fc0bcda548721f4d82fbb3faffd6149f0e1c546eae638940545a0e8a1fc4618be52148182db873fe57870f89984c067b25aecb7f727c8eaff361c374fd"], &(0x7f0000000380)=""/187, 0x3a, 0xbb, 0x1, 0x0, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000e40)=ANY=[@ANYRES32, @ANYRESHEX=r0, @ANYBLOB="2d88c1f82761dfd6a7aa99e310ef8c38d26ac7dc24007661b933e0b757b3a89766a76a91a5f6c0f8afccb2adb065e6008285786e25b15f2a97b7e96edc74d93719d26e71d032ee34d986099e5fe842e216cfb039c17467ad16168aa40735bd402299cb7147aa0007b706d6d334d62550ed51c6ba3d22ac5481208655d1ec463c1a33efb1d5db72a29fbc37c3b970503a32d6949ba499e8cd33500aad3d", @ANYBLOB="a2e1e1e5f8ccb3e660a2cd3084b74c5f2682a71565306a2d03000000cab55950eb1a16e3dc6719317e3ea7bb6918f64d5081f1ca0937407c8fff41ac267c1884ad454415befecff8930c679161372f920f0f1cd04ca9ff8d5619901e4546265c925bbcd578b0f93a5e54df635f1a70c4fc4b6987b55893db42b460cb595ce6ba44c3315a0b4e899993572a2933623a2bb74394f8", @ANYRESDEC=r2, @ANYRES64=r4, @ANYRESOCT=r1], 0x0, 0x5fc83445, 0x3d, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f0000000780)="9935df2fe22a55a4a52362ceca7518cd81979774e7a2c4974d5d85d510deb567fad7a85d9fa662674b64718d57f5e3531b63157ac385d18765621d89d308225928d7cfb77ac518371a84aa1bb3e61f71", &(0x7f0000000a80)=""/224}, 0x20) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = openat$cgroup_procs(r3, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000880), 0x12) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r8, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000c40)=ANY=[@ANYBLOB="9feb010018000000000000c4de73e81056d5fd5772ed76d3000c0000000c000000060000000cd91b44ed9f00000000000014050000000000612e2e00d5619b689cf11fc54c448a6b7af455202c270954bd9688426b6f73b6b4afb9def735d1a21aa2199aacc6f8fc6c17a432ee"], 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, r3, 0x1, r6, 0x7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000fc0)='V\x13\xbf\xf7\xdc\x1c\xc4ca\x9c\x89$\xc2\xc1\x88{+\xa5\xa3\xca\xb1\x06\x10\x8f\x01\x024Ev\xb80\x98\xd1\x80\xc3Ke\xd6IS\xbc@\xe3\xcf9q\xf5\x18\xf9\x05\x11\xa9v\x9ex\xcc\xc4\xc2k\xf3\xf0paf\xb3J\xcaF\xbc\xae\x98\xbe2\x16\xb8x\xd7\xd6\x141\xf5@\x169SF\x01\xa2\x02\xb1\"_\xa4\xb4\xeb\x1d\xeat<\xb5mH\xf0 &\xf6\x16Jxk\x80O1\x00\x00:\b^\xed\x857lC\xc6[Mg\xce ~\x95\xea\x10\xc8;m\x1a2du\xe1\x10\xaa\x10\xa1\x8a\xed\xa0\xe2dR\xeb$>?\x91f\x82\x9e\x9a^\xa6\x12\x876\x80\xb0\r\xde\x9e\x12\x93\xf2^\x9f\xd7\x93\xe2\xe1(vJ\xea\xa3\x86|\x13 \xdan^\xb3A\xfe\x95O\xe3\xe2RC\x177\x84\xe0\xac0\xea\xd6\xddUB\x03\xe9\b\xe5<*wHX\x1b\x04l\x98\xaf\xfdsN\xddb\xcb\xe3\xf5\x91\x0e\xa9\xcf\x0e\xd0\xb2c\xaf\xa9r\xefn|6\xa2^\xa6!?\xe3\xcb\x06=D\xcal8\x14Xl\xd1\r\xcf2\x94\xb2\xa3\xee\xe2\fu\x03p*\x13A\xb6Z\xef\x9a\xe6`\x14\xd7nP\xa2\x98\xaed\x8c\xa1\xfc\x88\x12\xf4\xd6MUF\xd4$\x11\x019\x12\fR\xe1\xf3\xefIU\x88r\xda\xa4T\x159\x91\xc5\x90\x11\x86\xd7\xa9\x85`E\xcb\x04NV\x05\xa4\xdb\xa8O*\xcc\xc0x') syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00 \x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="050000000300356b3fac0000020100"/32], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r9, 0x58, &(0x7f00000008c0)}, 0x10) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x126b0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180)}, 0x7c24, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffbfff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1e) 57.125813999s ago: executing program 32 (id=2350): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x4, 0x0, &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9f00000000000002000006043de8a01a0000000000000003000000000003000000002e6100000000000000000000000000000000000000000000ef0a5f697aeed62323aff66f5f18354502c62ae7e5eb87543329513a95578302d30f2be179c9bced86e7d5ba99fc4db04c24334b78bec53f6ac8341fa27a1bce20b0fc0bcda548721f4d82fbb3faffd6149f0e1c546eae638940545a0e8a1fc4618be52148182db873fe57870f89984c067b25aecb7f727c8eaff361c374fd"], &(0x7f0000000380)=""/187, 0x3a, 0xbb, 0x1, 0x0, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000e40)=ANY=[@ANYRES32, @ANYRESHEX=r0, @ANYBLOB="2d88c1f82761dfd6a7aa99e310ef8c38d26ac7dc24007661b933e0b757b3a89766a76a91a5f6c0f8afccb2adb065e6008285786e25b15f2a97b7e96edc74d93719d26e71d032ee34d986099e5fe842e216cfb039c17467ad16168aa40735bd402299cb7147aa0007b706d6d334d62550ed51c6ba3d22ac5481208655d1ec463c1a33efb1d5db72a29fbc37c3b970503a32d6949ba499e8cd33500aad3d", @ANYBLOB="a2e1e1e5f8ccb3e660a2cd3084b74c5f2682a71565306a2d03000000cab55950eb1a16e3dc6719317e3ea7bb6918f64d5081f1ca0937407c8fff41ac267c1884ad454415befecff8930c679161372f920f0f1cd04ca9ff8d5619901e4546265c925bbcd578b0f93a5e54df635f1a70c4fc4b6987b55893db42b460cb595ce6ba44c3315a0b4e899993572a2933623a2bb74394f8", @ANYRESDEC=r2, @ANYRES64=r4, @ANYRESOCT=r1], 0x0, 0x5fc83445, 0x3d, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f0000000780)="9935df2fe22a55a4a52362ceca7518cd81979774e7a2c4974d5d85d510deb567fad7a85d9fa662674b64718d57f5e3531b63157ac385d18765621d89d308225928d7cfb77ac518371a84aa1bb3e61f71", &(0x7f0000000a80)=""/224}, 0x20) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = openat$cgroup_procs(r3, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000880), 0x12) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r8, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000c40)=ANY=[@ANYBLOB="9feb010018000000000000c4de73e81056d5fd5772ed76d3000c0000000c000000060000000cd91b44ed9f00000000000014050000000000612e2e00d5619b689cf11fc54c448a6b7af455202c270954bd9688426b6f73b6b4afb9def735d1a21aa2199aacc6f8fc6c17a432ee"], 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, r3, 0x1, r6, 0x7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000fc0)='V\x13\xbf\xf7\xdc\x1c\xc4ca\x9c\x89$\xc2\xc1\x88{+\xa5\xa3\xca\xb1\x06\x10\x8f\x01\x024Ev\xb80\x98\xd1\x80\xc3Ke\xd6IS\xbc@\xe3\xcf9q\xf5\x18\xf9\x05\x11\xa9v\x9ex\xcc\xc4\xc2k\xf3\xf0paf\xb3J\xcaF\xbc\xae\x98\xbe2\x16\xb8x\xd7\xd6\x141\xf5@\x169SF\x01\xa2\x02\xb1\"_\xa4\xb4\xeb\x1d\xeat<\xb5mH\xf0 &\xf6\x16Jxk\x80O1\x00\x00:\b^\xed\x857lC\xc6[Mg\xce ~\x95\xea\x10\xc8;m\x1a2du\xe1\x10\xaa\x10\xa1\x8a\xed\xa0\xe2dR\xeb$>?\x91f\x82\x9e\x9a^\xa6\x12\x876\x80\xb0\r\xde\x9e\x12\x93\xf2^\x9f\xd7\x93\xe2\xe1(vJ\xea\xa3\x86|\x13 \xdan^\xb3A\xfe\x95O\xe3\xe2RC\x177\x84\xe0\xac0\xea\xd6\xddUB\x03\xe9\b\xe5<*wHX\x1b\x04l\x98\xaf\xfdsN\xddb\xcb\xe3\xf5\x91\x0e\xa9\xcf\x0e\xd0\xb2c\xaf\xa9r\xefn|6\xa2^\xa6!?\xe3\xcb\x06=D\xcal8\x14Xl\xd1\r\xcf2\x94\xb2\xa3\xee\xe2\fu\x03p*\x13A\xb6Z\xef\x9a\xe6`\x14\xd7nP\xa2\x98\xaed\x8c\xa1\xfc\x88\x12\xf4\xd6MUF\xd4$\x11\x019\x12\fR\xe1\xf3\xefIU\x88r\xda\xa4T\x159\x91\xc5\x90\x11\x86\xd7\xa9\x85`E\xcb\x04NV\x05\xa4\xdb\xa8O*\xcc\xc0x') syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00 \x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="050000000300356b3fac0000020100"/32], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r9, 0x58, &(0x7f00000008c0)}, 0x10) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x126b0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180)}, 0x7c24, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffbfff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1e) 1.977193699s ago: executing program 0 (id=2968): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="0900002a77ae9d8d041f909f2b6f68f52600007f831013bbbbcdcd00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b00000005000000000400000d00000001000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000044700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYRES64=r1, @ANYRES8, @ANYRES64, @ANYRES32=0x0, @ANYRESHEX=0x0, @ANYRESOCT=r4, @ANYRES16=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000}, 0x0, 0xfffffffffffffffe, 0xa}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000010000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x2, 0x0}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x72, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000340), &(0x7f00000004c0), 0x8, 0xa4, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x7, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r1, @ANYBLOB="0000000000000000b702000000040002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', r12, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r13}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r14) 1.81044771s ago: executing program 3 (id=2972): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="d405000000000000611014000000000025"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 1.734375721s ago: executing program 0 (id=2973): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001880)={r1, 0xe0, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa3, &(0x7f0000001640)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000016c0), &(0x7f0000001700), 0x8, 0x70, 0x8, 0x8, &(0x7f0000001740)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001540)=@bloom_filter={0x1e, 0x97, 0x9, 0x3, 0x1b020, 0xffffffffffffffff, 0xb, '\x00', r2, r1, 0x4, 0x3, 0x1, 0xb, @value, @void, @value=r1}, 0x50) (async, rerun: 32) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080040000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000079117000000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r3}, 0x8) (async, rerun: 32) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) (async, rerun: 32) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)=@generic={&(0x7f0000000300)='./file0\x00', r3}, 0x18) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x7fffffff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) (async) close(r7) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018140000", @ANYRES32, @ANYBLOB="00000000000000001600000001000000180000000000000000000000000000009500000000000000360a000000000000180200002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000720afbff0000000485000000060000009500000000000000d582a27ce32b3947c7c45798672fcaf17e2b51e4404c630e959cc93ee9330cfe642b3f8ba76956f1fc3004640135562bf8621156cc6699e3075b151c08388c0ca3aeff2b52cdca7798f1354cf55fc4a3dcec3062ac8d686ad3dd8a4b4a7fda190a97bea718"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x1f, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000018c0)='./cgroup/syz1\x00', 0x200002, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 1.624257981s ago: executing program 0 (id=2975): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x7}, 0x0, 0xf, r2, 0x2) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x8) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000400000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r4}, 0x10) unlink(0x0) openat$cgroup_ro(r3, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) mkdir(0x0, 0x0) r5 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r2, 0x0, 0x0, 0x0}, 0x30) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1888, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x2a020600, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000003c0), &(0x7f00000004c0)="df2239a5abfe7f736463aa3ae5541525d85b9df771aae02a28043c0e57aead8f2a4b3a139507dd43ac6862d4dca5877e23f4111791863277a703b41bea7d69d3a8a7ca074f8c3f27cffde6d291cb265ddfc009e96d29") ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000080)) mkdir(&(0x7f0000000040)='./cgroup/../file0\x00', 0x3) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r8, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) 1.464629112s ago: executing program 5 (id=2977): r0 = getpid() perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x14, 0x0, 0x0, 0x0, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x9}, 0x114000, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, r0, 0x10, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7eebd673}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0e00000004000000040000000a00000000000000", @ANYRESDEC=0x0, @ANYRES64=r2], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c250000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x1, 0x6, 0xff, 0x6, 0x0, 0x6, 0x40401, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xb, 0x4, @perf_config_ext={0x10000, 0x7ff}, 0x8254, 0xe43f, 0x7, 0x2, 0x5, 0x10000, 0x9, 0x0, 0x6, 0x0, 0x35}, r0, 0x0, r1, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xa3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0xfffffffb, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20004011) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x800}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x52) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x800000000000000, 0x1}, 0x0, 0x401, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)={&(0x7f0000000080)=@abs={0x1}, 0x6e, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x16, 0x0, 0x4, 0x1, 0x4, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x100, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f3, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 1.299945193s ago: executing program 5 (id=2979): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x65}, @generic={0x7e}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x18, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000060000008500000082000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) 1.222756084s ago: executing program 2 (id=2980): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000016000000b30000007f"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) 1.164260644s ago: executing program 5 (id=2981): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x5452, 0x800000020202000) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffda9) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) 1.153805673s ago: executing program 0 (id=2982): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000004", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="d405000000000000611014000000000025"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 1.081432104s ago: executing program 2 (id=2983): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x18, &(0x7f00000004c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xfffffffffffffeb2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x161f, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0xbe20}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001191f37538e486dd630080fc11"], 0xfdef) 1.041591504s ago: executing program 5 (id=2985): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6b, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x6d) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b0000000500000000040000cd0000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000dce17e776b70c33c8f000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c1, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b70400000000000085000000430000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) mkdir(0x0, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7020000010000008500000086000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r2}, 0x18) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0x12) 1.023058314s ago: executing program 2 (id=2986): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4851}, 0x0) recvmsg(r0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="070000000000000020000000ffffffff0000", @ANYRES32, @ANYBLOB='\x00'/13, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="660a00000000000061114c0000000000850000005500000095"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="190000000400000004000000224d0000000000007c60d9bc000000", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000e5850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000240)='rpcgss_svc_unwrap_failed\x00', r4, 0x0, 0x80000}, 0xfffffff7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002400000024000000030000000000000002000004c5000000000000000300000005000000010000000300000000000000002e00d1726b6b496a853bf2537402c844d1cdf06ad77ea5f92f3681b61a91b2b4d9f772206a4fe0d9069dfa332d46aa6ef91c23a2d26184d645997212980f1f233b92a214d731223e59658a1a4b157e195a50c0011252dc69ae1327ec46b5c3"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000640)="3d8ff30d934f105e10745367e83f90ff11816d76742aed9e48699843b48ae9e67a4199220277807e3d375fd6c34e37b2ab57abbd1662c4d24cfcf379facd7006b20e4e1e74cd923861ce59a806313f1ec590248a3771e0e1b9d7757ef9e1661ccf9925", &(0x7f00000008c0)=""/158, &(0x7f00000006c0)="2a95b8f6c121714f8f7abd82bea43639876d6f42def847034456816041503860253b998ce37644b89a2a32c76fe42ac06a4e3e153db24fea14767b19239d8b7317465f6c26993df8ff48f069dee89b743b1c57108fd8221165f543601f3f3b3711726203179368828c306726dcfe71278966", &(0x7f0000000980)="6a529ca253cbeeca1cc48f06267e10721a16138785b36e9d1d7a4fdbe55d175a0fc50f9b4727ef562d87981a3f23973c79124af6deb586d0c6f549680d47eb87ee8f262385848136b1f8fa4be3677e644d2d3e4f048b99954f7f07a49748d9160709de586307e054cdb5f4a757fd5fb412cb3fc2128214ed906350e44ef147eb03df2976e3ec287bf2d0cd8d9f67e8748e07119910ba1b2254bf29619d7dc27d8508eee015cc101a0af5a0229a2c489157d664b32685789b1bc7ce738be3eaecfa63f3ef18fafccd229692615fb9742b48e68c650e9316f33f7376bfd326c87a9d0e7230d34156dbf3346f33eb9d55068c140c", 0x16, r2, 0x4}, 0x38) bpf$PROG_LOAD_XDP(0x5, 0x0, 0xfc7c) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) 965.168555ms ago: executing program 1 (id=2987): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x400002, 0x0}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f0000000200)=ANY=[@ANYBLOB="1800"/16, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000070200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000640), 0x0, 0x4001, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x1ff, 0x0, r1, 0x31, '\x00', 0x0, r4, 0x3, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 854.183105ms ago: executing program 3 (id=2988): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000a40)="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", 0x5a9}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = gettid() sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {r3}}}], 0x20}, 0x0) 852.881335ms ago: executing program 5 (id=2989): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001000000", @ANYRES32, @ANYBLOB="0000060000800000000000000000de0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8, 0xf2db72b, 0x0, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0xffffffffffffffff, 0xe0000000, 0x18}, 0xc) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={0x0, 0x5, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x1c, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7f}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0xc7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @ldst={0x1, 0x1, 0x0, 0x2, 0x5, 0x100, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x774, 0xb4, &(0x7f0000000280)=""/180, 0x41000, 0x18, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r1, 0x0, &(0x7f0000000580)=[r0, r0, r0, r0, r0, r4, r5, 0xffffffffffffffff], 0x0, 0x10, 0x2, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000040)=ANY=[@ANYRESOCT=0x0, @ANYRESOCT=r3], 0xfdef) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) 830.174775ms ago: executing program 1 (id=2990): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x5, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000040)={'vlan0', 0x32, 0x31}, 0x8) ioctl$TUNSETLINK(r2, 0x400454cd, 0xfffe) sendmsg$inet(r0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=[@ip_tos_int={{0x14}}], 0x18}, 0x0) 767.524216ms ago: executing program 1 (id=2991): perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x98, 0x1, 0x8, 0xcb, 0x0, 0x0, 0x80402, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x6, 0xfff}, 0x1068d0, 0x1ff, 0x1c00, 0x4, 0xc90, 0x9, 0x1, 0x0, 0x6, 0x0, 0x100000001}, 0x0, 0x9, 0xffffffffffffffff, 0xb) (async) r0 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x98, 0x1, 0x8, 0xcb, 0x0, 0x0, 0x80402, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x6, 0xfff}, 0x1068d0, 0x1ff, 0x1c00, 0x4, 0xc90, 0x9, 0x1, 0x0, 0x6, 0x0, 0x100000001}, 0x0, 0x9, 0xffffffffffffffff, 0xb) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000c00)=ANY=[@ANYRES64=0x0, @ANYRES8=r1, @ANYBLOB="85ab426d819136e02ddde55e2ada13657d03747865fa91f1de4f368707d29c70fc73090b53cc7748c5382f46f96f891ae370755bcad6fe1bee4e4de68daafc7273f6cf430d0b4ded617912efc27648217e9ba7d8d2019db5215edf5c00b14d3cdd58ac451de5de89eea78465351e717fd828e178187ca21ac4287578e646565fac54d7799dff0c59a8a2c9894411c04533e9ace8e0b145d6ca2a5b1f63d9e203442246fd6b115ef75ff58450821224193215d539db222782a5f728ce526b131edf838589bd49a32c0f15b919815868f05885028f9ecafa6affad", @ANYRES64=r0, @ANYRES8=r1, @ANYRESHEX=r1, @ANYRES16=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4b, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000c00)=ANY=[@ANYRES64=0x0, @ANYRES8=r1, @ANYBLOB="85ab426d819136e02ddde55e2ada13657d03747865fa91f1de4f368707d29c70fc73090b53cc7748c5382f46f96f891ae370755bcad6fe1bee4e4de68daafc7273f6cf430d0b4ded617912efc27648217e9ba7d8d2019db5215edf5c00b14d3cdd58ac451de5de89eea78465351e717fd828e178187ca21ac4287578e646565fac54d7799dff0c59a8a2c9894411c04533e9ace8e0b145d6ca2a5b1f63d9e203442246fd6b115ef75ff58450821224193215d539db222782a5f728ce526b131edf838589bd49a32c0f15b919815868f05885028f9ecafa6affad", @ANYRES64=r0, @ANYRES8=r1, @ANYRESHEX=r1, @ANYRES16=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4b, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b0000f4ff63482a4572cdb15b00000000000000", @ANYRES32, @ANYBLOB="f600"/20, @ANYRESHEX, @ANYRES32, @ANYBLOB="050000000200"/28], 0x50) (async) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b0000f4ff63482a4572cdb15b00000000000000", @ANYRES32, @ANYBLOB="f600"/20, @ANYRESHEX, @ANYRES32, @ANYBLOB="050000000200"/28], 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1e00000000080000d41a69570700000000000000", @ANYRES32=r3, @ANYBLOB="5c3bb74600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0500000005000000040000000a000000000000000009000000000000"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030004009500000000000000e028196ac657afd624847c048d120c0486b1ee65fdeb118c706282e503d7ed3bd140099063a82a25dff12909b2455f637bc501a34273f18dffba53d6cabf7bb20d7d9b1746688e09502522fd701b15f2acf5a5c22948f5a673041bee8cabb32e3db07d7ef5336d978bf2c9abc31c4c0a8ba77f04924ba487ba76158e2f30fedfcd312d48ec95"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1b00230100000000e9bb31fe85fa8e9dea884889", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0xc, &(0x7f0000000840)=ANY=[@ANYRESDEC=r6, @ANYRES64=r2, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000400000000000000020000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'/20, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000008817375f20f2bc1b94b45846ad9ce454758f135bcef148f078a87ec6a9eb0730f2cfd1c08cd501d209e0f56c74493dcffbe529e6c923978f7e685e818d3570b2235c2d84adb9f4a62086ac0164ce882716d1c8b542b35b999d272391c027a62aec3be76618937dea86771206866986d27e27043c4c3b659b888ff8fe7fd223d98b1a6bb06b0f4d06ecdea7f4b58369c6701dff1c86ccb77cb786ec09d7d83ef5e5e03cf4856be0b42327", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'/20, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000008817375f20f2bc1b94b45846ad9ce454758f135bcef148f078a87ec6a9eb0730f2cfd1c08cd501d209e0f56c74493dcffbe529e6c923978f7e685e818d3570b2235c2d84adb9f4a62086ac0164ce882716d1c8b542b35b999d272391c027a62aec3be76618937dea86771206866986d27e27043c4c3b659b888ff8fe7fd223d98b1a6bb06b0f4d06ecdea7f4b58369c6701dff1c86ccb77cb786ec09d7d83ef5e5e03cf4856be0b42327", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair(0x1e, 0x3, 0x0, &(0x7f0000000400)={0x0, 0x0}) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0300000004000000040000000a000000000000001c8a5a84038a47f683128244d683b7fc7e31539032a0dae63f4ed973f52105cc7c458197daae5b571c187eff77d452870ccb672463d077bd8891e69de075f336750e9983ad7954758933950525479680cad7cf45f42f", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000080)) 702.601326ms ago: executing program 3 (id=2992): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)='%pi6 \x00'}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xd, 0x2}]}, @float={0x7, 0x0, 0x0, 0x10, 0x10}, @type_tag={0x7, 0x0, 0x0, 0x12, 0x5}, @var={0x5, 0x0, 0x0, 0xe, 0x3, 0x1}, @fwd={0x5}]}, {0x0, [0x61]}}, &(0x7f0000000c00)=""/4096, 0x63, 0x1000, 0x1, 0x9, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x19, 0x90, 0x5, 0x26, 0x0, r0, 0x7, '\x00', 0x0, r1, 0x3, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r2, &(0x7f0000000400)="4e2851b40e16ae03cd4b1b72d7a3bbdc3eae15b5b6e1bf95bfefe1cb5a7978e2438f2cbd0801eb4b0a6542d758453f4d571aa9e2f3c0944b6ce8819ade6e444dcf701f0f438932aeb38169732a3258d6a397a10656142736250198399c6dff2d0992ee18f1a9b56d173fbb"}, 0x20) (async) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='btrfs_cow_block\x00', r3}, 0x18) write$cgroup_type(r4, &(0x7f00000004c0), 0x9) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000019006c798af8ff0000000100a200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r7, 0x58, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x9, &(0x7f0000001280)=ANY=[@ANYBLOB="1800005e0e1be73d008f030000000000000800000034873000fcffffff8d830200008510000008000000850100000600000018480000fbffffff00000000000000009500"/77], &(0x7f00000002c0)='GPL\x00', 0xd3f, 0x1c, &(0x7f0000000400)=""/28, 0x40f00, 0x34, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000001100)={0x2, 0x2, 0x518a, 0x5}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000580)=[{0x0, 0x2, 0x3, 0x4}, {0x4, 0x4, 0x3, 0x3}, {0x3, 0x3, 0xa, 0x4}, {0x4, 0x2, 0x2, 0x5}], 0x10, 0xfffffff9, @void, @value}, 0x94) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000740)={0x0, r2}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1e, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="41002f73077ea361d4c258880000090000010000122b9cd5250b8e1d93e1b5a135d3c6c0c0ad51cc329c9c73657036a1024716c7618696053fa051c6714a635b7df12d65e515ebf4bde562e787d41ba61382052629d527240af4a1d7d9dc5cee35c4f21b4c590eb4ddf3555ce6b5bf52afd837", @ANYRES32=r6, @ANYRESHEX=r5, @ANYRES16=r4], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd10, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001340)={{r6}, &(0x7f00000012c0), &(0x7f0000001300)=r5}, 0x20) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r9}, 0x10) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r10}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0xa, 0x2, 0x3a, &(0x7f0000000040)) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000006111100000000000dbbbb1eb000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff6b, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 687.764046ms ago: executing program 0 (id=2993): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xd132}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1e, 0x5, 0x82, 0x0, 0x4845, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r3 = syz_clone(0x62100100, &(0x7f0000000680)="41feb7dfad907a825b1d91c7ec0f31f8bf3ca4658f17224740244c0b851a9c37b7ddaf07ea45b3b80925d5d0bca15daf803aac736bb3fe2c053d6f314e92904469f75ecd5b4b49e333f22389bbae23bcff52c209e6160c2a7440c8763b7e4b926696544c6af2f205732805889a7e09c588988666e1cc7154ed25b88e043337244e844f737746a135364aad99bfbb9cf467e165261bffb28e10cbae05f465e24b79d21c64a32eeef48ac3415ec4695f", 0xaf, &(0x7f00000002c0), &(0x7f0000000740), &(0x7f0000000780)="09db559ee4c30456ac47df37158d1f0821fa70e71124e8b8c24ce0e07d94dceca2eead713d2c1bf507c43290a0345f3e353baab2fe381a5f") perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x10, 0xe0, 0x51, 0x5, 0x0, 0x2, 0x240, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x5, 0x1}, 0x10000, 0x7, 0xfd, 0xb, 0x1f, 0x4, 0x226a, 0x0, 0x8, 0x0, 0x9}, r3, 0x2, r2, 0x1) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r7) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r8}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) 598.782927ms ago: executing program 3 (id=2994): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000016000000b30000007f"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) 597.842357ms ago: executing program 2 (id=2995): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x5452, 0x800000020202000) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffda9) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) 596.916306ms ago: executing program 1 (id=2996): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x18, &(0x7f00000004c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xfffffffffffffeb2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x161f, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0xbe20}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001191f37538e486dd630080fc11"], 0xfdef) 548.089537ms ago: executing program 5 (id=2997): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400000008000100010000000010"], 0x48) mkdir(&(0x7f0000000300)='./file0\x00', 0x102) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r6, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0xc9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), 0x0, 0x0, 0x91, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f0000000600)=r7) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0x20, &(0x7f0000000a40)={&(0x7f0000000880)=""/193, 0xc1, 0x0, &(0x7f0000000980)=""/153, 0x99}}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000280)='tlb_flush\x00', r9}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000ac0)={r0, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x20, 0x18, &(0x7f0000000680)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @generic={0x4, 0xc, 0x7, 0x7, 0x14a}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x78b2df45}, @generic={0x4, 0x4, 0x1, 0x7f, 0xfffffff3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @call={0x85, 0x0, 0x0, 0x67}, @map_fd={0x18, 0x4, 0x1, 0x0, r4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffff1}}], &(0x7f0000000740)='GPL\x00', 0x5, 0xab, &(0x7f0000000780)=""/171, 0x40f00, 0x20, '\x00', r7, @netfilter=0x2d, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, r8, r9, 0x6, &(0x7f0000000b80)=[r4, r10, r2], &(0x7f0000000bc0)=[{0x2, 0x3, 0x7, 0x7}, {0x3, 0x1, 0x0, 0x6}, {0x0, 0x2, 0x5, 0x9}, {0x0, 0x4, 0xd, 0x6}, {0x2, 0x1, 0x4}, {0x4, 0x5, 0x1, 0xb}], 0x10, 0x6, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x14, &(0x7f0000000d00)=@framed={{0x18, 0x8}, [@cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffb}, @map_fd, @generic={0x2c}, @initr0, @exit, @alu={0x6, 0x0, 0xa}, @printk={@x, {}, {}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 541.356287ms ago: executing program 0 (id=2998): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r0, &(0x7f0000000340)="413180d11bbdc810f48dec6fbc268638ab0e4ebee3aa598c25b921661923cc60a9f5ea75c4ed6a1ec77e3cb4742f7083d6aeecea1e52a248671dd29bf9130c245abccbf92e5e82ccf2246a213f5b3aad2f18193d44250e6c6adc236fb1c46c0cb9ec7738a940f7e5e13b09683796d32a65d52dcd1211b764c1961caab02261c02bc49ab3f2ede597a760d7c6ebd04cfe627b2b40750c37d4ce3c", &(0x7f0000000580)=""/4096, 0x4}, 0x20) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x47, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5f5, 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs$namespace(0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r7}, 0x10) recvmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x51) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 524.641347ms ago: executing program 1 (id=2999): r0 = getpid() r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000080)=ANY=[@ANYRESHEX, @ANYRES8], 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x3c, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x20, &(0x7f00000002c0)={&(0x7f0000000500)=""/99, 0x63, 0x0, &(0x7f0000000840)=""/240, 0xf0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES16=r1, @ANYRES32=0x1, @ANYRES8=r0, @ANYRES32=0x0, @ANYRESHEX, @ANYBLOB="000000000000000000657a461eced030fc0000000000000400000000"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001180)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000040)=0xffffffffffff241d, 0x12) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f00000004c0)={&(0x7f0000000180), 0x6e, &(0x7f0000000100)=[{&(0x7f00000009c0)=""/183, 0xb7}], 0x1}, 0x0) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000440)={0x0, r4}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa, [@volatile={0x6, 0x0, 0x0, 0x9, 0x1}, @fwd={0x10}]}, {0x0, [0x0, 0x5f, 0x5f, 0x5f, 0x30, 0x5f, 0x0, 0x30]}}, &(0x7f0000000580)=""/217, 0x3a, 0xd9, 0x1, 0xffffff56, 0x10000, @value=r7}, 0x28) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0100000008000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000001200000000fca388f1d66000008218339ad9672e"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000700)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r9}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r11}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000400)=0x200, 0x12) 480.919507ms ago: executing program 2 (id=3000): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r0) (async) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, 0x0, 0x0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000180)=""/111}, 0x20) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) (async) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 406.463048ms ago: executing program 1 (id=3001): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x11, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) 367.272578ms ago: executing program 33 (id=3001): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x11, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) 347.262158ms ago: executing program 2 (id=3003): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0xf0000000, @void, @value}, 0x94) (async, rerun: 32) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) close(r3) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x80, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 32) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) close(r2) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r7}, 0x10) (async, rerun: 64) unlink(0x0) (rerun: 64) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r8}, 0x10) (async, rerun: 32) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 340.316848ms ago: executing program 34 (id=3003): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0xf0000000, @void, @value}, 0x94) (async, rerun: 32) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) close(r3) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x80, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 32) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) close(r2) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r7}, 0x10) (async, rerun: 64) unlink(0x0) (rerun: 64) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r8}, 0x10) (async, rerun: 32) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 298.266908ms ago: executing program 3 (id=3004): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={'veth0\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xb, 0x60, &(0x7f0000000100)="e0b9547ed387dbe9abc89b", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000580)={0x4, 0x80, 0x4, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x1010, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6c7, 0x4, @perf_bp={&(0x7f00000002c0)}, 0x104000, 0x0, 0x9, 0x9, 0x4, 0x2, 0x8a, 0x0, 0x5, 0x0, 0x93}, r3, 0xf, r2, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xb, 0x5, 0x2, 0x4, 0x2305, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600002100000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@generic={0x0, r6}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 462.93µs ago: executing program 3 (id=3006): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x200000, &(0x7f0000000000)="0fd560a59218ef6a2ea9d91568cc345755504a48493e09e89287c1397b125ac95cc92ed0dd5ee2bed65b964bb4c6188e63204e66256574015bc70df3", 0x3c, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000280)="6776c7840b604adbf6fe719f55f23fea109f08fee7aa5071119f13dd1d5b742200994cf49f7b7fbbbdebac92008b6578fad69e5b1ab3cc20a120744b9befff29f90898a06d71e161c151b643e52da7b95080a3db47c7b04905f4edc0532e4a9e4745fad50b27f2d9a0b6cd87ad435ddf99e1f714ce22360a5a8918135cfb0cc8a39c8fb28548a7cb19bc42dace5adcf1ec26cd14ebec3f9937fbd7a725e611a50ac5fb0053b7193694957337a2851006a9cd22d08ab8ab5bee8aac34d6e6edec1a8a61fd1eb7cb2f449326c07629c178c8a34fd1530172a8acc00e3d26c380ab01099d902a439c503012fc00c963b317c41ead8b96b99fa820") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) 0s ago: executing program 35 (id=3006): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x200000, &(0x7f0000000000)="0fd560a59218ef6a2ea9d91568cc345755504a48493e09e89287c1397b125ac95cc92ed0dd5ee2bed65b964bb4c6188e63204e66256574015bc70df3", 0x3c, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000280)="6776c7840b604adbf6fe719f55f23fea109f08fee7aa5071119f13dd1d5b742200994cf49f7b7fbbbdebac92008b6578fad69e5b1ab3cc20a120744b9befff29f90898a06d71e161c151b643e52da7b95080a3db47c7b04905f4edc0532e4a9e4745fad50b27f2d9a0b6cd87ad435ddf99e1f714ce22360a5a8918135cfb0cc8a39c8fb28548a7cb19bc42dace5adcf1ec26cd14ebec3f9937fbd7a725e611a50ac5fb0053b7193694957337a2851006a9cd22d08ab8ab5bee8aac34d6e6edec1a8a61fd1eb7cb2f449326c07629c178c8a34fd1530172a8acc00e3d26c380ab01099d902a439c503012fc00c963b317c41ead8b96b99fa820") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) kernel console output (not intermixed with test programs): awcon="root:object_r:swapfile_t" [ 20.469561][ T272] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.299472][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.306327][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.313867][ T282] device bridge_slave_0 entered promiscuous mode [ 21.321857][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.328720][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.335923][ T282] device bridge_slave_1 entered promiscuous mode [ 21.390138][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.397037][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.404113][ T284] device bridge_slave_0 entered promiscuous mode [ 21.412845][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.419731][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.426957][ T284] device bridge_slave_1 entered promiscuous mode [ 21.448169][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.455128][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.462399][ T285] device bridge_slave_0 entered promiscuous mode [ 21.471090][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.478054][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.485148][ T285] device bridge_slave_1 entered promiscuous mode [ 21.507915][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.514757][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.522826][ T283] device bridge_slave_0 entered promiscuous mode [ 21.538246][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.545075][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.552478][ T283] device bridge_slave_1 entered promiscuous mode [ 21.607690][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.614534][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.621897][ T286] device bridge_slave_0 entered promiscuous mode [ 21.630723][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.637754][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.644960][ T286] device bridge_slave_1 entered promiscuous mode [ 21.706876][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.713857][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.720988][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.727752][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.747816][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.754652][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.785273][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.792134][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.799227][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.805998][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.836931][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.843769][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.850882][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.857669][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.867472][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.874304][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.881441][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.888209][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.902693][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.909664][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.917209][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.924166][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.932419][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.939459][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.946378][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.953587][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.960842][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.967846][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.975175][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.982489][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.017922][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.026097][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.034321][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.042466][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.050811][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.057665][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.064835][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.072857][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.079691][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.087098][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.094997][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.101761][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.108891][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.116777][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.123599][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.130788][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.138526][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.146204][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.154183][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.161016][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.173331][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.183715][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.191739][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.198573][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.222204][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.230386][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.237229][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.244356][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.252253][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.259078][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.266228][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.274614][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.281466][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.288648][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.296324][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.305897][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.313746][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.322585][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.331242][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.350667][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.358646][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.366316][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.374242][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.382006][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.390155][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.398341][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.406080][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.417902][ T283] device veth0_vlan entered promiscuous mode [ 22.425465][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.433455][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.441191][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.449300][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.457246][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.464479][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.480191][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.488243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.502056][ T283] device veth1_macvtap entered promiscuous mode [ 22.508785][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.516216][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.524564][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.544318][ T285] device veth0_vlan entered promiscuous mode [ 22.552924][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.561328][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.569691][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.577877][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.585875][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.593662][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.601659][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.610029][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.618244][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.625848][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.633769][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.641126][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.648514][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.655676][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.669295][ T282] device veth0_vlan entered promiscuous mode [ 22.675622][ T286] device veth0_vlan entered promiscuous mode [ 22.681655][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.689724][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.697985][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.705884][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.713960][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.721676][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.729799][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.737642][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.745401][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.752786][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.760100][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.767578][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.775567][ T284] device veth0_vlan entered promiscuous mode [ 22.788522][ T284] device veth1_macvtap entered promiscuous mode [ 22.796848][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.804824][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.813160][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.820702][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.828650][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.837133][ T285] device veth1_macvtap entered promiscuous mode [ 22.848222][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.855661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.863772][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.884274][ T286] device veth1_macvtap entered promiscuous mode [ 22.891985][ T283] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 22.892598][ T282] device veth1_macvtap entered promiscuous mode [ 22.913852][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.922478][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.931312][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.940837][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.948482][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.956775][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.965200][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.973503][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.982533][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.990796][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.037247][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.047582][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.055744][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.064610][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.073147][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.081546][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.091505][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.100043][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.108533][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.117265][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.207237][ T322] device syzkaller0 entered promiscuous mode [ 23.246501][ C1] hrtimer: interrupt took 22820 ns [ 24.000692][ T327] device veth0_vlan left promiscuous mode [ 24.035434][ T327] device veth0_vlan entered promiscuous mode [ 24.249805][ T341] device veth0_to_bond entered promiscuous mode [ 24.709928][ T344] device syzkaller0 entered promiscuous mode [ 25.436188][ T24] kauditd_printk_skb: 34 callbacks suppressed [ 25.436201][ T24] audit: type=1400 audit(1732204385.310:110): avc: denied { read } for pid=364 comm="syz.1.19" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.550988][ T24] audit: type=1400 audit(1732204385.340:111): avc: denied { open } for pid=364 comm="syz.1.19" path="/dev/ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.565289][ T358] device syzkaller0 entered promiscuous mode [ 25.593948][ T24] audit: type=1400 audit(1732204385.370:112): avc: denied { ioctl } for pid=364 comm="syz.1.19" path="/dev/ppp" dev="devtmpfs" ino=149 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.698346][ T362] device syzkaller0 entered promiscuous mode [ 26.386050][ T95] udevd[95]: worker [306] terminated by signal 33 (Unknown signal 33) [ 26.508112][ T95] udevd[95]: worker [306] failed while handling '/devices/virtual/block/loop2' [ 26.538973][ T24] audit: type=1400 audit(1732204386.420:113): avc: denied { append } for pid=397 comm="syz.2.28" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.732945][ T400] device pim6reg1 entered promiscuous mode [ 27.567476][ T24] audit: type=1400 audit(1732204387.440:114): avc: denied { write } for pid=416 comm="syz.3.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.867350][ T95] udevd[95]: worker [405] terminated by signal 33 (Unknown signal 33) [ 28.976710][ T95] udevd[95]: worker [405] failed while handling '/devices/virtual/block/loop3' [ 29.245358][ T95] udevd[95]: worker [407] terminated by signal 33 (Unknown signal 33) [ 29.296602][ T95] udevd[95]: worker [407] failed while handling '/devices/virtual/block/loop1' [ 29.513103][ T460] cgroup: syz.3.52 (460) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 29.618441][ T460] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 29.877715][ T95] udevd[95]: worker [406] terminated by signal 33 (Unknown signal 33) [ 29.885720][ T95] udevd[95]: worker [406] failed while handling '/devices/virtual/block/loop0' [ 30.676131][ T24] audit: type=1400 audit(1732204390.540:115): avc: denied { create } for pid=480 comm="syz.2.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 30.712646][ T481] device syzkaller0 entered promiscuous mode [ 31.319966][ T504] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 32.853750][ T535] device syzkaller0 entered promiscuous mode [ 33.143495][ T541] device veth1_macvtap left promiscuous mode [ 33.144826][ T24] audit: type=1400 audit(1732204393.020:116): avc: denied { create } for pid=538 comm="syz.2.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 33.677495][ T24] audit: type=1400 audit(1732204393.560:117): avc: denied { write } for pid=548 comm="syz.3.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.457433][ T605] device pim6reg1 entered promiscuous mode [ 37.469253][ T633] Â: renamed from pim6reg1 [ 37.497221][ T24] audit: type=1400 audit(1732204397.370:118): avc: denied { read } for pid=630 comm="syz.1.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.284509][ T24] audit: type=1400 audit(1732204398.160:119): avc: denied { setopt } for pid=654 comm="syz.2.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 40.681438][ T689] device syzkaller0 entered promiscuous mode [ 41.950247][ T711] device syzkaller0 entered promiscuous mode [ 41.990902][ T709] device syzkaller0 entered promiscuous mode [ 47.580859][ T815] device sit0 entered promiscuous mode [ 48.278744][ T833] device syzkaller0 entered promiscuous mode [ 48.369030][ T840] device sit0 entered promiscuous mode [ 49.703843][ T863] device syzkaller0 entered promiscuous mode [ 49.807789][ T870] device syzkaller0 entered promiscuous mode [ 50.916844][ T886] device syzkaller0 entered promiscuous mode [ 51.635732][ T900] device syzkaller0 entered promiscuous mode [ 51.901357][ T912] device syzkaller0 entered promiscuous mode [ 52.380328][ T927] FAULT_INJECTION: forcing a failure. [ 52.380328][ T927] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 52.393451][ T927] CPU: 0 PID: 927 Comm: syz.1.217 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 52.402893][ T927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 52.412796][ T927] Call Trace: [ 52.415927][ T927] dump_stack_lvl+0x1e2/0x24b [ 52.420428][ T927] ? bfq_pos_tree_add_move+0x43b/0x43b [ 52.425722][ T927] dump_stack+0x15/0x17 [ 52.429713][ T927] should_fail+0x3c6/0x510 [ 52.433969][ T927] should_fail_alloc_page+0x52/0x60 [ 52.439000][ T927] __alloc_pages_nodemask+0x1b3/0xaf0 [ 52.444211][ T927] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 52.449608][ T927] kmalloc_order+0x4c/0x170 [ 52.453940][ T927] kmalloc_order_trace+0x18/0x90 [ 52.458707][ T927] ? alloc_skb_with_frags+0xa1/0x570 [ 52.463824][ T927] __kmalloc_track_caller+0x1dd/0x320 [ 52.469029][ T927] ? __alloc_skb+0x80/0x510 [ 52.473373][ T927] ? alloc_skb_with_frags+0xa1/0x570 [ 52.478488][ T927] __alloc_skb+0xbc/0x510 [ 52.482660][ T927] alloc_skb_with_frags+0xa1/0x570 [ 52.487607][ T927] ? is_bpf_text_address+0x172/0x190 [ 52.492724][ T927] sock_alloc_send_pskb+0x915/0xa50 [ 52.497764][ T927] ? sock_kzfree_s+0x60/0x60 [ 52.502199][ T927] ? stack_trace_save+0x113/0x1c0 [ 52.507063][ T927] ? terminate_walk+0x407/0x4f0 [ 52.511730][ T927] ? stack_trace_snprint+0xf0/0xf0 [ 52.516680][ T927] tun_get_user+0xe90/0x38f0 [ 52.521107][ T927] ? kmem_cache_free+0xa9/0x1e0 [ 52.525791][ T927] ? do_sys_openat2+0x1fc/0x710 [ 52.530479][ T927] ? _kstrtoull+0x3a0/0x4a0 [ 52.534819][ T927] ? tun_do_read+0x1f60/0x1f60 [ 52.539415][ T927] ? kstrtouint_from_user+0x20a/0x2a0 [ 52.544626][ T927] ? kstrtol_from_user+0x310/0x310 [ 52.549581][ T927] ? avc_policy_seqno+0x1b/0x70 [ 52.554258][ T927] ? selinux_file_permission+0x2bb/0x560 [ 52.559727][ T927] ? fsnotify_perm+0x67/0x4e0 [ 52.564243][ T927] tun_chr_write_iter+0x1a8/0x250 [ 52.569101][ T927] vfs_write+0xb4c/0xe70 [ 52.573185][ T927] ? kernel_write+0x3d0/0x3d0 [ 52.577701][ T927] ? __fdget_pos+0x209/0x3a0 [ 52.582118][ T927] ? ksys_write+0x77/0x2c0 [ 52.586371][ T927] ksys_write+0x199/0x2c0 [ 52.590541][ T927] ? __ia32_sys_read+0x90/0x90 [ 52.595144][ T927] ? debug_smp_processor_id+0x17/0x20 [ 52.600346][ T927] __x64_sys_write+0x7b/0x90 [ 52.604772][ T927] do_syscall_64+0x34/0x70 [ 52.609029][ T927] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.614752][ T927] RIP: 0033:0x7f833d90b819 [ 52.619009][ T927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.638442][ T927] RSP: 002b:00007f833bf84038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 52.646690][ T927] RAX: ffffffffffffffda RBX: 00007f833dac2fa0 RCX: 00007f833d90b819 [ 52.654500][ T927] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 52.662309][ T927] RBP: 00007f833bf84090 R08: 0000000000000000 R09: 0000000000000000 [ 52.670127][ T927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.677942][ T927] R13: 0000000000000000 R14: 00007f833dac2fa0 R15: 00007ffd3890e208 [ 53.783509][ T962] FAULT_INJECTION: forcing a failure. [ 53.783509][ T962] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 53.804703][ T960] FAULT_INJECTION: forcing a failure. [ 53.804703][ T960] name failslab, interval 1, probability 0, space 0, times 1 [ 53.818182][ T962] CPU: 0 PID: 962 Comm: syz.0.229 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 53.827724][ T962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 53.837605][ T962] Call Trace: [ 53.840742][ T962] dump_stack_lvl+0x1e2/0x24b [ 53.845256][ T962] ? bfq_pos_tree_add_move+0x43b/0x43b [ 53.850549][ T962] ? __alloc_skb+0x37c/0x510 [ 53.854989][ T962] dump_stack+0x15/0x17 [ 53.858964][ T962] should_fail+0x3c6/0x510 [ 53.863219][ T962] should_fail_usercopy+0x1a/0x20 [ 53.868083][ T962] _copy_from_iter+0x22c/0xd10 [ 53.872678][ T962] ? sock_alloc_send_pskb+0x936/0xa50 [ 53.877892][ T962] ? copyout_mc+0x90/0x90 [ 53.882052][ T962] ? __check_object_size+0x2e6/0x3c0 [ 53.887174][ T962] skb_copy_datagram_from_iter+0x100/0x6d0 [ 53.892815][ T962] tun_get_user+0x1904/0x38f0 [ 53.897327][ T962] ? _kstrtoull+0x3a0/0x4a0 [ 53.901664][ T962] ? tun_do_read+0x1f60/0x1f60 [ 53.906266][ T962] ? kstrtouint_from_user+0x20a/0x2a0 [ 53.911474][ T962] ? kstrtol_from_user+0x310/0x310 [ 53.916425][ T962] ? avc_policy_seqno+0x1b/0x70 [ 53.921110][ T962] ? selinux_file_permission+0x2bb/0x560 [ 53.926575][ T962] ? fsnotify_perm+0x67/0x4e0 [ 53.931089][ T962] tun_chr_write_iter+0x1a8/0x250 [ 53.935953][ T962] vfs_write+0xb4c/0xe70 [ 53.940028][ T962] ? putname+0xe7/0x140 [ 53.944019][ T962] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 53.949669][ T962] ? kernel_write+0x3d0/0x3d0 [ 53.954179][ T962] ? __fdget_pos+0x209/0x3a0 [ 53.958598][ T962] ? ksys_write+0x77/0x2c0 [ 53.962854][ T962] ksys_write+0x199/0x2c0 [ 53.967023][ T962] ? __ia32_sys_read+0x90/0x90 [ 53.971622][ T962] ? debug_smp_processor_id+0x17/0x20 [ 53.976827][ T962] __x64_sys_write+0x7b/0x90 [ 53.981251][ T962] do_syscall_64+0x34/0x70 [ 53.985504][ T962] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 53.991230][ T962] RIP: 0033:0x7f3dc6c1a819 [ 53.995495][ T962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.014924][ T962] RSP: 002b:00007f3dc5293038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 54.023178][ T962] RAX: ffffffffffffffda RBX: 00007f3dc6dd1fa0 RCX: 00007f3dc6c1a819 [ 54.030976][ T962] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 54.038789][ T962] RBP: 00007f3dc5293090 R08: 0000000000000000 R09: 0000000000000000 [ 54.046599][ T962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.054410][ T962] R13: 0000000000000000 R14: 00007f3dc6dd1fa0 R15: 00007fff3b5f7888 [ 54.079272][ T960] CPU: 0 PID: 960 Comm: syz.1.228 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 54.088803][ T960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 54.098696][ T960] Call Trace: [ 54.101832][ T960] dump_stack_lvl+0x1e2/0x24b [ 54.106345][ T960] ? bfq_pos_tree_add_move+0x43b/0x43b [ 54.111638][ T960] dump_stack+0x15/0x17 [ 54.115631][ T960] should_fail+0x3c6/0x510 [ 54.119885][ T960] ? security_prepare_creds+0x4d/0x140 [ 54.125174][ T960] __should_failslab+0xa4/0xe0 [ 54.129775][ T960] should_failslab+0x9/0x20 [ 54.134110][ T960] __kmalloc+0x60/0x330 [ 54.138105][ T960] security_prepare_creds+0x4d/0x140 [ 54.143232][ T960] prepare_creds+0x3f8/0x5f0 [ 54.147649][ T960] copy_creds+0xe7/0x480 [ 54.151729][ T960] copy_process+0x93f/0x3340 [ 54.156159][ T960] ? timerqueue_add+0x24c/0x270 [ 54.160839][ T960] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 54.165788][ T960] ? enqueue_hrtimer+0xad/0x200 [ 54.170473][ T960] ? __hrtimer_run_queues+0x9ea/0xa50 [ 54.175680][ T960] kernel_clone+0x21e/0x9e0 [ 54.180018][ T960] ? ktime_get+0x10e/0x140 [ 54.184270][ T960] ? create_io_thread+0x1e0/0x1e0 [ 54.189134][ T960] __x64_sys_clone+0x23f/0x290 [ 54.193730][ T960] ? __do_sys_vfork+0x130/0x130 [ 54.198419][ T960] ? sched_clock+0x3a/0x40 [ 54.202673][ T960] ? debug_smp_processor_id+0x17/0x20 [ 54.207883][ T960] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 54.213779][ T960] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 54.219685][ T960] ? irqentry_exit_to_user_mode+0x41/0x80 [ 54.225236][ T960] do_syscall_64+0x34/0x70 [ 54.229494][ T960] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 54.235216][ T960] RIP: 0033:0x7f833d90b819 [ 54.239470][ T960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.258911][ T960] RSP: 002b:00007f833bf83fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 54.267154][ T960] RAX: ffffffffffffffda RBX: 00007f833dac2fa0 RCX: 00007f833d90b819 [ 54.274966][ T960] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 54.282776][ T960] RBP: 00007f833bf84090 R08: 0000000000000000 R09: 0000000000000000 [ 54.290588][ T960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.298401][ T960] R13: 0000000000000000 R14: 00007f833dac2fa0 R15: 00007ffd3890e208 [ 54.382500][ T971] device syzkaller0 entered promiscuous mode [ 54.451808][ T977] cgroup: fork rejected by pids controller in /syz1 [ 54.866248][ T991] device syzkaller0 entered promiscuous mode [ 55.014521][ T24] audit: type=1400 audit(1732204414.890:120): avc: denied { create } for pid=994 comm="syz.4.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 55.091976][ T24] audit: type=1400 audit(1732204414.920:121): avc: denied { create } for pid=994 comm="syz.4.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 55.235501][ T1014] FAULT_INJECTION: forcing a failure. [ 55.235501][ T1014] name failslab, interval 1, probability 0, space 0, times 0 [ 55.327178][ T1014] CPU: 0 PID: 1014 Comm: syz.2.245 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 55.336804][ T1014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 55.346691][ T1014] Call Trace: [ 55.349827][ T1014] dump_stack_lvl+0x1e2/0x24b [ 55.354329][ T1014] ? panic+0x812/0x812 [ 55.358238][ T1014] ? bfq_pos_tree_add_move+0x43b/0x43b [ 55.363530][ T1014] dump_stack+0x15/0x17 [ 55.367523][ T1014] should_fail+0x3c6/0x510 [ 55.371775][ T1014] ? __delayacct_tsk_init+0x2c/0xa0 [ 55.376811][ T1014] __should_failslab+0xa4/0xe0 [ 55.381412][ T1014] should_failslab+0x9/0x20 [ 55.385750][ T1014] kmem_cache_alloc+0x3d/0x2e0 [ 55.390372][ T1014] __delayacct_tsk_init+0x2c/0xa0 [ 55.395208][ T1014] copy_process+0x9e8/0x3340 [ 55.399637][ T1014] ? proc_fail_nth_write+0x20b/0x290 [ 55.404766][ T1014] ? proc_fail_nth_read+0x210/0x210 [ 55.409795][ T1014] ? rw_verify_area+0x1c3/0x360 [ 55.414492][ T1014] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 55.419422][ T1014] ? vfs_write+0x852/0xe70 [ 55.423680][ T1014] ? kmem_cache_free+0x1c0/0x1e0 [ 55.428451][ T1014] kernel_clone+0x21e/0x9e0 [ 55.432804][ T1014] ? __kasan_check_write+0x14/0x20 [ 55.437741][ T1014] ? create_io_thread+0x1e0/0x1e0 [ 55.442603][ T1014] __x64_sys_clone+0x23f/0x290 [ 55.447202][ T1014] ? __do_sys_vfork+0x130/0x130 [ 55.451890][ T1014] ? debug_smp_processor_id+0x17/0x20 [ 55.457094][ T1014] do_syscall_64+0x34/0x70 [ 55.461363][ T1014] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 55.467072][ T1014] RIP: 0033:0x7fc40ecd0819 [ 55.471327][ T1014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.490855][ T1014] RSP: 002b:00007fc40d348fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 55.499098][ T1014] RAX: ffffffffffffffda RBX: 00007fc40ee87fa0 RCX: 00007fc40ecd0819 [ 55.506907][ T1014] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 55.514715][ T1014] RBP: 00007fc40d349090 R08: 0000000000000000 R09: 0000000000000000 [ 55.522529][ T1014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 55.530350][ T1014] R13: 0000000000000000 R14: 00007fc40ee87fa0 R15: 00007ffeb5d11708 [ 55.541221][ T24] audit: type=1400 audit(1732204415.420:122): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 55.612006][ T1026] device veth1_macvtap left promiscuous mode [ 55.619067][ T1026] device macsec0 entered promiscuous mode [ 55.629640][ T1027] device veth1_macvtap entered promiscuous mode [ 55.648957][ T1026] device veth1_macvtap left promiscuous mode [ 55.678471][ T24] audit: type=1400 audit(1732204415.560:123): avc: denied { create } for pid=1036 comm="syz.3.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 55.718270][ T1015] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.775457][ T1015] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.793376][ T24] audit: type=1400 audit(1732204415.590:124): avc: denied { setopt } for pid=1036 comm="syz.3.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 55.823483][ T1015] device bridge_slave_0 entered promiscuous mode [ 55.871131][ T24] audit: type=1400 audit(1732204415.620:125): avc: denied { create } for pid=1036 comm="syz.3.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 55.875385][ T1015] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.941040][ T1015] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.998614][ T1015] device bridge_slave_1 entered promiscuous mode [ 56.148068][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.168709][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.321390][ T1015] device veth0_vlan entered promiscuous mode [ 56.329406][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 56.342677][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.363402][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.381697][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.399819][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.421750][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.442405][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.449278][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.481148][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.492324][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.501133][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.507995][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.534205][ T24] audit: type=1400 audit(1732204416.410:126): avc: denied { write } for pid=1056 comm="syz.2.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 56.636948][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.705458][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.723221][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.748140][ T1050] device syzkaller0 entered promiscuous mode [ 56.802978][ T1015] device veth1_macvtap entered promiscuous mode [ 56.842741][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 56.898775][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 56.993717][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 57.062246][ T24] audit: type=1400 audit(1732204416.940:127): avc: denied { mounton } for pid=1015 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 57.236617][ T24] audit: type=1400 audit(1732204417.100:128): avc: denied { create } for pid=1082 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 57.516282][ T389] device bridge_slave_1 left promiscuous mode [ 57.544861][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.625198][ T389] device bridge_slave_0 left promiscuous mode [ 57.688575][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.722431][ T389] device veth1_macvtap left promiscuous mode [ 57.735235][ T389] device veth0_vlan left promiscuous mode [ 57.948739][ T24] audit: type=1400 audit(1732204417.830:129): avc: denied { read } for pid=1108 comm="syz.0.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 57.993793][ T1100] device pim6reg1 entered promiscuous mode [ 58.065242][ T1110] device pim6reg1 entered promiscuous mode [ 62.778701][ T1220] syz.3.315 uses obsolete (PF_INET,SOCK_PACKET) [ 62.910708][ T24] audit: type=1400 audit(1732204422.790:130): avc: denied { create } for pid=1219 comm="syz.3.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 64.901383][ T24] audit: type=1400 audit(1732204424.780:131): avc: denied { create } for pid=1284 comm="syz.1.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 65.278806][ T1306] device syzkaller0 entered promiscuous mode [ 65.863410][ T24] audit: type=1400 audit(1732204425.740:132): avc: denied { relabelfrom } for pid=1326 comm="syz.3.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 65.927116][ T24] audit: type=1400 audit(1732204425.790:133): avc: denied { relabelto } for pid=1326 comm="syz.3.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 65.959992][ T1334] device sit0 entered promiscuous mode [ 69.301874][ T1412] device sit0 left promiscuous mode [ 69.570989][ T1418] device sit0 entered promiscuous mode [ 69.884996][ T1435] device syzkaller0 entered promiscuous mode [ 70.346373][ T1443] device sit0 left promiscuous mode [ 70.473252][ T1448] device sit0 entered promiscuous mode [ 71.310072][ T1469] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 71.806411][ T1494] device syzkaller0 entered promiscuous mode [ 71.859918][ T1496] device pim6reg1 entered promiscuous mode [ 73.112670][ T1534] device syzkaller0 entered promiscuous mode [ 73.885213][ T1559] device veth1_macvtap left promiscuous mode [ 73.968196][ T1560] device veth1_macvtap entered promiscuous mode [ 73.974328][ T1560] device macsec0 entered promiscuous mode [ 74.504273][ T24] audit: type=1400 audit(1732204434.380:134): avc: denied { create } for pid=1569 comm="syz.1.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 74.695330][ T1572] device pim6reg1 entered promiscuous mode [ 77.581875][ T1644] device syzkaller0 entered promiscuous mode [ 78.434596][ T24] audit: type=1400 audit(1732204438.310:135): avc: denied { create } for pid=1677 comm="syz.0.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 78.567665][ T24] audit: type=1400 audit(1732204438.410:136): avc: denied { write } for pid=1681 comm="syz.1.473" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 78.690863][ T1690] device veth0_vlan left promiscuous mode [ 78.706756][ T24] audit: type=1400 audit(1732204438.510:137): avc: denied { attach_queue } for pid=1681 comm="syz.1.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 78.808401][ T1690] device veth0_vlan entered promiscuous mode [ 79.038240][ T1699] device sit0 left promiscuous mode [ 79.187502][ T1700] device sit0 entered promiscuous mode [ 79.675051][ T1724] device macsec0 entered promiscuous mode [ 80.265936][ T1732] device syzkaller0 entered promiscuous mode [ 80.583220][ T24] audit: type=1400 audit(1732204440.460:138): avc: denied { create } for pid=1758 comm="syz.1.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 80.908197][ T1782] device syzkaller0 entered promiscuous mode [ 81.071737][ T24] audit: type=1400 audit(1732204440.950:139): avc: denied { create } for pid=1789 comm="syz.3.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 81.091066][ T1791] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 81.101036][ T1791] device syzkaller0 entered promiscuous mode [ 81.307849][ T1806] device pim6reg1 entered promiscuous mode [ 81.791929][ T1827] device veth1_macvtap left promiscuous mode [ 82.296035][ T1863] device syzkaller0 entered promiscuous mode [ 82.960599][ T1948] device syzkaller0 entered promiscuous mode [ 83.840474][ T2010] syz.3.565[2010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.840525][ T2010] syz.3.565[2010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.006457][ T2008] device syzkaller0 entered promiscuous mode [ 84.699503][ T2060] device syzkaller0 entered promiscuous mode [ 84.861394][ T24] audit: type=1400 audit(1732204444.740:140): avc: denied { create } for pid=2071 comm="syz.3.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 86.598280][ T2132] device pim6reg1 entered promiscuous mode [ 87.180995][ T24] audit: type=1400 audit(1732204447.060:141): avc: denied { create } for pid=2164 comm="syz.0.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 88.498434][ T24] audit: type=1400 audit(1732204448.380:142): avc: denied { create } for pid=2214 comm="syz.4.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 88.498602][ T2218] device veth1_macvtap entered promiscuous mode [ 89.105330][ T2239] device syzkaller0 entered promiscuous mode [ 89.164077][ T2239] syzkaller0: tun_net_xmit 1280 [ 89.169088][ T2239] syzkaller0: create flow: hash 96233107 index 2 [ 89.196281][ T2238] syzkaller0: delete flow: hash 96233107 index 2 [ 90.459726][ T2296] device syzkaller0 entered promiscuous mode [ 90.519986][ T2294] device syzkaller0 entered promiscuous mode [ 91.112273][ T24] audit: type=1400 audit(1732204450.990:143): avc: denied { create } for pid=2323 comm="syz.1.671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 91.627109][ T2335] device pim6reg1 entered promiscuous mode [ 91.932804][ T2346] device syzkaller0 entered promiscuous mode [ 91.965714][ T2351] Â: renamed from pim6reg1 [ 92.544953][ T2364] device vxcan1 entered promiscuous mode [ 93.163375][ T2389] device veth0_vlan left promiscuous mode [ 93.207606][ T2389] device veth0_vlan entered promiscuous mode [ 93.451938][ T2393] device syzkaller0 entered promiscuous mode [ 93.795787][ T2413] device sit0 entered promiscuous mode [ 95.062547][ T2445] device syzkaller0 entered promiscuous mode [ 95.462920][ T2456] device pim6reg1 entered promiscuous mode [ 95.469387][ T2456] ªªªªªª: renamed from vlan0 [ 96.481218][ T2488] device syzkaller0 entered promiscuous mode [ 97.557033][ T2512] device syzkaller0 entered promiscuous mode [ 97.673404][ T2521] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.683740][ T2521] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.757380][ T2525] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.764250][ T2525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.771381][ T2525] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.778321][ T2525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.788227][ T2525] device bridge0 entered promiscuous mode [ 98.056306][ T2540] device syzkaller0 entered promiscuous mode [ 99.490853][ T24] audit: type=1400 audit(1732204459.370:144): avc: denied { create } for pid=2593 comm="syz.2.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 99.676789][ T24] audit: type=1400 audit(1732204459.380:145): avc: denied { create } for pid=2593 comm="syz.2.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 99.814912][ T2599] device syzkaller0 entered promiscuous mode [ 99.826896][ T24] audit: type=1400 audit(1732204459.570:146): avc: denied { remove_name } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 99.976648][ T24] audit: type=1400 audit(1732204459.570:147): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 100.302821][ T24] audit: type=1400 audit(1732204460.180:148): avc: denied { create } for pid=2623 comm="syz.2.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 100.758831][ T2639] device veth0_vlan left promiscuous mode [ 100.960201][ T2639] device veth0_vlan entered promiscuous mode [ 101.216277][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.227823][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.256179][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.545987][ T2653] device syzkaller0 entered promiscuous mode [ 102.613214][ T2706] device syzkaller0 entered promiscuous mode [ 103.221046][ T24] audit: type=1400 audit(1732204463.100:149): avc: denied { create } for pid=2742 comm="syz.2.813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 103.546220][ T2746] device syzkaller0 entered promiscuous mode [ 103.919999][ T2764] device veth0_vlan left promiscuous mode [ 103.938172][ T2764] device veth0_vlan entered promiscuous mode [ 103.982606][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.999622][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 104.014838][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.042707][ T2775] device macsec0 entered promiscuous mode [ 105.117658][ T2807] device syzkaller0 entered promiscuous mode [ 105.137545][ T2813] device syzkaller0 entered promiscuous mode [ 105.160001][ T2814] device syzkaller0 entered promiscuous mode [ 105.203029][ T2814] FAULT_INJECTION: forcing a failure. [ 105.203029][ T2814] name failslab, interval 1, probability 0, space 0, times 0 [ 105.232221][ T2814] CPU: 1 PID: 2814 Comm: syz.4.839 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 105.241839][ T2814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 105.251731][ T2814] Call Trace: [ 105.254874][ T2814] dump_stack_lvl+0x1e2/0x24b [ 105.259379][ T2814] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 105.265357][ T2814] ? bfq_pos_tree_add_move+0x43b/0x43b [ 105.270650][ T2814] ? dump_stack+0x9/0x17 [ 105.274735][ T2814] dump_stack+0x15/0x17 [ 105.278728][ T2814] should_fail+0x3c6/0x510 [ 105.282984][ T2814] ? __alloc_skb+0x80/0x510 [ 105.287325][ T2814] __should_failslab+0xa4/0xe0 [ 105.291924][ T2814] should_failslab+0x9/0x20 [ 105.296261][ T2814] kmem_cache_alloc+0x3d/0x2e0 [ 105.300857][ T2814] __alloc_skb+0x80/0x510 [ 105.305022][ T2814] ? if_nlmsg_size+0x59c/0x5f0 [ 105.309628][ T2814] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 105.314745][ T2814] rtmsg_ifinfo+0x78/0x120 [ 105.318998][ T2814] dev_close_many+0x2a9/0x530 [ 105.323523][ T2814] ? __dev_open+0x4e0/0x4e0 [ 105.327852][ T2814] ? __kasan_check_read+0x11/0x20 [ 105.332713][ T2814] unregister_netdevice_many+0x492/0x17d0 [ 105.338278][ T2814] ? kmem_cache_free+0xa9/0x1e0 [ 105.342970][ T2814] ? __kasan_check_write+0x14/0x20 [ 105.347904][ T2814] ? __kasan_slab_free+0x11/0x20 [ 105.352671][ T2814] ? alloc_netdev_mqs+0xcd0/0xcd0 [ 105.357541][ T2814] ? __kasan_check_read+0x11/0x20 [ 105.362396][ T2814] unregister_netdevice_queue+0x2e6/0x350 [ 105.367949][ T2814] ? linkwatch_urgent_event+0x335/0x4d0 [ 105.373329][ T2814] ? list_netdevice+0x4c0/0x4c0 [ 105.378021][ T2814] __tun_detach+0xd14/0x1510 [ 105.382443][ T2814] ? mutex_trylock+0xa0/0xa0 [ 105.386868][ T2814] ? tun_chr_open+0x530/0x530 [ 105.391382][ T2814] tun_chr_close+0x92/0x140 [ 105.395726][ T2814] __fput+0x33d/0x7b0 [ 105.399539][ T2814] ____fput+0x15/0x20 [ 105.403359][ T2814] task_work_run+0x129/0x190 [ 105.407792][ T2814] exit_to_user_mode_loop+0xbf/0xd0 [ 105.412819][ T2814] syscall_exit_to_user_mode+0xa2/0x1a0 [ 105.418212][ T2814] do_syscall_64+0x40/0x70 [ 105.422465][ T2814] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 105.428178][ T2814] RIP: 0033:0x7f49b67ad819 [ 105.432531][ T2814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 105.451970][ T2814] RSP: 002b:00007f49b4e26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 105.460216][ T2814] RAX: 0000000000000000 RBX: 00007f49b6964fa0 RCX: 00007f49b67ad819 [ 105.468028][ T2814] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 105.475834][ T2814] RBP: 00007f49b4e26090 R08: 0000000000000000 R09: 0000000000000000 [ 105.483647][ T2814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.491456][ T2814] R13: 0000000000000000 R14: 00007f49b6964fa0 R15: 00007fffde7674f8 [ 105.677154][ T2832] device veth0_to_bond entered promiscuous mode [ 105.753619][ T2842] €Â0: renamed from pim6reg1 [ 106.090304][ T2859] device syzkaller0 entered promiscuous mode [ 106.258130][ T2873] device syzkaller0 entered promiscuous mode [ 106.344544][ T2855] device pim6reg1 entered promiscuous mode [ 106.460804][ T2879] FAULT_INJECTION: forcing a failure. [ 106.460804][ T2879] name failslab, interval 1, probability 0, space 0, times 0 [ 106.598756][ T2879] CPU: 0 PID: 2879 Comm: syz.4.856 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 106.608381][ T2879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 106.618269][ T2879] Call Trace: [ 106.621418][ T2879] dump_stack_lvl+0x1e2/0x24b [ 106.625914][ T2879] ? bfq_pos_tree_add_move+0x43b/0x43b [ 106.631210][ T2879] ? ___ratelimit+0xb5/0x580 [ 106.635773][ T2879] dump_stack+0x15/0x17 [ 106.639761][ T2879] should_fail+0x3c6/0x510 [ 106.644022][ T2879] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 106.649313][ T2879] __should_failslab+0xa4/0xe0 [ 106.653911][ T2879] should_failslab+0x9/0x20 [ 106.658251][ T2879] __kmalloc_track_caller+0x5f/0x320 [ 106.663370][ T2879] ? kmem_cache_alloc+0x168/0x2e0 [ 106.668233][ T2879] ? if_nlmsg_size+0x5a/0x5f0 [ 106.672741][ T2879] ? __alloc_skb+0x80/0x510 [ 106.677103][ T2879] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 106.682383][ T2879] __alloc_skb+0xbc/0x510 [ 106.686544][ T2879] ? if_nlmsg_size+0x59c/0x5f0 [ 106.691152][ T2879] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 106.696272][ T2879] rtmsg_ifinfo+0x78/0x120 [ 106.700532][ T2879] dev_close_many+0x2a9/0x530 [ 106.705041][ T2879] ? __dev_open+0x4e0/0x4e0 [ 106.709376][ T2879] ? __kasan_check_read+0x11/0x20 [ 106.714235][ T2879] unregister_netdevice_many+0x492/0x17d0 [ 106.719783][ T2879] ? sched_clock_cpu+0x1b/0x3b0 [ 106.724475][ T2879] ? alloc_netdev_mqs+0xcd0/0xcd0 [ 106.729336][ T2879] ? __irq_exit_rcu+0x40/0x150 [ 106.733936][ T2879] ? __kasan_check_read+0x11/0x20 [ 106.738797][ T2879] unregister_netdevice_queue+0x2e6/0x350 [ 106.744353][ T2879] ? list_netdevice+0x4c0/0x4c0 [ 106.749079][ T2879] __tun_detach+0xd14/0x1510 [ 106.753465][ T2879] ? mutex_trylock+0xa0/0xa0 [ 106.757890][ T2879] ? tun_chr_open+0x530/0x530 [ 106.762401][ T2879] tun_chr_close+0x92/0x140 [ 106.766740][ T2879] __fput+0x33d/0x7b0 [ 106.770562][ T2879] ____fput+0x15/0x20 [ 106.774378][ T2879] task_work_run+0x129/0x190 [ 106.778829][ T2879] exit_to_user_mode_loop+0xbf/0xd0 [ 106.783837][ T2879] syscall_exit_to_user_mode+0xa2/0x1a0 [ 106.789221][ T2879] do_syscall_64+0x40/0x70 [ 106.793487][ T2879] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 106.799201][ T2879] RIP: 0033:0x7f49b67ad819 [ 106.803452][ T2879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 106.823132][ T2879] RSP: 002b:00007f49b4e05038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 106.831373][ T2879] RAX: 0000000000000000 RBX: 00007f49b6965080 RCX: 00007f49b67ad819 [ 106.839180][ T2879] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 106.846994][ T2879] RBP: 00007f49b4e05090 R08: 0000000000000000 R09: 0000000000000000 [ 106.854808][ T2879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.862612][ T2879] R13: 0000000000000000 R14: 00007f49b6965080 R15: 00007fffde7674f8 [ 107.062736][ T2894] device syzkaller0 entered promiscuous mode [ 107.069872][ T2890] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.077274][ T2890] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.400815][ T2911] device syzkaller0 entered promiscuous mode [ 109.369666][ T2992] device veth1_macvtap left promiscuous mode [ 109.375473][ T2992] device macsec0 left promiscuous mode [ 109.461993][ T2998] syz.2.897[2998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.462042][ T2998] syz.2.897[2998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.083640][ T3019] device syzkaller0 entered promiscuous mode [ 110.322728][ T3035] device pim6reg1 entered promiscuous mode [ 111.292373][ T3072] device syzkaller0 entered promiscuous mode [ 112.076067][ T3124] device veth1_macvtap entered promiscuous mode [ 112.085206][ T3124] device macsec0 entered promiscuous mode [ 112.091573][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 113.130599][ T3160] device syzkaller0 entered promiscuous mode [ 114.535977][ T3214] device syzkaller0 entered promiscuous mode [ 115.868703][ T3265] device syzkaller0 entered promiscuous mode [ 116.320393][ T3291] device syzkaller0 entered promiscuous mode [ 116.937015][ T3322] device veth0_vlan left promiscuous mode [ 117.060007][ T3322] device veth0_vlan entered promiscuous mode [ 119.361671][ T3399] device syzkaller0 entered promiscuous mode [ 120.452490][ T3415] FAULT_INJECTION: forcing a failure. [ 120.452490][ T3415] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 120.499058][ T3415] CPU: 0 PID: 3415 Comm: syz.4.1049 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 120.508762][ T3415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 120.518650][ T3415] Call Trace: [ 120.521784][ T3415] dump_stack_lvl+0x1e2/0x24b [ 120.526296][ T3415] ? bfq_pos_tree_add_move+0x43b/0x43b [ 120.531585][ T3415] ? 0xffffffffa002a000 [ 120.535584][ T3415] ? is_bpf_text_address+0x172/0x190 [ 120.540707][ T3415] dump_stack+0x15/0x17 [ 120.544693][ T3415] should_fail+0x3c6/0x510 [ 120.548954][ T3415] should_fail_usercopy+0x1a/0x20 [ 120.553808][ T3415] _copy_from_user+0x20/0xd0 [ 120.558251][ T3415] __se_sys_bpf+0x232/0x11cb0 [ 120.562749][ T3415] ? stack_trace_save+0x113/0x1c0 [ 120.567611][ T3415] ? terminate_walk+0x407/0x4f0 [ 120.572298][ T3415] ? stack_trace_snprint+0xf0/0xf0 [ 120.577247][ T3415] ? kmem_cache_free+0xa9/0x1e0 [ 120.581925][ T3415] ? kmem_cache_free+0xa9/0x1e0 [ 120.586612][ T3415] ? ktime_get_boot_fast_ns+0x19d/0x1d0 [ 120.591995][ T3415] ? __x64_sys_bpf+0x90/0x90 [ 120.596422][ T3415] ? debug_smp_processor_id+0x17/0x20 [ 120.601629][ T3415] ? bpf_trace_run5+0x17b/0x320 [ 120.606318][ T3415] ? bpf_trace_run4+0x2e0/0x2e0 [ 120.611003][ T3415] ? prepare_signal+0x85b/0xa60 [ 120.615694][ T3415] ? send_sigqueue+0x610/0x610 [ 120.620290][ T3415] ? __bpf_trace_signal_generate+0x3c/0x50 [ 120.625932][ T3415] ? __send_signal+0xb79/0xb90 [ 120.630531][ T3415] ? send_signal+0x4c1/0x5e0 [ 120.634961][ T3415] ? proc_fail_nth_read+0x210/0x210 [ 120.639992][ T3415] ? security_file_permission+0x86/0xb0 [ 120.645374][ T3415] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 120.651020][ T3415] ? do_send_sig_info+0xfb/0x230 [ 120.655789][ T3415] ? group_send_sig_info+0x1b0/0x320 [ 120.660908][ T3415] ? __lock_task_sighand+0x100/0x100 [ 120.666034][ T3415] ? kernel_write+0x3d0/0x3d0 [ 120.670545][ T3415] ? bpf_send_signal_common+0x2d8/0x420 [ 120.675923][ T3415] ? bpf_do_trace_printk+0x270/0x270 [ 120.681052][ T3415] ? __kasan_check_write+0x14/0x20 [ 120.686082][ T3415] ? bpf_send_signal+0x19/0x20 [ 120.690686][ T3415] ? debug_smp_processor_id+0x17/0x20 [ 120.695884][ T3415] __x64_sys_bpf+0x7b/0x90 [ 120.700151][ T3415] do_syscall_64+0x34/0x70 [ 120.704401][ T3415] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 120.710117][ T3415] RIP: 0033:0x7f49b67ad819 [ 120.714394][ T3415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.733815][ T3415] RSP: 002b:00007f49b4e26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 120.742056][ T3415] RAX: ffffffffffffffda RBX: 00007f49b6964fa0 RCX: 00007f49b67ad819 [ 120.749866][ T3415] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000011 [ 120.757687][ T3415] RBP: 00007f49b4e26090 R08: 0000000000000000 R09: 0000000000000000 [ 120.765490][ T3415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 120.773299][ T3415] R13: 0000000000000000 R14: 00007f49b6964fa0 R15: 00007fffde7674f8 [ 121.634218][ T3456] device syzkaller0 entered promiscuous mode [ 122.155358][ T3480] FAULT_INJECTION: forcing a failure. [ 122.155358][ T3480] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 122.218949][ T3480] CPU: 0 PID: 3480 Comm: syz.4.1069 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 122.228659][ T3480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 122.238561][ T3480] Call Trace: [ 122.241695][ T3480] dump_stack_lvl+0x1e2/0x24b [ 122.246192][ T3480] ? bfq_pos_tree_add_move+0x43b/0x43b [ 122.251483][ T3480] dump_stack+0x15/0x17 [ 122.255475][ T3480] should_fail+0x3c6/0x510 [ 122.259734][ T3480] should_fail_usercopy+0x1a/0x20 [ 122.264593][ T3480] strncpy_from_user+0x24/0x2d0 [ 122.269280][ T3480] ? fput_many+0x160/0x1b0 [ 122.273527][ T3480] __se_sys_bpf+0x450b/0x11cb0 [ 122.278132][ T3480] ? stack_trace_save+0x113/0x1c0 [ 122.282989][ T3480] ? terminate_walk+0x407/0x4f0 [ 122.287676][ T3480] ? stack_trace_snprint+0xf0/0xf0 [ 122.292628][ T3480] ? kmem_cache_free+0xa9/0x1e0 [ 122.297312][ T3480] ? ktime_get_boot_fast_ns+0x19d/0x1d0 [ 122.302693][ T3480] ? __x64_sys_bpf+0x90/0x90 [ 122.307117][ T3480] ? debug_smp_processor_id+0x17/0x20 [ 122.312355][ T3480] ? bpf_trace_run5+0x17b/0x320 [ 122.317014][ T3480] ? bpf_trace_run4+0x2e0/0x2e0 [ 122.321692][ T3480] ? prepare_signal+0x85b/0xa60 [ 122.326390][ T3480] ? send_sigqueue+0x610/0x610 [ 122.330987][ T3480] ? __bpf_trace_signal_generate+0x3c/0x50 [ 122.336632][ T3480] ? __send_signal+0xb79/0xb90 [ 122.341225][ T3480] ? send_signal+0x4c1/0x5e0 [ 122.345652][ T3480] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 122.351290][ T3480] ? do_send_sig_info+0xfb/0x230 [ 122.356065][ T3480] ? group_send_sig_info+0x1b0/0x320 [ 122.361189][ T3480] ? __lock_task_sighand+0x100/0x100 [ 122.366309][ T3480] ? kmem_cache_free+0xa9/0x1e0 [ 122.371010][ T3480] ? bpf_send_signal+0x19/0x20 [ 122.375599][ T3480] ? bpf_trace_run2+0xf4/0x280 [ 122.380202][ T3480] ? debug_smp_processor_id+0x17/0x20 [ 122.385406][ T3480] __x64_sys_bpf+0x7b/0x90 [ 122.389659][ T3480] do_syscall_64+0x34/0x70 [ 122.393912][ T3480] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 122.399633][ T3480] RIP: 0033:0x7f49b67ad819 [ 122.403886][ T3480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.423327][ T3480] RSP: 002b:00007f49b4e26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 122.431573][ T3480] RAX: ffffffffffffffda RBX: 00007f49b6964fa0 RCX: 00007f49b67ad819 [ 122.439384][ T3480] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000011 [ 122.447196][ T3480] RBP: 00007f49b4e26090 R08: 0000000000000000 R09: 0000000000000000 [ 122.455006][ T3480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 122.462817][ T3480] R13: 0000000000000000 R14: 00007f49b6964fa0 R15: 00007fffde7674f8 [ 122.472227][ T3475] device veth1_macvtap entered promiscuous mode [ 122.509859][ T3475] device macsec0 entered promiscuous mode [ 122.516045][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 123.383929][ T3519] device syzkaller0 entered promiscuous mode [ 123.704826][ T3529] FAULT_INJECTION: forcing a failure. [ 123.704826][ T3529] name failslab, interval 1, probability 0, space 0, times 0 [ 123.816726][ T3529] CPU: 0 PID: 3529 Comm: syz.4.1094 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 123.826433][ T3529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 123.836325][ T3529] Call Trace: [ 123.839456][ T3529] dump_stack_lvl+0x1e2/0x24b [ 123.843968][ T3529] ? bfq_pos_tree_add_move+0x43b/0x43b [ 123.849265][ T3529] dump_stack+0x15/0x17 [ 123.853252][ T3529] should_fail+0x3c6/0x510 [ 123.857509][ T3529] ? __se_sys_bpf+0x45a0/0x11cb0 [ 123.862283][ T3529] __should_failslab+0xa4/0xe0 [ 123.866878][ T3529] should_failslab+0x9/0x20 [ 123.871218][ T3529] kmem_cache_alloc_trace+0x3a/0x2e0 [ 123.876347][ T3529] ? bpf_get_raw_tracepoint+0xa8/0x290 [ 123.881636][ T3529] __se_sys_bpf+0x45a0/0x11cb0 [ 123.886235][ T3529] ? stack_trace_save+0x113/0x1c0 [ 123.891095][ T3529] ? terminate_walk+0x407/0x4f0 [ 123.895785][ T3529] ? stack_trace_snprint+0xf0/0xf0 [ 123.900730][ T3529] ? kmem_cache_free+0xa9/0x1e0 [ 123.905414][ T3529] ? kmem_cache_free+0xa9/0x1e0 [ 123.910101][ T3529] ? ktime_get_boot_fast_ns+0x19d/0x1d0 [ 123.915484][ T3529] ? __x64_sys_bpf+0x90/0x90 [ 123.919913][ T3529] ? debug_smp_processor_id+0x17/0x20 [ 123.925117][ T3529] ? bpf_trace_run5+0x17b/0x320 [ 123.929804][ T3529] ? bpf_trace_run4+0x2e0/0x2e0 [ 123.934488][ T3529] ? prepare_signal+0x85b/0xa60 [ 123.939178][ T3529] ? send_sigqueue+0x610/0x610 [ 123.943776][ T3529] ? __bpf_trace_signal_generate+0x3c/0x50 [ 123.949419][ T3529] ? __send_signal+0xb79/0xb90 [ 123.954034][ T3529] ? send_signal+0x4c1/0x5e0 [ 123.958444][ T3529] ? proc_fail_nth_read+0x210/0x210 [ 123.963481][ T3529] ? security_file_permission+0x86/0xb0 [ 123.968861][ T3529] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 123.974503][ T3529] ? do_send_sig_info+0xfb/0x230 [ 123.979281][ T3529] ? group_send_sig_info+0x1b0/0x320 [ 123.984402][ T3529] ? bpf_do_trace_printk+0x270/0x270 [ 123.989525][ T3529] ? __kasan_check_write+0x14/0x20 [ 123.994467][ T3529] ? bpf_send_signal+0x19/0x20 [ 123.999068][ T3529] ? debug_smp_processor_id+0x17/0x20 [ 124.004271][ T3529] __x64_sys_bpf+0x7b/0x90 [ 124.008524][ T3529] do_syscall_64+0x34/0x70 [ 124.012779][ T3529] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 124.018508][ T3529] RIP: 0033:0x7f49b67ad819 [ 124.022756][ T3529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 124.042195][ T3529] RSP: 002b:00007f49b4e26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 124.050442][ T3529] RAX: ffffffffffffffda RBX: 00007f49b6964fa0 RCX: 00007f49b67ad819 [ 124.058261][ T3529] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000011 [ 124.066059][ T3529] RBP: 00007f49b4e26090 R08: 0000000000000000 R09: 0000000000000000 [ 124.073864][ T3529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 124.081679][ T3529] R13: 0000000000000000 R14: 00007f49b6964fa0 R15: 00007fffde7674f8 [ 125.808357][ T3591] FAULT_INJECTION: forcing a failure. [ 125.808357][ T3591] name failslab, interval 1, probability 0, space 0, times 0 [ 125.836502][ T3591] CPU: 1 PID: 3591 Comm: syz.4.1117 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 125.846198][ T3591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 125.856095][ T3591] Call Trace: [ 125.859225][ T3591] dump_stack_lvl+0x1e2/0x24b [ 125.863741][ T3591] ? bfq_pos_tree_add_move+0x43b/0x43b [ 125.869029][ T3591] ? stack_trace_save+0x113/0x1c0 [ 125.873892][ T3591] ? stack_trace_snprint+0xf0/0xf0 [ 125.878837][ T3591] dump_stack+0x15/0x17 [ 125.882828][ T3591] should_fail+0x3c6/0x510 [ 125.887103][ T3591] ? __d_alloc+0x2d/0x6c0 [ 125.891252][ T3591] __should_failslab+0xa4/0xe0 [ 125.895852][ T3591] should_failslab+0x9/0x20 [ 125.900188][ T3591] kmem_cache_alloc+0x3d/0x2e0 [ 125.904791][ T3591] ? __kasan_check_write+0x14/0x20 [ 125.909741][ T3591] __d_alloc+0x2d/0x6c0 [ 125.913728][ T3591] ? radix_tree_iter_tag_clear+0x69/0x80 [ 125.919197][ T3591] d_alloc_pseudo+0x1d/0x70 [ 125.923536][ T3591] alloc_file_pseudo+0x131/0x2f0 [ 125.928312][ T3591] ? alloc_empty_file_noaccount+0x80/0x80 [ 125.933895][ T3591] ? __kasan_check_write+0x14/0x20 [ 125.938812][ T3591] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 125.943689][ T3591] anon_inode_getfile+0xa7/0x180 [ 125.948452][ T3591] bpf_link_prime+0xed/0x250 [ 125.952867][ T3591] __se_sys_bpf+0x46bd/0x11cb0 [ 125.957476][ T3591] ? stack_trace_save+0x113/0x1c0 [ 125.962329][ T3591] ? terminate_walk+0x407/0x4f0 [ 125.967015][ T3591] ? stack_trace_snprint+0xf0/0xf0 [ 125.971967][ T3591] ? kmem_cache_free+0xa9/0x1e0 [ 125.976651][ T3591] ? kmem_cache_free+0xa9/0x1e0 [ 125.981340][ T3591] ? ktime_get_boot_fast_ns+0x19d/0x1d0 [ 125.986722][ T3591] ? __x64_sys_bpf+0x90/0x90 [ 125.991151][ T3591] ? debug_smp_processor_id+0x17/0x20 [ 125.996353][ T3591] ? bpf_trace_run5+0x17b/0x320 [ 126.001039][ T3591] ? bpf_trace_run4+0x2e0/0x2e0 [ 126.005725][ T3591] ? prepare_signal+0x85b/0xa60 [ 126.010417][ T3591] ? send_sigqueue+0x610/0x610 [ 126.015013][ T3591] ? __bpf_trace_signal_generate+0x3c/0x50 [ 126.020655][ T3591] ? __send_signal+0xb79/0xb90 [ 126.025255][ T3591] ? send_signal+0x4c1/0x5e0 [ 126.029685][ T3591] ? proc_fail_nth_read+0x210/0x210 [ 126.034714][ T3591] ? security_file_permission+0x86/0xb0 [ 126.040098][ T3591] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 126.045754][ T3591] ? do_send_sig_info+0xfb/0x230 [ 126.050514][ T3591] ? group_send_sig_info+0x1b0/0x320 [ 126.055646][ T3591] ? bpf_do_trace_printk+0x270/0x270 [ 126.060758][ T3591] ? __kasan_check_write+0x14/0x20 [ 126.065698][ T3591] ? bpf_send_signal+0x19/0x20 [ 126.070306][ T3591] ? debug_smp_processor_id+0x17/0x20 [ 126.075505][ T3591] __x64_sys_bpf+0x7b/0x90 [ 126.079757][ T3591] do_syscall_64+0x34/0x70 [ 126.084011][ T3591] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 126.089738][ T3591] RIP: 0033:0x7f49b67ad819 [ 126.093990][ T3591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.113432][ T3591] RSP: 002b:00007f49b4e26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 126.121675][ T3591] RAX: ffffffffffffffda RBX: 00007f49b6964fa0 RCX: 00007f49b67ad819 [ 126.129497][ T3591] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000011 [ 126.137297][ T3591] RBP: 00007f49b4e26090 R08: 0000000000000000 R09: 0000000000000000 [ 126.145119][ T3591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.152928][ T3591] R13: 0000000000000000 R14: 00007f49b6964fa0 R15: 00007fffde7674f8 [ 126.508008][ T3604] device pim6reg1 entered promiscuous mode [ 127.185881][ T3625] device veth1_macvtap left promiscuous mode [ 127.258709][ T3625] device macsec0 left promiscuous mode [ 127.607250][ T3642] FAULT_INJECTION: forcing a failure. [ 127.607250][ T3642] name failslab, interval 1, probability 0, space 0, times 0 [ 127.656669][ T3642] CPU: 0 PID: 3642 Comm: syz.1.1137 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 127.666379][ T3642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 127.676268][ T3642] Call Trace: [ 127.679402][ T3642] dump_stack_lvl+0x1e2/0x24b [ 127.683915][ T3642] ? panic+0x812/0x812 [ 127.687815][ T3642] ? bfq_pos_tree_add_move+0x43b/0x43b [ 127.693114][ T3642] dump_stack+0x15/0x17 [ 127.697105][ T3642] should_fail+0x3c6/0x510 [ 127.701355][ T3642] ? __alloc_file+0x29/0x330 [ 127.705780][ T3642] __should_failslab+0xa4/0xe0 [ 127.710384][ T3642] should_failslab+0x9/0x20 [ 127.714722][ T3642] kmem_cache_alloc+0x3d/0x2e0 [ 127.719329][ T3642] ? _raw_spin_lock+0xa4/0x1b0 [ 127.723924][ T3642] __alloc_file+0x29/0x330 [ 127.728173][ T3642] ? alloc_empty_file+0x42/0x180 [ 127.732953][ T3642] alloc_empty_file+0x95/0x180 [ 127.737546][ T3642] alloc_file+0x5a/0x4e0 [ 127.741629][ T3642] alloc_file_pseudo+0x259/0x2f0 [ 127.746402][ T3642] ? alloc_empty_file_noaccount+0x80/0x80 [ 127.751964][ T3642] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 127.756816][ T3642] anon_inode_getfile+0xa7/0x180 [ 127.761587][ T3642] bpf_link_prime+0xed/0x250 [ 127.766018][ T3642] __se_sys_bpf+0x46bd/0x11cb0 [ 127.770617][ T3642] ? stack_trace_save+0x113/0x1c0 [ 127.775477][ T3642] ? terminate_walk+0x407/0x4f0 [ 127.780163][ T3642] ? stack_trace_snprint+0xf0/0xf0 [ 127.785114][ T3642] ? kmem_cache_free+0xa9/0x1e0 [ 127.789797][ T3642] ? kmem_cache_free+0xa9/0x1e0 [ 127.794483][ T3642] ? ktime_get_boot_fast_ns+0x19d/0x1d0 [ 127.799874][ T3642] ? __x64_sys_bpf+0x90/0x90 [ 127.804292][ T3642] ? debug_smp_processor_id+0x17/0x20 [ 127.809502][ T3642] ? bpf_trace_run5+0x17b/0x320 [ 127.814186][ T3642] ? bpf_trace_run4+0x2e0/0x2e0 [ 127.818876][ T3642] ? prepare_signal+0x85b/0xa60 [ 127.823563][ T3642] ? send_sigqueue+0x610/0x610 [ 127.828165][ T3642] ? __bpf_trace_signal_generate+0x3c/0x50 [ 127.833800][ T3642] ? __send_signal+0xb79/0xb90 [ 127.838405][ T3642] ? send_signal+0x4c1/0x5e0 [ 127.842826][ T3642] ? proc_fail_nth_read+0x210/0x210 [ 127.847862][ T3642] ? security_file_permission+0x86/0xb0 [ 127.853248][ T3642] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 127.858882][ T3642] ? do_send_sig_info+0xfb/0x230 [ 127.863657][ T3642] ? group_send_sig_info+0x1b0/0x320 [ 127.868910][ T3642] ? bpf_do_trace_printk+0x270/0x270 [ 127.874006][ T3642] ? __kasan_check_write+0x14/0x20 [ 127.878956][ T3642] ? bpf_send_signal+0x19/0x20 [ 127.883548][ T3642] ? debug_smp_processor_id+0x17/0x20 [ 127.888751][ T3642] __x64_sys_bpf+0x7b/0x90 [ 127.893003][ T3642] do_syscall_64+0x34/0x70 [ 127.897261][ T3642] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 127.902982][ T3642] RIP: 0033:0x7f5ff8129819 [ 127.907243][ T3642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.927196][ T3642] RSP: 002b:00007f5ff67a2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 127.935456][ T3642] RAX: ffffffffffffffda RBX: 00007f5ff82e0fa0 RCX: 00007f5ff8129819 [ 127.943252][ T3642] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000011 [ 127.951064][ T3642] RBP: 00007f5ff67a2090 R08: 0000000000000000 R09: 0000000000000000 [ 127.958877][ T3642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.966690][ T3642] R13: 0000000000000000 R14: 00007f5ff82e0fa0 R15: 00007ffdaa68e098 [ 128.084525][ T3648] device syzkaller0 entered promiscuous mode [ 129.168176][ T3676] device syzkaller0 entered promiscuous mode [ 130.916189][ T3716] FAULT_INJECTION: forcing a failure. [ 130.916189][ T3716] name failslab, interval 1, probability 0, space 0, times 0 [ 131.086762][ T3716] CPU: 0 PID: 3716 Comm: syz.0.1167 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 131.096472][ T3716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 131.106375][ T3716] Call Trace: [ 131.109498][ T3716] dump_stack_lvl+0x1e2/0x24b [ 131.114006][ T3716] ? bfq_pos_tree_add_move+0x43b/0x43b [ 131.119299][ T3716] dump_stack+0x15/0x17 [ 131.123287][ T3716] should_fail+0x3c6/0x510 [ 131.127546][ T3716] ? security_file_alloc+0x29/0x120 [ 131.132576][ T3716] __should_failslab+0xa4/0xe0 [ 131.137180][ T3716] should_failslab+0x9/0x20 [ 131.141515][ T3716] kmem_cache_alloc+0x3d/0x2e0 [ 131.146117][ T3716] ? __alloc_file+0x29/0x330 [ 131.150546][ T3716] security_file_alloc+0x29/0x120 [ 131.155403][ T3716] __alloc_file+0xbf/0x330 [ 131.159658][ T3716] alloc_empty_file+0x95/0x180 [ 131.164252][ T3716] alloc_file+0x5a/0x4e0 [ 131.168337][ T3716] alloc_file_pseudo+0x259/0x2f0 [ 131.173109][ T3716] ? alloc_empty_file_noaccount+0x80/0x80 [ 131.178665][ T3716] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 131.183524][ T3716] anon_inode_getfile+0xa7/0x180 [ 131.188298][ T3716] bpf_link_prime+0xed/0x250 [ 131.192721][ T3716] __se_sys_bpf+0x46bd/0x11cb0 [ 131.197323][ T3716] ? stack_trace_save+0x113/0x1c0 [ 131.202180][ T3716] ? terminate_walk+0x407/0x4f0 [ 131.206867][ T3716] ? stack_trace_snprint+0xf0/0xf0 [ 131.211818][ T3716] ? kmem_cache_free+0xa9/0x1e0 [ 131.216503][ T3716] ? kmem_cache_free+0xa9/0x1e0 [ 131.221189][ T3716] ? ktime_get_boot_fast_ns+0x19d/0x1d0 [ 131.226575][ T3716] ? __x64_sys_bpf+0x90/0x90 [ 131.230998][ T3716] ? debug_smp_processor_id+0x17/0x20 [ 131.236204][ T3716] ? bpf_trace_run5+0x17b/0x320 [ 131.240890][ T3716] ? bpf_trace_run4+0x2e0/0x2e0 [ 131.245577][ T3716] ? prepare_signal+0x85b/0xa60 [ 131.250391][ T3716] ? send_sigqueue+0x610/0x610 [ 131.254986][ T3716] ? __bpf_trace_signal_generate+0x3c/0x50 [ 131.260633][ T3716] ? __send_signal+0xb79/0xb90 [ 131.265227][ T3716] ? send_signal+0x4c1/0x5e0 [ 131.269650][ T3716] ? proc_fail_nth_read+0x210/0x210 [ 131.274686][ T3716] ? security_file_permission+0x86/0xb0 [ 131.280070][ T3716] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 131.285708][ T3716] ? do_send_sig_info+0xfb/0x230 [ 131.290575][ T3716] ? group_send_sig_info+0x1b0/0x320 [ 131.295694][ T3716] ? bpf_do_trace_printk+0x270/0x270 [ 131.300825][ T3716] ? __kasan_check_write+0x14/0x20 [ 131.305759][ T3716] ? bpf_send_signal+0x19/0x20 [ 131.310366][ T3716] ? debug_smp_processor_id+0x17/0x20 [ 131.315566][ T3716] __x64_sys_bpf+0x7b/0x90 [ 131.319821][ T3716] do_syscall_64+0x34/0x70 [ 131.324074][ T3716] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 131.329796][ T3716] RIP: 0033:0x7f3dc6c1a819 [ 131.334224][ T3716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.353834][ T3716] RSP: 002b:00007f3dc5293038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.362081][ T3716] RAX: ffffffffffffffda RBX: 00007f3dc6dd1fa0 RCX: 00007f3dc6c1a819 [ 131.369891][ T3716] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000011 [ 131.377707][ T3716] RBP: 00007f3dc5293090 R08: 0000000000000000 R09: 0000000000000000 [ 131.385516][ T3716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.393326][ T3716] R13: 0000000000000000 R14: 00007f3dc6dd1fa0 R15: 00007fff3b5f7888 [ 132.405717][ T3751] device pim6reg1 entered promiscuous mode [ 134.093094][ T3801] FAULT_INJECTION: forcing a failure. [ 134.093094][ T3801] name failslab, interval 1, probability 0, space 0, times 0 [ 134.198884][ T3801] CPU: 1 PID: 3801 Comm: syz.4.1202 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 134.208593][ T3801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 134.218479][ T3801] Call Trace: [ 134.221616][ T3801] dump_stack_lvl+0x1e2/0x24b [ 134.226125][ T3801] ? panic+0x812/0x812 [ 134.230029][ T3801] ? bfq_pos_tree_add_move+0x43b/0x43b [ 134.235326][ T3801] ? kmem_cache_alloc+0x168/0x2e0 [ 134.240186][ T3801] dump_stack+0x15/0x17 [ 134.244177][ T3801] should_fail+0x3c6/0x510 [ 134.248431][ T3801] ? tracepoint_add_func+0x321/0xa30 [ 134.253549][ T3801] __should_failslab+0xa4/0xe0 [ 134.258155][ T3801] should_failslab+0x9/0x20 [ 134.262489][ T3801] __kmalloc+0x60/0x330 [ 134.266488][ T3801] tracepoint_add_func+0x321/0xa30 [ 134.271430][ T3801] ? perf_trace_signal_deliver+0x5e0/0x5e0 [ 134.277072][ T3801] ? perf_trace_signal_deliver+0x5e0/0x5e0 [ 134.282726][ T3801] tracepoint_probe_register_prio_may_exist+0x11c/0x180 [ 134.289571][ T3801] ? acct_clear_integrals+0x30/0x30 [ 134.294604][ T3801] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 134.299484][ T3801] ? perf_trace_signal_deliver+0x5e0/0x5e0 [ 134.305282][ T3801] bpf_probe_register+0x152/0x1e0 [ 134.310139][ T3801] __se_sys_bpf+0x5f08/0x11cb0 [ 134.314738][ T3801] ? stack_trace_save+0x113/0x1c0 [ 134.319598][ T3801] ? terminate_walk+0x407/0x4f0 [ 134.324288][ T3801] ? stack_trace_snprint+0xf0/0xf0 [ 134.329235][ T3801] ? kmem_cache_free+0xa9/0x1e0 [ 134.333917][ T3801] ? kmem_cache_free+0xa9/0x1e0 [ 134.338606][ T3801] ? ktime_get_boot_fast_ns+0x19d/0x1d0 [ 134.343985][ T3801] ? __x64_sys_bpf+0x90/0x90 [ 134.348417][ T3801] ? debug_smp_processor_id+0x17/0x20 [ 134.353737][ T3801] ? bpf_trace_run5+0x17b/0x320 [ 134.358422][ T3801] ? bpf_trace_run4+0x2e0/0x2e0 [ 134.363109][ T3801] ? prepare_signal+0x85b/0xa60 [ 134.367796][ T3801] ? send_sigqueue+0x610/0x610 [ 134.372393][ T3801] ? __bpf_trace_signal_generate+0x3c/0x50 [ 134.378036][ T3801] ? __send_signal+0xb79/0xb90 [ 134.382635][ T3801] ? send_signal+0x4c1/0x5e0 [ 134.387058][ T3801] ? proc_fail_nth_read+0x210/0x210 [ 134.392101][ T3801] ? security_file_permission+0x86/0xb0 [ 134.397484][ T3801] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 134.403120][ T3801] ? do_send_sig_info+0xfb/0x230 [ 134.407896][ T3801] ? group_send_sig_info+0x1b0/0x320 [ 134.413016][ T3801] ? bpf_do_trace_printk+0x270/0x270 [ 134.418142][ T3801] ? __kasan_check_write+0x14/0x20 [ 134.423096][ T3801] ? bpf_send_signal+0x19/0x20 [ 134.427687][ T3801] ? debug_smp_processor_id+0x17/0x20 [ 134.432984][ T3801] __x64_sys_bpf+0x7b/0x90 [ 134.437230][ T3801] do_syscall_64+0x34/0x70 [ 134.441480][ T3801] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 134.447205][ T3801] RIP: 0033:0x7f49b67ad819 [ 134.451458][ T3801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.470903][ T3801] RSP: 002b:00007f49b4e26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.479144][ T3801] RAX: ffffffffffffffda RBX: 00007f49b6964fa0 RCX: 00007f49b67ad819 [ 134.486952][ T3801] RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000011 [ 134.494764][ T3801] RBP: 00007f49b4e26090 R08: 0000000000000000 R09: 0000000000000000 [ 134.502573][ T3801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.510388][ T3801] R13: 0000000000000000 R14: 00007f49b6964fa0 R15: 00007fffde7674f8 [ 135.764674][ T3828] device syzkaller0 entered promiscuous mode [ 135.831827][ T3839] device syzkaller0 entered promiscuous mode [ 137.718545][ T3883] FAULT_INJECTION: forcing a failure. [ 137.718545][ T3883] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.778260][ T3883] CPU: 0 PID: 3883 Comm: syz.3.1234 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 137.787979][ T3883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 137.797867][ T3883] Call Trace: [ 137.801002][ T3883] dump_stack_lvl+0x1e2/0x24b [ 137.805510][ T3883] ? bfq_pos_tree_add_move+0x43b/0x43b [ 137.810802][ T3883] ? sched_clock+0x3a/0x40 [ 137.815056][ T3883] dump_stack+0x15/0x17 [ 137.819046][ T3883] should_fail+0x3c6/0x510 [ 137.823301][ T3883] should_fail_usercopy+0x1a/0x20 [ 137.828160][ T3883] _copy_to_user+0x20/0x90 [ 137.832413][ T3883] simple_read_from_buffer+0xc7/0x150 [ 137.837622][ T3883] proc_fail_nth_read+0x1a3/0x210 [ 137.842479][ T3883] ? proc_fault_inject_write+0x390/0x390 [ 137.847952][ T3883] ? security_file_permission+0x86/0xb0 [ 137.853334][ T3883] ? rw_verify_area+0x1c3/0x360 [ 137.858017][ T3883] ? proc_fault_inject_write+0x390/0x390 [ 137.863483][ T3883] vfs_read+0x200/0xba0 [ 137.867481][ T3883] ? __lock_task_sighand+0x100/0x100 [ 137.872595][ T3883] ? kernel_read+0x70/0x70 [ 137.876853][ T3883] ? __kasan_check_write+0x14/0x20 [ 137.881797][ T3883] ? mutex_lock+0xa5/0x110 [ 137.886059][ T3883] ? mutex_trylock+0xa0/0xa0 [ 137.890478][ T3883] ? __fdget_pos+0x2e7/0x3a0 [ 137.894900][ T3883] ? ksys_read+0x77/0x2c0 [ 137.899067][ T3883] ksys_read+0x199/0x2c0 [ 137.903145][ T3883] ? vfs_write+0xe70/0xe70 [ 137.907403][ T3883] ? debug_smp_processor_id+0x17/0x20 [ 137.912606][ T3883] __x64_sys_read+0x7b/0x90 [ 137.916947][ T3883] do_syscall_64+0x34/0x70 [ 137.921199][ T3883] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 137.926929][ T3883] RIP: 0033:0x7fb0afbe125c [ 137.931182][ T3883] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 137.950619][ T3883] RSP: 002b:00007fb0ae25b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 137.958865][ T3883] RAX: ffffffffffffffda RBX: 00007fb0afd99fa0 RCX: 00007fb0afbe125c [ 137.966675][ T3883] RDX: 000000000000000f RSI: 00007fb0ae25b0a0 RDI: 0000000000000009 [ 137.974487][ T3883] RBP: 00007fb0ae25b090 R08: 0000000000000000 R09: 0000000000000000 [ 137.982297][ T3883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.990110][ T3883] R13: 0000000000000000 R14: 00007fb0afd99fa0 R15: 00007fff46a72298 [ 138.806860][ T3908] device pim6reg1 entered promiscuous mode [ 139.335078][ T24] audit: type=1400 audit(1732204499.210:150): avc: denied { create } for pid=3923 comm="syz.2.1248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 139.525913][ T3939] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 139.544291][ T3939] pim6reg0: linktype set to 774 [ 139.789957][ T3948] device syzkaller0 entered promiscuous mode [ 140.500036][ T3971] device syzkaller0 entered promiscuous mode [ 141.273535][ T3996] device syzkaller0 entered promiscuous mode [ 141.767499][ T4013] cgroup: fork rejected by pids controller in /syz2 [ 142.122938][ T4023] device veth1_macvtap entered promiscuous mode [ 142.186981][ T4023] device macsec0 entered promiscuous mode [ 142.290052][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 143.791833][ T4057] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.803545][ T4057] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.811137][ T4057] device bridge_slave_0 entered promiscuous mode [ 143.876004][ T4057] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.883728][ T4057] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.891036][ T4057] device bridge_slave_1 entered promiscuous mode [ 144.238080][ T389] device bridge_slave_1 left promiscuous mode [ 144.244199][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.261898][ T389] device bridge_slave_0 left promiscuous mode [ 144.273416][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.479997][ T4057] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.486868][ T4057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.493932][ T4057] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.500757][ T4057] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.618251][ T4077] device pim6reg1 entered promiscuous mode [ 144.748996][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.756261][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.763980][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.787306][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.898921][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.996743][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.003600][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.055520][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.063742][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.070592][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.078850][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.086925][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.189280][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 145.247116][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 145.291064][ T4057] device veth0_vlan entered promiscuous mode [ 145.337680][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 145.431542][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.508127][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.555484][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.599788][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 145.612537][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 145.667372][ T4057] device veth1_macvtap entered promiscuous mode [ 145.705018][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 145.716805][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 145.767978][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 145.917622][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 145.946165][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 146.783995][ T4136] device syzkaller0 entered promiscuous mode [ 148.416466][ T4177] device veth1_macvtap left promiscuous mode [ 148.661487][ T4178] device veth1_macvtap entered promiscuous mode [ 148.698872][ T4178] device macsec0 entered promiscuous mode [ 148.748824][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 148.847526][ T4188] device syzkaller0 entered promiscuous mode [ 149.609513][ T4212] device veth0_vlan left promiscuous mode [ 149.667043][ T4212] device veth0_vlan entered promiscuous mode [ 151.528128][ T4258] device syzkaller0 entered promiscuous mode [ 152.570555][ T4294] device veth0_vlan left promiscuous mode [ 152.739299][ T4294] device veth0_vlan entered promiscuous mode [ 152.971801][ T4306] device syzkaller0 entered promiscuous mode [ 153.351663][ T24] audit: type=1400 audit(1732204513.230:151): avc: denied { ioctl } for pid=4311 comm="syz.2.1388" path="socket:[28248]" dev="sockfs" ino=28248 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 154.671670][ T4363] device syzkaller0 entered promiscuous mode [ 159.201461][ T4487] device syzkaller0 entered promiscuous mode [ 159.353488][ T4493] FAULT_INJECTION: forcing a failure. [ 159.353488][ T4493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.468435][ T4493] CPU: 1 PID: 4493 Comm: syz.4.1462 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 159.478139][ T4493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 159.488024][ T4493] Call Trace: [ 159.491157][ T4493] dump_stack_lvl+0x1e2/0x24b [ 159.495674][ T4493] ? bfq_pos_tree_add_move+0x43b/0x43b [ 159.500962][ T4493] ? irq_exit_rcu+0x9/0x10 [ 159.505214][ T4493] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 159.511288][ T4493] dump_stack+0x15/0x17 [ 159.515278][ T4493] should_fail+0x3c6/0x510 [ 159.519534][ T4493] should_fail_usercopy+0x1a/0x20 [ 159.524394][ T4493] _copy_from_user+0x20/0xd0 [ 159.528826][ T4493] sock_do_ioctl+0x20e/0x3a0 [ 159.533247][ T4493] ? sock_show_fdinfo+0xa0/0xa0 [ 159.537939][ T4493] ? selinux_file_ioctl+0x3cc/0x540 [ 159.542970][ T4493] ? clockevents_program_event+0x214/0x2c0 [ 159.548609][ T4493] sock_ioctl+0x4a6/0x760 [ 159.552774][ T4493] ? sock_poll+0x340/0x340 [ 159.557051][ T4493] ? security_file_ioctl+0x84/0xb0 [ 159.561973][ T4493] ? sock_poll+0x340/0x340 [ 159.566240][ T4493] __se_sys_ioctl+0x114/0x190 [ 159.570741][ T4493] __x64_sys_ioctl+0x7b/0x90 [ 159.575166][ T4493] do_syscall_64+0x34/0x70 [ 159.579421][ T4493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 159.585145][ T4493] RIP: 0033:0x7f49b67ad819 [ 159.589403][ T4493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.608841][ T4493] RSP: 002b:00007f49b4e26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 159.617084][ T4493] RAX: ffffffffffffffda RBX: 00007f49b6964fa0 RCX: 00007f49b67ad819 [ 159.624894][ T4493] RDX: 0000000020000280 RSI: 0000000000008914 RDI: 0000000000000005 [ 159.632707][ T4493] RBP: 00007f49b4e26090 R08: 0000000000000000 R09: 0000000000000000 [ 159.640516][ T4493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.648332][ T4493] R13: 0000000000000000 R14: 00007f49b6964fa0 R15: 00007fffde7674f8 [ 160.466943][ T4548] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.473945][ T4548] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.609436][ T4548] device bridge_slave_1 left promiscuous mode [ 160.666687][ T4548] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.741869][ T4548] device bridge_slave_0 left promiscuous mode [ 160.795868][ T4548] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.050133][ T4562] device pim6reg1 entered promiscuous mode [ 163.238167][ T4652] device veth0_vlan left promiscuous mode [ 163.245433][ T4652] device veth0_vlan entered promiscuous mode [ 163.265313][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.273715][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.281362][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.416181][ T4661] device syzkaller0 entered promiscuous mode [ 164.287768][ T4699] device veth0_vlan left promiscuous mode [ 164.397288][ T4699] device veth0_vlan entered promiscuous mode [ 165.988566][ T4737] device pim6reg1 entered promiscuous mode [ 170.297134][ T24] audit: type=1400 audit(1732204530.170:152): avc: denied { write } for pid=4813 comm="syz.1.1587" name="cgroup.subtree_control" dev="cgroup2" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 170.500475][ T24] audit: type=1400 audit(1732204530.180:153): avc: denied { open } for pid=4813 comm="syz.1.1587" path="" dev="cgroup2" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 170.802420][ T4829] device sit0 left promiscuous mode [ 170.953252][ T4832] device sit0 entered promiscuous mode [ 171.060802][ T4843] device syzkaller0 entered promiscuous mode [ 173.563890][ T24] audit: type=1400 audit(1732204533.430:154): avc: denied { create } for pid=4925 comm="syz.3.1627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 174.548276][ T4949] device veth0_vlan left promiscuous mode [ 174.572160][ T4949] device veth0_vlan entered promiscuous mode [ 174.603505][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.620496][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.672844][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.195178][ T5024] device veth0_vlan left promiscuous mode [ 176.204021][ T5024] device veth0_vlan entered promiscuous mode [ 176.888352][ T5060] syz.3.1675[5060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.888410][ T5060] syz.3.1675[5060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.239987][ T24] audit: type=1400 audit(1732204542.120:155): avc: denied { ioctl } for pid=5159 comm="syz.4.1710" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 182.666951][ T5169] device wg2 entered promiscuous mode [ 183.709660][ T5209] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.719845][ T5209] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.886374][ T5209] device bridge_slave_1 left promiscuous mode [ 183.904539][ T5209] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.965886][ T5209] device bridge_slave_0 left promiscuous mode [ 183.988770][ T5209] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.223582][ T5191] cgroup: fork rejected by pids controller in /syz4 [ 184.690363][ T5267] syz.1.1735[5267] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.690449][ T5267] syz.1.1735[5267] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.167783][ T5278] device pim6reg1 entered promiscuous mode [ 186.394039][ T5320] device pim6reg1 entered promiscuous mode [ 186.430611][ T5334] €Â0: renamed from pim6reg1 [ 186.953331][ T5354] device pim6reg1 entered promiscuous mode [ 187.065913][ T24] audit: type=1400 audit(1732204546.940:156): avc: denied { create } for pid=5366 comm="syz.1.1770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 187.098419][ T24] audit: type=1400 audit(1732204546.940:157): avc: denied { create } for pid=5366 comm="syz.1.1770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 188.296768][ T5417] device wg2 entered promiscuous mode [ 190.384050][ T5491] device syzkaller0 entered promiscuous mode [ 190.436926][ T5495] tap0: tun_chr_ioctl cmd 1074025677 [ 190.496534][ T5495] tap0: linktype set to 65534 [ 192.061559][ T5554] device syzkaller0 entered promiscuous mode [ 193.381492][ T5653] device pim6reg1 entered promiscuous mode [ 193.933006][ T5670] device sit0 left promiscuous mode [ 193.989982][ T5670] device sit0 entered promiscuous mode [ 194.944650][ T5719] device wg2 left promiscuous mode [ 196.162291][ T5752] syz.1.1916[5752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.162350][ T5752] syz.1.1916[5752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.272688][ T5753] device syzkaller0 entered promiscuous mode [ 197.139294][ T5773] device syzkaller0 entered promiscuous mode [ 197.976880][ T5781] device syzkaller0 entered promiscuous mode [ 200.544118][ T5889] device pim6reg1 entered promiscuous mode [ 202.928565][ T6005] device sit0 entered promiscuous mode [ 203.612885][ T6025] device syzkaller0 entered promiscuous mode [ 203.949027][ T6052] device wg2 left promiscuous mode [ 203.958142][ T6054] FAULT_INJECTION: forcing a failure. [ 203.958142][ T6054] name failslab, interval 1, probability 0, space 0, times 0 [ 204.001319][ T6052] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.011375][ T6052] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.019311][ T6054] CPU: 0 PID: 6054 Comm: syz.0.2025 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 204.028994][ T6054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 204.039002][ T6054] Call Trace: [ 204.042138][ T6054] dump_stack_lvl+0x1e2/0x24b [ 204.046644][ T6054] ? panic+0x812/0x812 [ 204.050551][ T6054] ? bfq_pos_tree_add_move+0x43b/0x43b [ 204.055845][ T6054] ? avc_has_perm+0x14d/0x400 [ 204.060357][ T6054] ? memcpy+0x56/0x70 [ 204.064175][ T6054] dump_stack+0x15/0x17 [ 204.068170][ T6054] should_fail+0x3c6/0x510 [ 204.072511][ T6054] ? __alloc_skb+0x80/0x510 [ 204.076850][ T6054] __should_failslab+0xa4/0xe0 [ 204.081451][ T6054] should_failslab+0x9/0x20 [ 204.085806][ T6054] kmem_cache_alloc+0x3d/0x2e0 [ 204.090388][ T6054] __alloc_skb+0x80/0x510 [ 204.094554][ T6054] alloc_skb_with_frags+0xa1/0x570 [ 204.099505][ T6054] ? is_bpf_text_address+0x172/0x190 [ 204.104628][ T6054] sock_alloc_send_pskb+0x915/0xa50 [ 204.109675][ T6054] ? sock_kzfree_s+0x60/0x60 [ 204.114081][ T6054] ? stack_trace_save+0x113/0x1c0 [ 204.118945][ T6054] ? terminate_walk+0x407/0x4f0 [ 204.123630][ T6054] ? stack_trace_snprint+0xf0/0xf0 [ 204.128582][ T6054] tun_get_user+0xe90/0x38f0 [ 204.133004][ T6054] ? kmem_cache_free+0xa9/0x1e0 [ 204.137688][ T6054] ? do_sys_openat2+0x1fc/0x710 [ 204.142376][ T6054] ? _kstrtoull+0x3a0/0x4a0 [ 204.146719][ T6054] ? tun_do_read+0x1f60/0x1f60 [ 204.151313][ T6054] ? kstrtouint_from_user+0x20a/0x2a0 [ 204.156523][ T6054] ? kstrtol_from_user+0x310/0x310 [ 204.161472][ T6054] ? avc_policy_seqno+0x1b/0x70 [ 204.166156][ T6054] ? selinux_file_permission+0x2bb/0x560 [ 204.171764][ T6054] ? fsnotify_perm+0x67/0x4e0 [ 204.176257][ T6054] tun_chr_write_iter+0x1a8/0x250 [ 204.181119][ T6054] vfs_write+0xb4c/0xe70 [ 204.185197][ T6054] ? putname+0xe7/0x140 [ 204.189194][ T6054] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 204.194833][ T6054] ? kernel_write+0x3d0/0x3d0 [ 204.199349][ T6054] ? __fdget_pos+0x209/0x3a0 [ 204.203768][ T6054] ? ksys_write+0x77/0x2c0 [ 204.208024][ T6054] ksys_write+0x199/0x2c0 [ 204.212209][ T6054] ? __ia32_sys_read+0x90/0x90 [ 204.216790][ T6054] ? debug_smp_processor_id+0x17/0x20 [ 204.221994][ T6054] __x64_sys_write+0x7b/0x90 [ 204.226424][ T6054] do_syscall_64+0x34/0x70 [ 204.230679][ T6054] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 204.236399][ T6054] RIP: 0033:0x7f3dc6c1a819 [ 204.240668][ T6054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.260093][ T6054] RSP: 002b:00007f3dc5293038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 204.268349][ T6054] RAX: ffffffffffffffda RBX: 00007f3dc6dd1fa0 RCX: 00007f3dc6c1a819 [ 204.276148][ T6054] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 204.283962][ T6054] RBP: 00007f3dc5293090 R08: 0000000000000000 R09: 0000000000000000 [ 204.291774][ T6054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 204.299583][ T6054] R13: 0000000000000000 R14: 00007f3dc6dd1fa0 R15: 00007fff3b5f7888 [ 204.393186][ T6058] device bridge_slave_1 left promiscuous mode [ 204.416356][ T6058] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.429939][ T6058] device bridge_slave_0 left promiscuous mode [ 204.451971][ T6058] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.946685][ T6199] device veth0_vlan left promiscuous mode [ 208.035234][ T6199] device veth0_vlan entered promiscuous mode [ 208.217006][ T6216] device syzkaller0 entered promiscuous mode [ 209.251570][ T6274] device sit0 entered promiscuous mode [ 209.968070][ T6295] device veth1_macvtap left promiscuous mode [ 213.338207][ T6412] device veth0_to_bond entered promiscuous mode [ 214.302674][ T6439] FAULT_INJECTION: forcing a failure. [ 214.302674][ T6439] name failslab, interval 1, probability 0, space 0, times 0 [ 214.559775][ T6439] CPU: 0 PID: 6439 Comm: syz.1.2162 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 214.569500][ T6439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 214.579459][ T6439] Call Trace: [ 214.582610][ T6439] dump_stack_lvl+0x1e2/0x24b [ 214.587103][ T6439] ? panic+0x812/0x812 [ 214.591011][ T6439] ? bfq_pos_tree_add_move+0x43b/0x43b [ 214.596317][ T6439] ? avc_has_perm+0x14d/0x400 [ 214.600815][ T6439] ? memcpy+0x56/0x70 [ 214.604638][ T6439] dump_stack+0x15/0x17 [ 214.608627][ T6439] should_fail+0x3c6/0x510 [ 214.612881][ T6439] ? __alloc_skb+0x80/0x510 [ 214.617226][ T6439] __should_failslab+0xa4/0xe0 [ 214.621829][ T6439] should_failslab+0x9/0x20 [ 214.626172][ T6439] kmem_cache_alloc+0x3d/0x2e0 [ 214.630765][ T6439] __alloc_skb+0x80/0x510 [ 214.634941][ T6439] alloc_skb_with_frags+0xa1/0x570 [ 214.639889][ T6439] ? is_bpf_text_address+0x172/0x190 [ 214.645004][ T6439] sock_alloc_send_pskb+0x915/0xa50 [ 214.650035][ T6439] ? sock_kzfree_s+0x60/0x60 [ 214.654460][ T6439] ? stack_trace_save+0x113/0x1c0 [ 214.659330][ T6439] ? terminate_walk+0x407/0x4f0 [ 214.664007][ T6439] ? stack_trace_snprint+0xf0/0xf0 [ 214.668958][ T6439] tun_get_user+0xe90/0x38f0 [ 214.673378][ T6439] ? kmem_cache_free+0xa9/0x1e0 [ 214.678067][ T6439] ? do_sys_openat2+0x1fc/0x710 [ 214.682759][ T6439] ? _kstrtoull+0x3a0/0x4a0 [ 214.687101][ T6439] ? tun_do_read+0x1f60/0x1f60 [ 214.691688][ T6439] ? kstrtouint_from_user+0x20a/0x2a0 [ 214.696902][ T6439] ? kstrtol_from_user+0x310/0x310 [ 214.701843][ T6439] ? debug_smp_processor_id+0x17/0x20 [ 214.707228][ T6439] ? avc_policy_seqno+0x1b/0x70 [ 214.711912][ T6439] ? selinux_file_permission+0x2bb/0x560 [ 214.717391][ T6439] ? fsnotify_perm+0x67/0x4e0 [ 214.721892][ T6439] tun_chr_write_iter+0x1a8/0x250 [ 214.726752][ T6439] vfs_write+0xb4c/0xe70 [ 214.730829][ T6439] ? putname+0xe7/0x140 [ 214.734822][ T6439] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 214.740467][ T6439] ? kernel_write+0x3d0/0x3d0 [ 214.744977][ T6439] ? __fdget_pos+0x209/0x3a0 [ 214.749404][ T6439] ? ksys_write+0x77/0x2c0 [ 214.753656][ T6439] ksys_write+0x199/0x2c0 [ 214.757824][ T6439] ? __ia32_sys_read+0x90/0x90 [ 214.762424][ T6439] ? debug_smp_processor_id+0x17/0x20 [ 214.767722][ T6439] __x64_sys_write+0x7b/0x90 [ 214.772140][ T6439] do_syscall_64+0x34/0x70 [ 214.776401][ T6439] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 214.782120][ T6439] RIP: 0033:0x7f5ff8129819 [ 214.786384][ T6439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.805813][ T6439] RSP: 002b:00007f5ff67a2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 214.814059][ T6439] RAX: ffffffffffffffda RBX: 00007f5ff82e0fa0 RCX: 00007f5ff8129819 [ 214.821871][ T6439] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 214.829697][ T6439] RBP: 00007f5ff67a2090 R08: 0000000000000000 R09: 0000000000000000 [ 214.837619][ T6439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.845432][ T6439] R13: 0000000000000000 R14: 00007f5ff82e0fa0 R15: 00007ffdaa68e098 [ 216.493385][ T6497] device veth0_to_bond entered promiscuous mode [ 218.478186][ T6545] FAULT_INJECTION: forcing a failure. [ 218.478186][ T6545] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 218.493339][ T6545] CPU: 1 PID: 6545 Comm: syz.3.2206 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 218.503039][ T6545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 218.512927][ T6545] Call Trace: [ 218.516064][ T6545] dump_stack_lvl+0x1e2/0x24b [ 218.520664][ T6545] ? bfq_pos_tree_add_move+0x43b/0x43b [ 218.525958][ T6545] dump_stack+0x15/0x17 [ 218.529949][ T6545] should_fail+0x3c6/0x510 [ 218.534206][ T6545] should_fail_alloc_page+0x52/0x60 [ 218.539235][ T6545] __alloc_pages_nodemask+0x1b3/0xaf0 [ 218.544449][ T6545] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 218.549828][ T6545] kmalloc_order+0x4c/0x170 [ 218.554169][ T6545] kmalloc_order_trace+0x18/0x90 [ 218.558939][ T6545] ? alloc_skb_with_frags+0xa1/0x570 [ 218.564055][ T6545] __kmalloc_track_caller+0x1dd/0x320 [ 218.569263][ T6545] ? __alloc_skb+0x80/0x510 [ 218.573607][ T6545] ? alloc_skb_with_frags+0xa1/0x570 [ 218.578726][ T6545] __alloc_skb+0xbc/0x510 [ 218.582896][ T6545] alloc_skb_with_frags+0xa1/0x570 [ 218.587839][ T6545] ? is_bpf_text_address+0x172/0x190 [ 218.592959][ T6545] sock_alloc_send_pskb+0x915/0xa50 [ 218.597995][ T6545] ? sock_kzfree_s+0x60/0x60 [ 218.602419][ T6545] ? stack_trace_save+0x113/0x1c0 [ 218.607368][ T6545] ? terminate_walk+0x407/0x4f0 [ 218.612227][ T6545] ? stack_trace_snprint+0xf0/0xf0 [ 218.617180][ T6545] tun_get_user+0xe90/0x38f0 [ 218.621687][ T6545] ? kmem_cache_free+0xa9/0x1e0 [ 218.626369][ T6545] ? do_sys_openat2+0x1fc/0x710 [ 218.631059][ T6545] ? _kstrtoull+0x3a0/0x4a0 [ 218.635395][ T6545] ? tun_do_read+0x1f60/0x1f60 [ 218.639992][ T6545] ? kstrtouint_from_user+0x20a/0x2a0 [ 218.645198][ T6545] ? kstrtol_from_user+0x310/0x310 [ 218.650148][ T6545] ? debug_smp_processor_id+0x17/0x20 [ 218.655358][ T6545] ? avc_policy_seqno+0x1b/0x70 [ 218.660041][ T6545] ? selinux_file_permission+0x2bb/0x560 [ 218.665508][ T6545] ? fsnotify_perm+0x67/0x4e0 [ 218.670023][ T6545] tun_chr_write_iter+0x1a8/0x250 [ 218.674898][ T6545] vfs_write+0xb4c/0xe70 [ 218.678960][ T6545] ? putname+0xe7/0x140 [ 218.682954][ T6545] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 218.688595][ T6545] ? kernel_write+0x3d0/0x3d0 [ 218.693113][ T6545] ? __fdget_pos+0x209/0x3a0 [ 218.697532][ T6545] ? ksys_write+0x77/0x2c0 [ 218.701790][ T6545] ksys_write+0x199/0x2c0 [ 218.705956][ T6545] ? __ia32_sys_read+0x90/0x90 [ 218.710557][ T6545] ? debug_smp_processor_id+0x17/0x20 [ 218.715762][ T6545] __x64_sys_write+0x7b/0x90 [ 218.720189][ T6545] do_syscall_64+0x34/0x70 [ 218.724442][ T6545] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 218.730167][ T6545] RIP: 0033:0x7fb0afbe2819 [ 218.734438][ T6545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.753862][ T6545] RSP: 002b:00007fb0ae25b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 218.762103][ T6545] RAX: ffffffffffffffda RBX: 00007fb0afd99fa0 RCX: 00007fb0afbe2819 [ 218.769927][ T6545] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 218.777729][ T6545] RBP: 00007fb0ae25b090 R08: 0000000000000000 R09: 0000000000000000 [ 218.785534][ T6545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.793347][ T6545] R13: 0000000000000000 R14: 00007fb0afd99fa0 R15: 00007fff46a72298 [ 220.509065][ T6580] syz.4.2219[6580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.511921][ T6580] syz.4.2219[6580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.823676][ T6595] FAULT_INJECTION: forcing a failure. [ 220.823676][ T6595] name failslab, interval 1, probability 0, space 0, times 0 [ 220.847230][ T6595] CPU: 1 PID: 6595 Comm: syz.3.2226 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 220.856902][ T6595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 220.866790][ T6595] Call Trace: [ 220.869931][ T6595] dump_stack_lvl+0x1e2/0x24b [ 220.874435][ T6595] ? panic+0x812/0x812 [ 220.878352][ T6595] ? bfq_pos_tree_add_move+0x43b/0x43b [ 220.883632][ T6595] ? fib6_table_lookup+0x986/0xaf0 [ 220.888587][ T6595] dump_stack+0x15/0x17 [ 220.892581][ T6595] should_fail+0x3c6/0x510 [ 220.896829][ T6595] ? skb_ext_add+0x13a/0x770 [ 220.901253][ T6595] __should_failslab+0xa4/0xe0 [ 220.905849][ T6595] should_failslab+0x9/0x20 [ 220.910192][ T6595] kmem_cache_alloc+0x3d/0x2e0 [ 220.914795][ T6595] skb_ext_add+0x13a/0x770 [ 220.919050][ T6595] xfrm_input+0x422/0x6cb0 [ 220.923299][ T6595] ? fib6_table_lookup+0xaf0/0xaf0 [ 220.928261][ T6595] ? __ipv6_chk_addr_and_flags+0x38c/0x3d0 [ 220.933890][ T6595] ? xfrm_parse_spi+0x570/0x570 [ 220.938577][ T6595] ? ip6_tnl_rcv_ctl+0x2c3/0x410 [ 220.943352][ T6595] vti6_input_proto+0x37a/0x4c0 [ 220.948036][ T6595] vti6_rcv+0x9a/0xe0 [ 220.951852][ T6595] xfrm6_ah_rcv+0x65/0xf0 [ 220.956021][ T6595] ip6_protocol_deliver_rcu+0xa57/0x12f0 [ 220.961485][ T6595] ? ip6table_filter_hook+0x69/0x80 [ 220.966523][ T6595] ip6_input+0xdc/0x260 [ 220.970512][ T6595] ? ip6_protocol_deliver_rcu+0x12f0/0x12f0 [ 220.976243][ T6595] ? ip6_input+0x260/0x260 [ 220.980500][ T6595] ? ip6table_raw_hook+0x69/0x80 [ 220.985359][ T6595] ip6_rcv_finish+0x185/0x350 [ 220.989870][ T6595] ipv6_rcv+0xee/0x270 [ 220.993776][ T6595] ? ip6_rcv_finish+0x350/0x350 [ 220.998478][ T6595] ? refcount_add+0x80/0x80 [ 221.002805][ T6595] ? down_read_trylock+0x179/0x1d0 [ 221.007753][ T6595] ? kasan_poison+0x5d/0x70 [ 221.012096][ T6595] ? __kasan_kmalloc_large+0xad/0xc0 [ 221.017210][ T6595] ? __init_rwsem+0x1c0/0x1c0 [ 221.021725][ T6595] ? ip6_rcv_finish+0x350/0x350 [ 221.026407][ T6595] __netif_receive_skb+0x1c6/0x530 [ 221.031356][ T6595] ? __kasan_check_write+0x14/0x20 [ 221.036315][ T6595] ? exc_page_fault+0x33d/0x5b0 [ 221.040994][ T6595] ? deliver_ptype_list_skb+0x3c0/0x3c0 [ 221.046374][ T6595] ? asm_exc_page_fault+0x1e/0x30 [ 221.051235][ T6595] ? _copy_from_iter+0x1c1/0xd10 [ 221.056009][ T6595] netif_receive_skb+0xb0/0x480 [ 221.060694][ T6595] ? _copy_from_iter+0x3e6/0xd10 [ 221.065466][ T6595] ? netif_receive_skb_core+0x210/0x210 [ 221.070982][ T6595] ? sock_alloc_send_pskb+0x936/0xa50 [ 221.076190][ T6595] tun_rx_batched+0x6d9/0x870 [ 221.080700][ T6595] ? eth_type_trans+0x2e4/0x620 [ 221.085377][ T6595] ? local_bh_enable+0x30/0x30 [ 221.089982][ T6595] tun_get_user+0x2bf3/0x38f0 [ 221.094496][ T6595] ? kmem_cache_free+0xa9/0x1e0 [ 221.099197][ T6595] ? do_sys_openat2+0x1fc/0x710 [ 221.103866][ T6595] ? _kstrtoull+0x3a0/0x4a0 [ 221.108210][ T6595] ? tun_do_read+0x1f60/0x1f60 [ 221.112816][ T6595] ? kstrtouint_from_user+0x20a/0x2a0 [ 221.118016][ T6595] ? kstrtol_from_user+0x310/0x310 [ 221.122964][ T6595] ? avc_policy_seqno+0x1b/0x70 [ 221.127649][ T6595] ? selinux_file_permission+0x2bb/0x560 [ 221.133204][ T6595] ? fsnotify_perm+0x67/0x4e0 [ 221.137718][ T6595] tun_chr_write_iter+0x1a8/0x250 [ 221.142580][ T6595] vfs_write+0xb4c/0xe70 [ 221.146655][ T6595] ? putname+0xe7/0x140 [ 221.150650][ T6595] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 221.156292][ T6595] ? kernel_write+0x3d0/0x3d0 [ 221.160807][ T6595] ? __fdget_pos+0x209/0x3a0 [ 221.165223][ T6595] ? ksys_write+0x77/0x2c0 [ 221.169481][ T6595] ksys_write+0x199/0x2c0 [ 221.173648][ T6595] ? __ia32_sys_read+0x90/0x90 [ 221.178248][ T6595] ? debug_smp_processor_id+0x17/0x20 [ 221.183455][ T6595] __x64_sys_write+0x7b/0x90 [ 221.187883][ T6595] do_syscall_64+0x34/0x70 [ 221.192396][ T6595] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 221.198117][ T6595] RIP: 0033:0x7fb0afbe2819 [ 221.202372][ T6595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 221.221812][ T6595] RSP: 002b:00007fb0ae25b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 221.230058][ T6595] RAX: ffffffffffffffda RBX: 00007fb0afd99fa0 RCX: 00007fb0afbe2819 [ 221.237893][ T6595] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 221.245689][ T6595] RBP: 00007fb0ae25b090 R08: 0000000000000000 R09: 0000000000000000 [ 221.253490][ T6595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 221.261303][ T6595] R13: 0000000000000000 R14: 00007fb0afd99fa0 R15: 00007fff46a72298 [ 225.810033][ T6675] device syzkaller0 entered promiscuous mode [ 227.631536][ T6727] device wg2 entered promiscuous mode [ 230.566418][ T6773] device bridge_slave_1 left promiscuous mode [ 230.659728][ T6773] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.703959][ T6773] device bridge_slave_0 left promiscuous mode [ 230.749678][ T6773] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.123419][ T6824] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.132233][ T6824] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.207635][ T6824] device bridge0 left promiscuous mode [ 232.729661][ T6838] device bridge_slave_1 left promiscuous mode [ 232.735643][ T6838] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.786939][ T6838] device bridge_slave_0 left promiscuous mode [ 232.857451][ T6838] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.761779][ T6884] device pim6reg1 entered promiscuous mode [ 237.062737][ T6946] device pim6reg1 entered promiscuous mode [ 239.965798][ T6993] device pim6reg1 entered promiscuous mode [ 241.327604][ T7028] device syzkaller0 entered promiscuous mode [ 243.323281][ T7054] device syzkaller0 entered promiscuous mode [ 244.111637][ T7063] device syzkaller0 entered promiscuous mode [ 244.727348][ T7073] device syzkaller0 entered promiscuous mode [ 245.353876][ T7089] device syzkaller0 entered promiscuous mode [ 246.806793][ T7117] device syzkaller0 entered promiscuous mode [ 250.657785][ T7192] device syzkaller0 entered promiscuous mode [ 251.637566][ T7211] device syzkaller0 entered promiscuous mode [ 252.549324][ T7213] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.556372][ T7213] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.777823][ T7213] device bridge_slave_0 entered promiscuous mode [ 252.784861][ T7213] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.996994][ T7213] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.004301][ T7213] device bridge_slave_1 entered promiscuous mode [ 253.650942][ T7238] device syzkaller0 entered promiscuous mode [ 254.260453][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.268015][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.286178][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.315378][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.335425][ T317] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.342284][ T317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.372369][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.392056][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.413298][ T317] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.420167][ T317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.523018][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.595757][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.686523][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.741910][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.767751][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.867111][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.894936][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.947155][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.966849][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.998007][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.027356][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.057688][ T7213] device veth0_vlan entered promiscuous mode [ 255.133334][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 255.158991][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 255.218115][ T7213] device veth1_macvtap entered promiscuous mode [ 255.422283][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 255.553021][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.571554][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.617247][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.676271][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 256.209865][ T7263] device syzkaller0 entered promiscuous mode [ 256.969949][ T95] udevd[95]: worker [7261] terminated by signal 33 (Unknown signal 33) [ 257.047119][ T95] udevd[95]: worker [7261] failed while handling '/devices/virtual/block/loop5' [ 257.853664][ T7297] FAULT_INJECTION: forcing a failure. [ 257.853664][ T7297] name failslab, interval 1, probability 0, space 0, times 0 [ 257.946731][ T7297] CPU: 0 PID: 7297 Comm: syz.2.2491 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 257.956535][ T7297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 257.966415][ T7297] Call Trace: [ 257.969548][ T7297] dump_stack_lvl+0x1e2/0x24b [ 257.974056][ T7297] ? panic+0x812/0x812 [ 257.977964][ T7297] ? bfq_pos_tree_add_move+0x43b/0x43b [ 257.983258][ T7297] ? irq_exit_rcu+0x9/0x10 [ 257.987508][ T7297] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 257.993149][ T7297] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 257.999139][ T7297] dump_stack+0x15/0x17 [ 258.003132][ T7297] should_fail+0x3c6/0x510 [ 258.007504][ T7297] ? getname_flags+0xba/0x520 [ 258.012014][ T7297] __should_failslab+0xa4/0xe0 [ 258.016619][ T7297] should_failslab+0x9/0x20 [ 258.020954][ T7297] kmem_cache_alloc+0x3d/0x2e0 [ 258.025552][ T7297] getname_flags+0xba/0x520 [ 258.029895][ T7297] __x64_sys_unlink+0x3c/0x50 [ 258.034405][ T7297] do_syscall_64+0x34/0x70 [ 258.038677][ T7297] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 258.044394][ T7297] RIP: 0033:0x7f9e463af819 [ 258.048639][ T7297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 258.068183][ T7297] RSP: 002b:00007f9e44a28038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 258.076421][ T7297] RAX: ffffffffffffffda RBX: 00007f9e46566fa0 RCX: 00007f9e463af819 [ 258.084234][ T7297] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000240 [ 258.092145][ T7297] RBP: 00007f9e44a28090 R08: 0000000000000000 R09: 0000000000000000 [ 258.099958][ T7297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 258.107766][ T7297] R13: 0000000000000000 R14: 00007f9e46566fa0 R15: 00007ffcfca9bfa8 [ 262.312262][ T7392] device syzkaller0 entered promiscuous mode [ 263.829959][ T7431] device sit0 entered promiscuous mode [ 265.636202][ T24] audit: type=1400 audit(1732204625.510:158): avc: denied { tracepoint } for pid=7505 comm="syz.2.2568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 265.689018][ T7510] FAULT_INJECTION: forcing a failure. [ 265.689018][ T7510] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 265.726477][ T7510] CPU: 1 PID: 7510 Comm: syz.3.2570 Not tainted 5.10.226-syzkaller-00031-gb14940b90491 #0 [ 265.736266][ T7510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 265.746154][ T7510] Call Trace: [ 265.749288][ T7510] dump_stack_lvl+0x1e2/0x24b [ 265.753801][ T7510] ? bfq_pos_tree_add_move+0x43b/0x43b [ 265.759095][ T7510] ? kasan_check_range+0x82/0x2a0 [ 265.763947][ T7510] dump_stack+0x15/0x17 [ 265.767939][ T7510] should_fail+0x3c6/0x510 [ 265.772193][ T7510] should_fail_usercopy+0x1a/0x20 [ 265.777048][ T7510] _copy_from_user+0x20/0xd0 [ 265.781478][ T7510] kstrtouint_from_user+0xca/0x2a0 [ 265.786424][ T7510] ? kstrtol_from_user+0x310/0x310 [ 265.791377][ T7510] ? avc_policy_seqno+0x4a/0x70 [ 265.796061][ T7510] proc_fail_nth_write+0xa6/0x290 [ 265.800921][ T7510] ? security_file_permission+0x7b/0xb0 [ 265.806299][ T7510] ? proc_fail_nth_read+0x210/0x210 [ 265.811339][ T7510] ? security_file_permission+0x86/0xb0 [ 265.816717][ T7510] ? rw_verify_area+0x1c3/0x360 [ 265.821530][ T7510] ? proc_fail_nth_read+0x210/0x210 [ 265.826558][ T7510] vfs_write+0x36a/0xe70 [ 265.830637][ T7510] ? sched_clock_cpu+0x1b/0x3b0 [ 265.835335][ T7510] ? kernel_write+0x3d0/0x3d0 [ 265.839838][ T7510] ? __irq_exit_rcu+0x40/0x150 [ 265.844436][ T7510] ? irq_exit_rcu+0x9/0x10 [ 265.848687][ T7510] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 265.854328][ T7510] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 265.860324][ T7510] ksys_write+0x199/0x2c0 [ 265.864498][ T7510] ? bpf_trace_run1+0x210/0x210 [ 265.869179][ T7510] ? __ia32_sys_read+0x90/0x90 [ 265.873789][ T7510] ? __bpf_trace_sys_enter+0x62/0x70 [ 265.878891][ T7510] __x64_sys_write+0x7b/0x90 [ 265.883317][ T7510] do_syscall_64+0x34/0x70 [ 265.887577][ T7510] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 265.893298][ T7510] RIP: 0033:0x7fb0afbe12ff [ 265.897555][ T7510] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 265.917347][ T7510] RSP: 002b:00007fb0ae25b030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 265.925585][ T7510] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb0afbe12ff [ 265.933568][ T7510] RDX: 0000000000000001 RSI: 00007fb0ae25b0a0 RDI: 0000000000000007 [ 265.941377][ T7510] RBP: 00007fb0ae25b090 R08: 0000000000000000 R09: 0000000000000000 [ 265.949185][ T7510] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 265.957001][ T7510] R13: 0000000000000000 R14: 00007fb0afd99fa0 R15: 00007fff46a72298 [ 267.298026][ T7518] device syzkaller0 entered promiscuous mode [ 267.337009][ T7525] device veth0_vlan left promiscuous mode [ 267.355195][ T7525] device veth0_vlan entered promiscuous mode [ 267.382297][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.400820][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.441873][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.723380][ T7618] device pim6reg1 entered promiscuous mode [ 268.837994][ T7628] device veth0_vlan left promiscuous mode [ 268.868955][ T7628] device veth0_vlan entered promiscuous mode [ 270.259027][ T7668] device pim6reg1 entered promiscuous mode [ 271.000297][ T7716] device veth1_macvtap left promiscuous mode [ 271.016722][ T7716] device macsec0 left promiscuous mode [ 271.089738][ T7716] device veth1_macvtap entered promiscuous mode [ 271.146852][ T7716] device macsec0 entered promiscuous mode [ 273.910172][ T7812] device veth1_macvtap left promiscuous mode [ 274.007003][ T7812] device macsec0 left promiscuous mode [ 282.026671][ T8013] device wg2 left promiscuous mode [ 283.758704][ T8081] device sit0 left promiscuous mode [ 283.839226][ T8081] device sit0 entered promiscuous mode [ 289.994743][ T8218] device syzkaller0 entered promiscuous mode [ 290.393070][ T8234] GPL: port 1(erspan0) entered blocking state [ 290.430197][ T8234] GPL: port 1(erspan0) entered disabled state [ 290.483746][ T8234] device erspan0 entered promiscuous mode [ 290.637284][ T8238] device erspan0 left promiscuous mode [ 290.653568][ T8238] GPL: port 1(erspan0) entered disabled state [ 292.302267][ T8277] GPL: port 1(erspan0) entered blocking state [ 292.308454][ T8277] GPL: port 1(erspan0) entered disabled state [ 292.314625][ T8277] device erspan0 entered promiscuous mode [ 292.366254][ T8277] device erspan0 left promiscuous mode [ 292.371727][ T8277] GPL: port 1(erspan0) entered disabled state [ 296.991354][ T8405] device syzkaller0 entered promiscuous mode [ 297.064017][ T8410] device pim6reg1 entered promiscuous mode [ 301.399567][ T8532] device pim6reg1 entered promiscuous mode [ 301.678613][ T8544] device veth0_vlan left promiscuous mode [ 301.684516][ T8544] device veth0_vlan entered promiscuous mode [ 301.714025][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.725667][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.743112][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 302.150836][ T8555] device sit0 left promiscuous mode [ 302.481399][ T8560] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.519514][ T8560] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.536957][ T8560] device bridge_slave_0 entered promiscuous mode [ 302.543969][ T8560] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.550964][ T8560] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.558742][ T8560] device bridge_slave_1 entered promiscuous mode [ 302.794859][ T8580] device syzkaller0 entered promiscuous mode [ 302.844258][ T8583] device veth0_vlan left promiscuous mode [ 302.875688][ T8583] device veth0_vlan entered promiscuous mode [ 302.947829][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 302.965154][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 302.986131][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 303.176853][ T8602] syz.5.2941[8602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.179860][ T8602] syz.5.2941[8602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.214664][ T8593] device syzkaller0 entered promiscuous mode [ 303.683295][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.696876][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.737537][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.756779][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.786320][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.793245][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.828870][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.854379][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.880069][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.886966][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.932769][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.957671][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 303.982035][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.023259][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 304.044732][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.070961][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 304.094128][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.122600][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.132271][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.151368][ T8560] device veth0_vlan entered promiscuous mode [ 304.192124][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 304.203542][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 304.223668][ T8560] device veth1_macvtap entered promiscuous mode [ 304.247896][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 304.265473][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 304.296780][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 304.386531][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 304.476780][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 304.691335][ T389] device veth1_macvtap left promiscuous mode [ 306.231405][ T8673] device veth0_vlan left promiscuous mode [ 306.272865][ T8673] device veth0_vlan entered promiscuous mode [ 306.340455][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.349838][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 306.366505][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 306.605183][ T8686] device veth0_vlan left promiscuous mode [ 306.617291][ T8686] device veth0_vlan entered promiscuous mode [ 307.916483][ T8747] device macsec0 left promiscuous mode SYZFAIL: repeatedly failed to execute the program proc=6 req=3002 state=1 status=7 (errno 9: Bad file descriptor) [ 309.827328][ T49] device bridge_slave_1 left promiscuous mode [ 309.833274][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.840595][ T49] device bridge_slave_0 left promiscuous mode [ 309.846631][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.855016][ T49] device veth1_macvtap left promiscuous mode [ 309.860927][ T49] device veth0_vlan left promiscuous mode [ 309.866662][ T49] device veth1_macvtap left promiscuous mode [ 311.957787][ T49] device bridge_slave_1 left promiscuous mode [ 311.963715][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.971154][ T49] device bridge_slave_0 left promiscuous mode [ 311.977173][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.985023][ T49] device veth0_vlan left promiscuous mode [ 311.990824][ T49] device veth1_macvtap left promiscuous mode [ 311.996671][ T49] device veth0_vlan left promiscuous mode