last executing test programs: 57.342495035s ago: executing program 0 (id=4329): r0 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r0, 0x12) r1 = syz_clone(0x80000000, &(0x7f0000000040)="0a63196a50239196151b013629529d4b108ab725a412d9b9c1fcd265e58b52b262554ffcb2d90e508da0496b10cd0c4bbd842abcf7b9c90f337b7ed08e68785d855d95d5d880cb2f95ed1530f254169c07fc27070a673ba66640753bf2dbd3e3889e44a82245853a064b17df6ea6a1a12bf17a62d52d8dbdcf264a2a854eebc534b6975e198f934b9a46a2dde771665794499e513454386afd7df8e9d71ebf7606167a03dae3c97eb40b73c7f07c497643c75d432dc811b33e1cf28ae0a7339101f482c6b6b340656b401f956cf5ffccee927731d48477ffbf3e3abb368b1a0b71aa4b51cea9638391bde49762ce24bbdbc5e0", 0xf3, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="646b7010ae4a47f23e1801dc8cb3e9b581c31991688bfd3d0a3100b667c640415dce8af06031bccc396e60a82b87a2aea5ad8f086c4b6832f932f3ef0f69bae02de768f120341c1d7b69b7216e317db0d2b0f63f62ebc2bc03") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r1, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000240)='..:\\\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) (async) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f0000000340), 0x2, 0x0) (async, rerun: 32) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380)=r0, 0x12) (rerun: 32) r4 = openat$cgroup_procs(r3, &(0x7f00000003c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000400)=r1, 0x12) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r6 = syz_clone(0x10000000, &(0x7f0000000740)="4f7be6bcacea00b928c56db739c5d107aa4ae6b37e5eb48a5a87a552ec59da133c083bec9fc97b278e913dbf99553eaa6fbf5f07e63a6d8be6f0b1ee410df313d537a3c9086be2fcfd116aba425020020d1c5011a32dfb888255039a0c00c89dbe2c861410506cc571ae66ea7121569e815f49c806655e66e2a9dd948f28253b55422db679", 0x85, &(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)="98f89eca702f534116a55e5764aa5af45ca2ba499b1440e7f40f79c5f918b5cf20d8ef76aa84028e929e5bd752fa2583d14366ad72891922d808a567311262cde5f9a4571fa1d95eead822c84c63e5ace676f74860108aa8f61d8dceaa170277ee8e11af9f940d03d037933e48b52b9c06f355643ddcc13ff2eb10ddec362d6a79f51b5a74a8d7f9f598ab7ad5ca8e1ddbf4fbb06916e19d1df9f6af92ee3d28ad09f07ff51ecfb639377ed7b6dae273366a0183c5a92023d7477efbc705dc9cfcc99086834b0b7b411128f26c96a5762c00fd29c15acd4a9838ca5a4bda6bca7fe86c7868651e8d9774d989dd") (async, rerun: 32) r7 = syz_clone(0x1002000, &(0x7f0000000980)="6e2e9d68b9b76a3a69847fce4b926d5cb0e6b927688d6d6cdc51e0766764cdcfbbd003e300e896fbf44a9c1e4cefeda357e94061715948805c2bc8bbc6f34a5c471fb05d873d36eb479c1bf75b7863ce147f8ee9f43ae0e9a4460b60e84a20099e2593c3867edbd9539479023f4474303a981d10280d4bb5ad6278b15e083e953c6b881779897323b642f547d076f128722aeaaf5ca6a7b5f930afb8872cabb0f256f62b4a9691fae2e92c1cd51e7a1a49a016911b3f", 0xb6, &(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)="3a31853a2d0b661190cbbdf7e59f56965f9ef26eb463872bd4f4e31e7ed8a98ff525078ebf65c13f32c99fafc529a7796e97eac8911269713ccc52b88d09c1fa6adb5b59b7b086e0918e2944bc0163") (rerun: 32) socketpair(0x1f, 0x80000, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r9 = perf_event_open(&(0x7f0000000b80)={0x5, 0x80, 0x0, 0x80, 0xd, 0xf0, 0x0, 0x3, 0x10, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x200, 0xe2}, 0x3, 0x4, 0x100, 0x0, 0x8, 0x6, 0x9, 0x0, 0xe}, r1, 0xa, 0xffffffffffffffff, 0x1) r10 = getpid() sendmsg$unix(r5, &(0x7f0000000cc0)={&(0x7f0000000480)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000500)="141ab011e53684a32d2db149994e362059d9ad670d1d0d3914c607e5efad1b6e3b649f39eb848f4c3d0cfa326d6678ac58635e2b94fd73b135cd95d60f8d4dd12e0d3bc320e38b0000f5b20c6227d20aaceffd5f4c3e14f38054e96cc1e6f4de6e8c08278a81c1939ea199e996309787d2040b52172e135cffef0ee132db3ad3eafc5ea7d84bf24c64ac3bbfcaf87e96f74fcbe25d5f2441cf7aed43a9bb4273f188e986cd999d0e3b67fef5628f3ea995d25cca6e4dfe53bbc9cc9c0b4904ff18579f8af97735bc3efb", 0xca}, {&(0x7f0000000600)="8460ea2365cb118cced61a5d56e937b8ebc560caad49203b3dba04c33ec4d88f0c41e7c59b58ee90cc669db6cba8c50a43d0a0e213a0871aec87c35a60058f0f8f222c9049d1476ffec518eec874542781c09d77ee234bb8417145a4114400cec7cbdbe5417b193dc66858cbf1176ef95de2c1229b2abb6ec1c6856474ea8861ef3480632f02be8ad697cc666c36d1a1cf1cd1d69b81759121c28bf340", 0x9d}, {&(0x7f00000006c0)="f7720eeae0365378592a2417305f7e80f8febc43adc9ec6471937ecd0f9d5928251953d4c68812", 0x27}], 0x3, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [r2, r3, r8, r9]}}, @rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xee00}}}], 0xb8, 0x200040c4}, 0x4800) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r11, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000d40)={0x1, 0x80, 0x2, 0x1, 0x5, 0x4, 0x0, 0x262, 0x8001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @perf_config_ext={0x3, 0xfffffffffffffffa}, 0x0, 0x8001, 0x6, 0x4, 0x7e3, 0x0, 0x4, 0x0, 0xd3, 0x0, 0xf4}, r0, 0x9, r9, 0x3) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e40)={{0x1, 0xffffffffffffffff}, &(0x7f0000000dc0), &(0x7f0000000e00)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000f00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000e80), &(0x7f0000000ec0)}, 0x20) (async) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000f40)={0x0, 0x1, 0x20}, 0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001400)={0xffffffffffffffff, 0xe0, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000001180)=[0x0], &(0x7f00000011c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x97, &(0x7f0000001200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001240), &(0x7f0000001280), 0x8, 0x1e, 0x8, 0x8, &(0x7f00000012c0)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0x15, &(0x7f0000000f80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r12}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x5, 0x1, 0x0, r14}]}, &(0x7f0000001040)='syzkaller\x00', 0xfa09, 0x89, &(0x7f0000001080)=""/137, 0x41000, 0x41, '\x00', r15, 0x0, r4, 0x8, &(0x7f0000001440)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001480)={0x3, 0xe, 0xa, 0x5}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000014c0)=[{0x5, 0x1, 0xb, 0x3}], 0x10, 0x40}, 0x94) (async) r16 = openat$tun(0xffffffffffffff9c, &(0x7f00000015c0), 0x900, 0x0) ioctl$TUNGETFILTER(r16, 0x801054db, &(0x7f0000001600)=""/4096) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002600)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async, rerun: 64) syz_open_procfs$namespace(r10, &(0x7f0000002640)='ns/pid_for_children\x00') (async, rerun: 64) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002680)={0x2, 0x4, 0x8, 0x1, 0x80, r12, 0x7df, '\x00', r15, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x50) 57.259086952s ago: executing program 0 (id=4334): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0500"/18, @ANYRES32=0x0, @ANYRES32], 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r4, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000140)=@raw=[@generic={0x0, 0x8, 0x0, 0x0, 0x2}], &(0x7f0000000180)='syzkaller\x00', 0x1000, 0xc1, &(0x7f00000001c0)=""/193, 0x40f00, 0x19, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x9, 0x2, 0x6}, 0x10, r5, 0x0, 0x2, &(0x7f0000000580)=[r1, r1, r2], &(0x7f00000005c0)=[{0x4, 0x5, 0xc, 0x1}, {0x5, 0x2, 0x7, 0x1}], 0x10, 0x8}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) (async, rerun: 64) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 64) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000006c0), 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6307e08102030000fe0ea66718330200975a65789ff57b0000000000"], 0xfdef) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r10, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7020000010000e1850000008600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000940), &(0x7f0000000980)='%pB \x00'}, 0x20) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000700000009"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xd, 0x3, 0x4, 0xfffff6e6, 0x0, r13}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x1a, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x80000000}, {}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000380)='syzkaller\x00', 0x1ae, 0x68, &(0x7f0000000880)=""/104, 0x41000, 0x43, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000500)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x3, 0x7ff, 0x1}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000a00)=[0x1, r2, r8, r0, r12, r13, r1, r0, r0], &(0x7f0000000a40)=[{0x5, 0x3, 0xd, 0x2}, {0x0, 0x3, 0xd, 0x6}, {0x1, 0x4, 0x8}, {0x0, 0x2, 0xb, 0x8}, {0x5, 0x4, 0x7, 0x7}, {0x3, 0x3, 0xe, 0x4}], 0x10, 0x101}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0xff90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) (rerun: 32) 57.096819297s ago: executing program 0 (id=4340): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000100000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={&(0x7f0000000000)="c8b36ea036095a2d5286c92257464c883da076bcc94ab5eb411e7920240286a07bae23d1250d7538d3f51a3b137d69b22f353540d5ebbb3c4ec5a0013f06eed766b6037dd56a174628a2ca78cb5e187a69697a312ce610c49bb92ce385e05602a37b1d936faeec9b99e7f40d03b3541befaab116f438f7907d36d397724e62943924966be63e215d0033c0dc040ea1246796dd5a33dae4c1c393b3f8ecc77d964fb7ebf3e914c6a84fc921f5c56b6aa1e7eed82b5d7caf290b24ece0b5c78ab42e7f6c6cc142c450c55606526263cae62977ca989b33c099cba63a593b351a336a40", &(0x7f0000000100)=""/7, &(0x7f0000000140)="d21a859a8f8bb86cbc9f5e76b2f4bc30cd6d2bd396ce55f5a56ea0e046c7f6765482c8a31e0d8b6cd7b1ce401f3ea645adaff402ef477acac2f428cdfd7113f0f660f3f2bbf61eea58edec0d5a76123b5299a62bbeb5ef28bf73673372beff5c1063d03bf3a52d51a839ca0a4ea0dc1d1c4157a116afc67ce6936e", &(0x7f00000001c0)="d7e3d70f1235f5f6ff0a87537fa2770747a23a2941f5fa570398f5dfb0d484fdd24d478d28d2f13e8ad852231489d8962c88258f629eb1a5e281beb08add1a315365cbb326002d9a35aa37ff3e4e0ef09fe767ee9be9a3355f506615ad8e915ef0bc141287acbe5a740db32091f516924e2e1e248df5989050235891e87e1fbd68f3cce5dacb34c834008d1c67c3612059014a475a972f8cacf65fc87e4d8de70c9d938621b93a755bac9661b21b169c7718f2adc76a00010a459a1d8f7a1dd28b43903ab7017426e79ef44555bc8dc344fe96e4a51f296ca95791844c6936b48353095dfe889e12805456b07dff5d21", 0xc7d, r0}, 0x38) 56.908067514s ago: executing program 0 (id=4346): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000400000004000000ffff010000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000074a4a95c55f176d42a84b8478f40b83604e7ca267906ea0123e3", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r1}, 0x38) socketpair(0x1, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}], 0x18}, 0x4008004) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 55.954760699s ago: executing program 0 (id=4362): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000300), 0x2, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x40, 0x2, 0x5, 0x89, 0x0, 0x5, 0x20060, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffff612, 0x2, @perf_config_ext={0x0, 0x2}, 0x2080, 0x0, 0xe0, 0x5, 0x9, 0x200, 0x9, 0x0, 0xcaaa}, 0x0, 0x5, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={0x0, 0x2}, 0x4000, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[], &(0x7f0000000040)=""/249, 0x46, 0xf9, 0x6}, 0x28) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r7) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1ff, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffffffffffc, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xa, [@fwd={0x8}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @var={0x1, 0x0, 0x0, 0xe, 0x4}, @typedef={0x1, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000004c0)=""/204, 0x56, 0xcc, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r8, &(0x7f00000002c0)="79c5b6ce0810720dcfdba817bd5a1f7ea2b651ffa093362540abc2a4c7c97f2ebfe77aa940ec45725a26911de8f7121eeb52feb6763475d8ef96997a95bbbc558a923d511d6e37", 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b408000000000000611028000000000045000000000000049500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x22) syz_clone(0x4001000, 0x0, 0x408, &(0x7f0000000140), 0x0, 0x0) 54.58812021s ago: executing program 0 (id=4374): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071194200000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x442, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000006000000850000002a000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x13, 0x8, 0x4, 0x0, 0x2400, 0x1}, 0x48) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="1100000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="ae4fe05955c255ba16d8ff1bbcea1b2c61ce42c308c0c2e0233bc95a01dd74d00c0aaa0cc125f5066f0b85df20b8eeaf6a38b19d80bd51ad8a105ccd7339113c4309529bc38b225dfcb2fb641ecdfbb0a84bb0d55e8b03b95b94d73417a377937abadd9a6586f44a70735c7df66bfedbb6310af25cc6fff5f4c7be19300465f14de17bb2cdbedb0000078e3e4ff8cf8f8508bb7cd57bb1f7e02f69ceda1b7ff26ede596342e435d99ed52ba4d6bad2ceb980fc", @ANYRES64=0x0], 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r3, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)=r0}, 0x20) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x6, 0x1e, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @call={0x85, 0x0, 0x0, 0x12}, @map_fd={0x18, 0x1, 0x1, 0x0, r5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @ldst={0x0, 0x2, 0x1, 0x4, 0x5, 0xfffffffffffffff4, 0xfffffffffffffffc}, @generic={0x9, 0x3, 0x6, 0x10, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, 0x25, r6, 0x8, &(0x7f0000000a80)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000b40)={0x5, 0x5, 0xfffffc01}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000b80)=[0xffffffffffffffff, r3, r4, r5, r5, r3, r2, r4, r2], &(0x7f0000000bc0)=[{0x5, 0x4, 0x0, 0xc}, {0x4, 0x2, 0x2, 0x4}, {0x1, 0x3, 0xe, 0x9}, {0x0, 0x2, 0xb, 0x3}], 0x10, 0x7}, 0x94) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x80}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1c, 0x27, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000800000000000000c80e00001854000008000000000000000000000018180000", @ANYRES32, @ANYBLOB="000000000000000004430104e207000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000004310000fbffffff85100000ffffffff18000000010000800000000010000000b7080000000000007b8af8ff00000000b70800000080ffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000018110000", @ANYRES32=r5, @ANYBLOB="00000000ff00000000bfa200000000000007020000f8ffffffb703000008000000d9b5ffff9500000000000000b7e8b07fec7e8001df92f7f3219fea7b5ac18ed4a1438c092f34c79c738bbd7ab2d18409822e62438dfbcaf0097b44b4668ef81b7aaf9d1f0e79ad4d9e083dd8b20da619b160908ff363a3a0229d03bd95c7c995f57126abb0280676c6e48c56f570cdbcca93a40dc05b10b2ba756fda439c025a0c9c108f2a271a79b2e7367852e81e7dc159a22d57d241129e947d1a25224048cb8efd6ad170c9fe8e97a3e876925ee32cf67d35e970c681f64137d3f4b284feddf484a78c51bee889e7ccb6889ff51b3c8c502a918f9ec5939c814a6b9a4cc98eb55f0d35f1fa00"/276], &(0x7f0000000340)='GPL\x00', 0x9, 0x62, &(0x7f0000000380)=""/98, 0x41000, 0x12, '\x00', 0x0, @fallback=0x11, r7, 0x8, &(0x7f0000000500)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x2, 0x0, &(0x7f0000000540)=[{0x5, 0x1, 0x4, 0xb}, {0x3, 0x4, 0xb, 0xa}], 0x10, 0xffffffff}, 0x94) 39.568815581s ago: executing program 32 (id=4374): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071194200000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x442, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000006000000850000002a000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x13, 0x8, 0x4, 0x0, 0x2400, 0x1}, 0x48) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="1100000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="ae4fe05955c255ba16d8ff1bbcea1b2c61ce42c308c0c2e0233bc95a01dd74d00c0aaa0cc125f5066f0b85df20b8eeaf6a38b19d80bd51ad8a105ccd7339113c4309529bc38b225dfcb2fb641ecdfbb0a84bb0d55e8b03b95b94d73417a377937abadd9a6586f44a70735c7df66bfedbb6310af25cc6fff5f4c7be19300465f14de17bb2cdbedb0000078e3e4ff8cf8f8508bb7cd57bb1f7e02f69ceda1b7ff26ede596342e435d99ed52ba4d6bad2ceb980fc", @ANYRES64=0x0], 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r3, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)=r0}, 0x20) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x6, 0x1e, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @call={0x85, 0x0, 0x0, 0x12}, @map_fd={0x18, 0x1, 0x1, 0x0, r5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x3}, @func, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @ldst={0x0, 0x2, 0x1, 0x4, 0x5, 0xfffffffffffffff4, 0xfffffffffffffffc}, @generic={0x9, 0x3, 0x6, 0x10, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, 0x25, r6, 0x8, &(0x7f0000000a80)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000b40)={0x5, 0x5, 0xfffffc01}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000b80)=[0xffffffffffffffff, r3, r4, r5, r5, r3, r2, r4, r2], &(0x7f0000000bc0)=[{0x5, 0x4, 0x0, 0xc}, {0x4, 0x2, 0x2, 0x4}, {0x1, 0x3, 0xe, 0x9}, {0x0, 0x2, 0xb, 0x3}], 0x10, 0x7}, 0x94) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x80}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1c, 0x27, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000800000000000000c80e00001854000008000000000000000000000018180000", @ANYRES32, @ANYBLOB="000000000000000004430104e207000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000004310000fbffffff85100000ffffffff18000000010000800000000010000000b7080000000000007b8af8ff00000000b70800000080ffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000018110000", @ANYRES32=r5, @ANYBLOB="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"/276], &(0x7f0000000340)='GPL\x00', 0x9, 0x62, &(0x7f0000000380)=""/98, 0x41000, 0x12, '\x00', 0x0, @fallback=0x11, r7, 0x8, &(0x7f0000000500)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x2, 0x0, &(0x7f0000000540)=[{0x5, 0x1, 0x4, 0xb}, {0x3, 0x4, 0xb, 0xa}], 0x10, 0xffffffff}, 0x94) 2.135204111s ago: executing program 4 (id=5151): r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x4, 0x8, 0x7}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000400008500000001000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000000c0)={r2}, 0xc) r3 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYRES16=r0], &(0x7f0000000040)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x51, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ffffffd}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001180)=@generic={&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x10020, 0x0, 0xffff, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x16, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x53}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001080)={r3, 0xe0, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000e40)=[0x0, 0x0, 0x0], 0x0, 0x78, &(0x7f0000000e80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000ec0), &(0x7f0000000f00), 0x8, 0x3e, 0x8, 0x8, &(0x7f0000000f40)}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000010c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001100)={0x1b, 0x0, 0x0, 0x6, 0x0, r1, 0x220, '\x00', r6, r7, 0x3, 0x5, 0x2}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xfe, 0x10000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x6}, 0x2c) 2.078388656s ago: executing program 5 (id=5153): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x14, 0x4, 0x4, 0x143, 0x1014}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="6110a100000000006113740000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369226066812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20ceddf4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e14d90deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b06ff7f0000000000007f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a1f37302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089e0b1c23c0f3cdad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a1a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631d22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4c6ea9604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a09d8be0fc5beecf153236c19740be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c7476"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) 1.992490553s ago: executing program 5 (id=5155): bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x14d, 0x0, &(0x7f00000009c0)="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", 0x0, 0x2, 0x0, 0x8}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x6, 0x0, 0x0, 0x9, 0x0, 0x5, 0x8000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x177614136ee9e9a, @perf_config_ext={0xfff, 0x1c00000000000000}, 0xc124, 0x5, 0x4003, 0x7, 0x0, 0x3ff, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000005c0)={r4, 0x0, 0x6c, 0x0, &(0x7f0000000300)="8203d5332873613d9c13f861dd7b4e0d248629e44d43deae57185f518f6e410d1d1b336312eafcd6aee02ba1b572d960ee1ff02b5dc54efb24d9cfad098e8cc5ac00ec558cd77608eeaad4309840c2cdb8954450062c3df3585f8c34c4ecde96e7fb883d36a15ca0a5a34e67", 0x0, 0x6, 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x2, 0x0, 0x8699}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000006c0)=ANY=[], 0xcfa4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2a, &(0x7f0000000100)=r6, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000140)="5a3fcc1391b6", 0x6}], 0x1}, 0x200080c4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000060000009500"/24], &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0300000004000000040000000a006d0000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r12}, &(0x7f0000000280), &(0x7f0000000240)=r9}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="1808864abf67024d70926f000000004000000000000000000018120000", @ANYRES8=r8, @ANYRESOCT=r6], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f00000000c0)=r9, 0x4) sendmsg$inet(r11, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) recvmsg(r7, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x1, 0x0, 0xd66}, 0x0) close(0x4) 1.938080128s ago: executing program 4 (id=5157): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000080)=ANY=[@ANYBLOB="18060000000004000000000000000000181200004cd02c9b69df989a53575477056d32aa1134f097d1e40051f1dc2884d791bd8e86b348a3", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b707000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYBLOB, @ANYBLOB], 0x50) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYBLOB="d5bb3fbd449443f4ae4646465781ad08c8c770aaea532e0803fb9b1aaf437f1e0899c22613e0f48110f54ce6e79d3025e9ff8795e15691f9578949d31fec56dddcd6", @ANYRESOCT=r1], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x6, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1000000004000000080000000200000000000000", @ANYRES32=0x1, @ANYBLOB="a6b68e7100352e75b9e500009305cf3dffffffffffe800000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r4, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000180)=0x5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x30}}, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r4}, &(0x7f00000002c0), &(0x7f0000000300)=r3}, 0x20) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0xc8494430d02e4083, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000240)={0x2, &(0x7f0000000100)=[{0x30, 0x7f, 0x86, 0xfffff010}, {0x6, 0xfd, 0x0, 0xfffffdff}]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000011000000150000000000000045000000e01eea5e9500010000000000"], &(0x7f0000000140)='GPL\x00', 0x8, 0x8c, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x23) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x8, 0x3, 0x8, 0x1400, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0xc}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r8, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)=r7}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xf, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8000}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000023000000000000000000f90018110000", @ANYRES32=r13, @ANYRES64=r9, @ANYRES32=r13, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000005000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(r12, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) write$cgroup_subtree(r14, &(0x7f0000000000), 0x15) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b000000000000000000000081e2000000000000", @ANYRES32=r1, @ANYBLOB="460300"/20, @ANYRES32=r11, @ANYRES32, @ANYBLOB="05000000030000000200"/28], 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', r11, r14, 0x4, 0x3, 0x2}, 0x50) 1.893066032s ago: executing program 1 (id=5159): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000070000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000800000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0x200000000000028b, &(0x7f0000000680)=ANY=[@ANYRESDEC=r4, @ANYRESDEC=r3, @ANYBLOB="f1539a57942088199c3022d19f45890f17a519bd379ddae8fab6dd21bf611edb09e13a7edf61f1cd91c1c34ba7456a37a4f92648d873291e2cd1f78eeab4c3593e8c4531f392aafd984ea56b10cbffc785515276c11f4e8828bb5123dccc", @ANYRES64=r2, @ANYRESDEC=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x88) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000180)=0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000080000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000005, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x11540}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) 1.717679958s ago: executing program 3 (id=5161): openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r1}, &(0x7f00000002c0), &(0x7f0000000300)='%pS \x00'}, 0x20) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r3, 0x0, 0x0}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 1.716130968s ago: executing program 4 (id=5162): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x5b}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004000000000000657987aa9e8db031044e1a3d0d13a536ae20a811a929c9c4de11f79ed4a1568d1e0f19"], 0x0, 0x26}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x7) socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x1, 0x5}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000010400)={0x11, 0x14, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r8}, 0xc) ioctl$SIOCSIFHWADDR(r6, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0x4000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r10, 0x4) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x17, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1ff}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@alu={0x7, 0x0, 0x9, 0x0, 0x8, 0x18, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ldst={0x3, 0x2, 0x2, 0x0, 0x0, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000700)='syzkaller\x00', 0x8, 0x22, &(0x7f0000000740)=""/34, 0x41000, 0x8, '\x00', r9, 0x0, r11, 0x8, &(0x7f0000000780)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x6, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000800)=[r2, 0x1], &(0x7f0000000840)=[{0x5, 0x5, 0x10, 0x5}, {0x0, 0x3, 0xd, 0xb}, {0x0, 0x4, 0x0, 0x9}], 0x10, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1b, 0x1, &(0x7f0000000080)=@raw=[@ldst={0x2, 0x2, 0x3, 0x8, 0x7, 0x50, 0x10}], &(0x7f00000000c0)='syzkaller\x00', 0x41, 0x9f, &(0x7f0000000100)=""/159, 0x40f00, 0x17, '\x00', r1, @fallback=0x38, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r10, r0, 0x0, &(0x7f0000000540)=[r12], 0x0, 0x10, 0xb}, 0x94) 1.714490028s ago: executing program 1 (id=5163): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000001340)=@framed={{}, [@printk={@lx, {}, {}, {}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x5}, {}, {0x85, 0x0, 0x0, 0x73}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x71d, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x50) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000d80)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x79, 0x0, 0x0, 0x87}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfa8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x5, 0x0, 0x9, 0xa}]}, &(0x7f0000000d40)='GPL\x00', 0x2, 0xe2, &(0x7f0000000340)=""/226}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="12000000040000000800000002"], 0x50) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0b00000005000000010001000a00000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000003000000000000000040000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000005000000850000000600000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r4}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000003c0), &(0x7f00000003c0)="b7790d7363831b023e7efe197950f26de128b984ac21", 0x3, r6}, 0x38) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000180)=r7, 0x4) sendmsg$inet(r9, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r11, &(0x7f0000000840)={&(0x7f0000000940)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000cc0)=[{&(0x7f0000000a00)="35b51e4a7d441fb4b603f93a303680b86cd013253b5450a59eae2959676fe0ce3914894b66c6a90041f06b3af71949e47510c1621907493ca0c7782af691f7be30f6d27cd9d1ebc87dbc8c1945c058cbcaf93ef8a4ee29b6f1ca0a65fa95b6ee8b673ad2310f310b93f2a589ec1eda54066753641275131591d33f407dde35632ac1ec14b449aaab75eb21fab4f93b79d003b22cd610a8249bdec8d944e7863203146ca938af2e02559adf58a620918b33a94f9dd7c83db8c7fb706706e9056d117b", 0xc2}, {&(0x7f00000013c0)="9623a0f75f74523fc55f6ba7f0cd67374562678669eaf7cc56f28623544e6d583db50bf55617b928d9030a84570a62c8461b6cab58282f45d206063af14ff27052754fb0b7822fd189d56ce81ea0ceb2fd1e2a69c065030a263617aeb7163d12b1c7f97469797d4eee64c5c19a41b06a16a9c9a74212792947230a43f3e5bcff26891207f023e56b577c01900fd66d4c3873a097749044ca44a9bd8d25171e2188811c911267ee8f4d253a2a6514ea242adbaed978d0c7f7be4503fcf42ec08e4dec614a3c58945695dfcd7edf3a20a99db569edb09ae52689003cb2ce7d0d4b9df3e4237e7baa01341c65dee0901bd9736077221b452e24b692a7470929438a91f499a7d2b078de795a9c4c87771ef021890bb3769524fa7927771f9254407fbbd4830efa750a5ce46def5e0802f565dcb0fdaaf97b6887ccc1f635e04870288113f0f3be6b3261de1db7a24f699042990595ed3e6cc2ac284009dd0874c20b2ec89bcc6cb23deb0ee657b84dbe03cf01b810b9aef55b4fce3f90d32c649bf47aa57ce12ab3b0ddb74ffefbbb1dc9f9cfb21996ebe7a99cbf19b2b6af5953b26ced2aa491aec07a4bfd158da14a5373712d20caba6bce5d701b5e4fb4b17bb1ce2b1d9f45b3c8e141a2bb14be5647c7d7898c28c2664f254d5410c3505b13f19466332679cadfa57e55cb35f0c622fc7454e5af2de3753fb823a8cc19b2c12b0a7ef469c7a5324cff0a990f9b6d3bb89da7856ce7132d5713dd855d389c2b679bccfef6d570491d35f3f77bd1bf2b5027df7061d7d3b9f1e3177003cab23aa494de06988a5122881857f49f857d20396539dbec6326721b674b2f33ede63d276639fdf46290ac880c93e8f9aa6fab076d964f04b6637f93de9409ab07bb1641840dae67d1681d3453d8c3e7dd8f2de10fe651d40a5af882e3bd89ef4bae8e1b6f1e63d0181bb833722b01d0577d0c51d09656eb0a95b8e7b062abcda4df5d053b6ba1894338babcc236dcf990651b925a97d25fb1bfdc0f054be6aef97a556e51ea917d4ca8d1a6a24fe41f99bea84c6535fea7b6bd94234f3be3f04d0fe7aa7d90e5f7161c73c265f34d0de103d7ec06b9586c3a8f9df09103078d3e5bfc88a5fef2c1c57b69c336e05b64985946c81d05b9af91ba96d31d72a5c5f8df0ac9430c02eedd81d5ed0e48f55194e68cae050c0122deb876d81bc09efdc9c807b12effe1ad9cdb04ec760397b7aa0bd75fb072ed738a868b26af83b27a4eeaef67dcf1a4497ac1c06400cdf212adfc21f2f182b8a7e239efe9f5490ea42f4eb8aef400d90f403cbbd7a09b60d958dcf02721040ca13ddbc8e0737b0909451a893b196c62c39e4780c6cd081af98ca7ae5fbe4b25507f9e8788fc5209095d2c599637d679fd13619c945e0347a2ccc37325216a807d65f54490bf54059478ed7114398fda8f567638df2165c9853ba18259d79d5aa063e47ae3dec34302be5cb5a61824589e200270de934c18c5e48623d4123127b42714a1b71746a3acbfac4adb2e512b337971601528e8a7958b1adc7f1d28bb30d253c18e10b6150e045611962df976c9c8100575e3b5cf396b0581a558b36bc8c0ca3218c9fb61d053d573722caf69c2e3d4a4c119a7ff8439793b17474c537c1d33b3a37b71d1bdc5e8a0b6d1f81a42f905c20841eae9932150881de8d0ed3c35b2582222cfce4dbf960357601ef96f32ea64d4745b75b379f022f7d1687019271ddb5f5ad7b422b5a2e8336c6cb2f6b99cd3da61c039e7998b0d697c88ab83570be48052e8f293505adfe344843b99991d28b7bcc1255d12853e41aa907ae5250e5ee941cc326d6498a6bec479269ed81da13c19bbbcd467daee0f3eeb840a5dfd1275297afb113f3af474bea4af735df9ba4406fc663d6a67f8af102cf8e2f00d95af500cd9f5a472c5590f0320d14c451626815ec4f712dc4318508566b05865019679eb420d95678e26a34a7530442a8d69f9255ff9299a9e9078e65efa7c79a7c133be6df86443437e234a3a30fdf320c1eb70c265a35196a6c2d21bf8fb6fddddc9e0e7b25c2902b61dca7d89183a9ece26b986795897f5b3c94d9283f6bd10135827d6c39e6958fee876b2eadae782db2c4dea621ed695dab525149530a886c9246f6469365139026a5697ebbf13e2841bb2c14b6f418100e75125797461fe9c32c5cb6a789cc058ae0d53182ca6d52bf15cc5bf1513f7650ae9caa53d5fa69e8e22c41a00c17026e6b7e8976bfa917179711cc8d5b35f16df3f211469a28a79990c91df2adb7c313febbc4e5929ecb6141a91149627cc9df76aa483b6c628f4eac4608353c7825b3ca82387b2c94394e391b02793b83ba158cbff9d45e6e1a5b09dd11fa57375cce1a319d76cdc8ed0aadb54f81340c361a7de7a0c83bf813178017fc6bcb4e8c3a0389be30900e5c192991a52b8dece5a6a88933e544b5268c98789da4fcc0a2162330f75589a7e2abb57ab0f3dd9809f4a3bf2d01e8d8afd4dfe0aaf4abf8d67d3d0680d9af2b1c8b30d0286b9be6f22d25792cd9d18350553eaff81e17298e21fe0c05763d83673f8a779445b9a9392c01f277a3607053003a57e7a61fd4664d2bce08342103a075fc80a5da50e2aedae913a40a34f7ae4596c046d23b496a49a1ad8ba329259473bbe69a364681d27c2b9d0e15db7122e824787f5ad3de590161d097da1580342afa699c75d42d6c047c0b28184c43f6d0edea3f061882df945073f5d96ff2be7a216da3c879e2385f9da850ae5018cdfdc83d0f96bd899d365c7b0c75299e5038f3df891a200cc384906e9f4480a975eacd5a7afba460572a5e0b9d768e2b44c8d2980b274ed5c8207c12d8cefff5bb1e8285010538057a4e9856cf0c33f4f766e0f64ad00e166503aeec9637c78cf7aa89bc05fafbb758cec50e1ab073ce65cbeda635819d726622fb263b61574ec8f9ace6b17aeb3987b09730a0161b8e3327ded089d51f7d8fc89e652102cc9da5e76c43140afdf119543467cfa5386d396961bb773aea5b57ef5c0944d1c302f8b0c0628e13f25c1cb3415d2fd8733e2048a48069c08a4a2ef7ae1c346dd47f7916574c19988ce68bd782f571e7b1635b8de2ba678a4c19f0d39661ca8ff2179c4f333f5041803cf6271b529df33d2b7a1f96d9867203775903d094a668d7b8ed0c8f0c04c58255b08e06d8e9bbd8c9f7af05dfc3b68f5e75d3da57dfebe498764e95e482626e9b93e26219999697ed0068d3d21635016e2fe826392f0b04570c877edd62062e8a50689d6d2d264613a6114c2ee783d7e16e0147f8f35f65aa5b0e347b5b22423f989953f28bb50939ea8e746dda8f12e52e3b7fc43288fecb63030889c525cde5eacccf2f4ed02de918d6c794aebff1e02e4edd6131a12898b2781969d99e54787d55eb618f72653a42733864a837cd3b781ea5b9009048c63e5aa09c2689a4f0974ac5a650657174f56596fd267a8b3bb174eb26ffa6df6fa8f24e398c92c3b653a2711214e3a5868b4825dd65a6d352a911c4196869646003ae8816345a406c88cae4786ebbf91bd3e7661b81e8f2fe6a3c993ee1260fcfaae58934e5ec496ef2c657c0314fee931297bc49bcfc4496fb219ac2b7e9bf55eac895d368c3beae947c6332ae48996480005707f79202e20ee0d72ca1bddfcc0e737bb72a8be42f0bcc0ce57f717aaa633da64fa2aa081a5014ac3cb17bbac4587d03756302949d23c6923ed0667df62254094359c33c22f999a96567166d1593a292cd8faa775aaee35ce811a57f9e54902e5eeb6710caab687c26c2d6c13e23ef59e9df937154ec0f5f45df1c2e8bfe1d2b2a61460724b935bff6b91d03176c51a8bb08147b949fe5dcbadc381418d90abdb56476ee2b95afabb5f3d7f69e474baab3f167f2e015fa7ef3e1eba794a8b82ef1d6cea47f5426d728d6433b62223b238fb40edf7ec5ed221b16a2996b5d9daff0cf21f63a329928125023577ad245c71c9b3d394ace168428b5f515396581a22c556c4b17b27511099b85f186610f1c6bcd79e7c37015c9b0e88a87c76b14534f6da9ea5a02e623ecd15419f0f8f91238a201459c0cc22e35d34968bb2d3c4f19aa6460b4755a0fb139d4bd8a7da1216b59785d8c9b86f6d69bad3a0336dfc17a41678bd55bf6dc4037874fcaac991b79813da6a953ff6af7ebdc10bbbca84d3478f278af806bd381dedde7818ef696f0403f3bf1e18854fec6d7062bfe23f6476b0a0499d36d570e5bf4c0c690f2748753c8ff6b7181112b38591239118fb052fbbe937b0ecbb37f843ab1d5ff4944558b7bbf3bba29dd279e57b820c7c9285a0a3f4a80f3b11421c1f612325d9bc73c9392d859dcb3bb3d0605b9d2c308133cb36e9fd26c922ffc921a5518d7fd97e67695d8c3d2a6ed8fc59491d56dd72a9e54b06851f01944bae6e84a22bcf459392ba708ed206ab6552cbfe72c88a542df24f6a840cd9784e62f82af5383c30fa7ed6912f530d88cbe09d3394d9ad4a9190d5c6a6c7d62b398846b694886b286fc06358697a168ec4bb1b221a2f852d8be23895806cdf03c1c73a6a06928c02db0470d8fac6622aaa3f85cc409d59849f0c38c62258b9aedbc1533fc99ce90f185f1d254b37d304568a3db931556bf415ffe64839ad3eda7d401f98736187b698fe66d038f8a6e11829ba2b6afe32a63b59b82a078717a108644917f24826084307e75c3ea76c06be069d61efb4d0b513ba381be7e098879af14fca4012e7dbc04a4b65ea5cceb8611d839aefdd106ff7ea51b152cfab9cfc3c2f0f6c4009156de9d243f3e4f22246b6d7053a7c05ce5185b21e14b76587d0688843ac9725fb1de0c5e31665751c03adb34bc14d525ef65142870c56a41e228340b699a5ca7407692e52fea7237139c130c32d45cd9f1e495f09f997dd545bd9fdba32aac1a8b8acf692564c8fc360f65ec61dda577d9d824b7c1f4f665d3e478b5d741ab06f393791118fdac726179694f372369900b32ed7db7b0ba59708cfff3a64fae7238c29d951de79a3ed583b012b543ee65afe2726f0c93eb5defe060733445a68a1ab3f4c77491f0c678e76d4acd6d4888b7ef3a730fa747dddec7e52a9cafedb192b4f4a2ed2fff1ab3a2082725b580dec0a7c348216d71805b0a4c9a0fae37256c7afa6456df56d7d16e1b8b21be9d38eb510de7b522ff5353e6617fb2a143978988ab337bbdff2195830c3256fdc1859c753c9c30adf8774e5255204d94127d0c660aecfc536c57d1a7bcd5e0c771773595370b472ff3c6e1fa746d3eefc8a6031d9baeddbff4342a727d86f83bdfeee9b07167a9f30c4dd25592153fe5a0a52fc73137acf2dd8313edb7a1f37216542000ffd37d8650501af5d4d287bde5e08c11787415691996a5324f11a6ae9287205c5bf5abdbd7d64b593a608bde040c15f6e0020b72b695f1e83d348d19dde07ade3056fd003cde828e1b59d48bfe3a0ea9c18f368cd79d3672a3884ff36f3f119119884db11d96feb5ab9f6d4e20fa6eb714c6d7abcb8312f6bd0339f2c8aadaf80daadcc849776e260f8aafa42f116969d6d1c23bf36b43bdcc707affbca4c33d0a59b1754668d0aa7fb043856b7d9a312b9b420d898e99268c042e2eab01ebb1811019f70d3c1b94a8a3a9e158c845d2b96649865228224f6ac814ff4cbdbe6e3f7cea5408713ab2f6a8407a8b81bcf60eb2ddf144cc88bd8a5e2a151b901a43ffb1fd1744cfab57e9114c402966cab2f62fcdffcd6", 0x1000}, {&(0x7f0000000b00)="217a6d497d7d51212080d833e6f54450de24c42b91e11efc5715a64c80dd5b1359c3e2155edd43aaeb20701d89a7a7a9e14762810d173e3ff5954a972ae47ebcd528d4e1c097cfc27893fe0d6582a267649c7fe65a801bf36376fd7eff32aaed850d35bb3d0dce116216ac309bb737369e158d07cd35edfcf823ccd9eb25ecb70ccf7f82cd70093ece6891a09c23338e8592068b15f59c7dff789a08ffa1ad8d1a565c4643c255d894cf8c38de488e5b09ba26544078ce615d7ef70deeeaa371fda62372a442953ca7e9938e9b60e93cf2d795886c64659a1bb3ae9759df44", 0xdf}, {&(0x7f00000023c0)="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", 0x1000}, {&(0x7f00000033c0)="6988eb8870a97974c3d684c763b99f89acd4ffe40e4efece67f566632f764a94082737e27682671c3812d439313aac53b61628b51e41b36acaf9b0b77de1a0f2cdb30a5041b3a9724972ccc3f510e9210879c0a7f032e24e6670c834bfd4497ab1c677dc920af9a5c295e28c3e6b4a87e6605f8c8939cac84df9513d7fae2d5afe27be0f00008c619b170311091c9f21760bb168c74d6c90f18342687feef9db6ec22a412dc9b1854050c0485010e5b47ab43ad6f2c0d18148136be0005e4610cd955d6b766af3ea8b82c214fea0911126c2c44a5eb919c1c6fc76c5eac7428dfda5c520f8c7db5b6ff47c1dc69ff6bde2c304dee97262f2ade0f0324956f4ede24d4aa7f630621790c75a9c36858ab86961bb9e46bb69d4d6560d90428b09e37866d5d183951e5eed726fbf42ef1170a6fcc51e97f3e1039a57b02fcc5adc4367eef3f75af0ae537be74748f69da337dbbd25457368058e23334ee99dbf9b26be2e1a1c1c301d52658a58bf93f5d18c29b0b11181561a2d3df310e29c1434d4ab8250e7ad0108e93423a604b2400d3f389fc36351755fdc5cc03bf5115779efd1c032b3b3687a01af4cde2979b26b9de10657e026accbd34b710a202357c946bd6aaea4c043b4016b11a37e3e0c8f7893ffcd295643e64cbc0b01b924d504a8e6d7ae20eee8950a3b741a7363ce64b332bcb7ed255252738e86d17d0d7121391ddf052f16f9c6360f791b15ea7f947d24204fca2f0e07c4ab68ba89ed345f94bbaba4ded9d6b59c3144fb0d5c4bb835124eb40bae40acf0ca9f479e7f60988d80a2cde2ea064aeaa3a4d0a88638d26a7885b09957e989bd8bf9e4ad2b34990dbfc74596eeeddcc964a8fbb2a23c4847fabe12296a1afe8547cced8836de89d9b460922794e872533f112c421d4867ebead4386e29606cd2e3e4da24e55233dbf342ef0517fbe8a94e28843105fa788269926723e696b7e17278809efec22d1c6359e2e9ea20528e692efe488b6edeafa71df737de8b0b02fbbc4e222c6c678e9f520fce29e3a58264c01d0bd5c3f77ab3973f756d5a78878e7ddc99615da9d2755dfde4b7d7d793c34ecf218df3269ced57b6f7f0e77a0e4a7b5a1c7330906212818cc53422f993466e7cb8297e45855680f50298f2977b98a809e6d59ed9b5dbd76fadd38a9b1ce446bd0e3e751d7a508580b6554df9f7cb93d71aff7b25b4b8c32ca7cab9001985e6961a33b5ed026e7b658b5258c2b31f72383d3dac20c0aecf8f96bf8978ebf7b78c2f77474e30d67a7f2a1a75eb0daaf040f99cf98ccfd9ddcb925ed8b3e8ba2b2cd0c2898a0e981988636d1c8a0bdc9d1221f1a12037b084ae845403e81c6bca371493cf4f56cc146b6340054d8f8179119b5cc0428a32f705a439e6754025a2c100633aaca02e63b6614389bf0243a0b52e624fb3c93be64bf3dde85c27d36ca7564cccfa8bd9cc3d239183aa2305ce6ef2795739e4069cfc763aa4e9e51fedf9992903a92461dfabe2091a6eb69f4727a18d2d262b5c05a0e4ea2dfdd2f0b31b6cb539520c7292c594ff26fd2aa2b5c4ca805fae3a5a56b497af1b830971e7a9c29a93f849d5078d5bb5d27dac813f6f834e9249a8ae12593e6107f5f3f71b809589f5e2320f62db3ed66c79438b3f550b8f10d5cfd2a35d6a3064608eb27a99c7316f6404548976237be7963fe19ed958055c9649d5deaf77504ae5efb4d84fb55e3ae91bf5c2ad199f528930e859536ef21da904b75f3cff4cb2588da0aebc2ee4c4ab2c5e6a662e04a5b95825ffc6a6529615a0e31e68cd5d2c320e2bc7d1ba29dbd11c5ba309318995c9cf9f540aa61879e85ee4bcb62843e41113520417fa605707e101fdd4da0146a7e4a26d1025059092487771add4c6ae9dd276bc53fd6584a8dac39b7a0e3f62b48c50cc4d7dca5e0cc7696f777c6bd6bac17871d751bea6fb9c92104da47e2a2acd84cb031cf32af50aca61cdc27eaf66c31afef799029418a029a414f231f8838e9c0102553463abbd0a7e0faec872885e89484e9380ad8b25545359b2b72a5c2b228a95984256241cc8813141dc7c011b2578b80c0df25e04c53b6a01cf12fe0561ec158d617efb97ea85596da2183e80e77589cab5414d7f7e3689577437c0027ee1a75927709485092afdc507b88d738452d08830dca5aeb96b81d6eae7380fab3de9c25c4a1382a009275d3572b1359ad7689e7668d0b5734f1ff62e9174928d639f74baa3e239d806a20dc17687cc87636e7360b131c1ac2dd3f15e85b1e0722bebb64d184de3c00e8f58f69c8a88f8f8229949c4e9e594a792080016f9bf90e76450a9f78a01398f868849680f49bb7e642c209c4e57ea7644d6ddec65050b429f85c629c074a5c989ff1f2fcb7341b86eb78f866f1d4fcf130ed4c69c2b144d13cef32fe8e57b09ea09ce3b33cd12cb4c2f2c3a9ff92456dde7135a29835b95fb079f579a0d171f7acc09c506f520e1819e8243b10afac5c32fd91b5bcac03c8019db8a101f23dba1babcd5c6727d18a9d8c88b75e80f804d78ad9df76f125daad5e4c6267a8d68e2d220cfd6ece7fbf347fd456509454e22c7b0bea29a8fed465abb1f6c8714af4f6ba9861f14404a91833866cf40a43f35a7b37bcfaccb4d0ac00a755114df14fb301e9093dca744e614911f34a986ca4018edc06c2adc039e3b133222cea24acfd6ed112a4bc4a7e1c5a8b0d98cff0d6a88cff04cb2b7cba469bdb3e5c5c9984b0a857abfdbc25e4005096e03831020d8c861d4bb1c408e3638159b4ed98cc74c7ee58f88149deb9fd175eecc7af5c9ad6833f809b89916e83f5922456a5bf1185c96791d4382522efe9bb7f7c4b12c11abc58c53a3f72336b6012d01bb880a748ba16279e5130ed001c666b065727c8e58e51901e9fc12b0eb2eeda83d6a40c22af5aeb81de7ca6ab7c743cbebb6f76ab2e51ed537d9fc8854c6f8dd4f8e9ebbc5dfef3f890f18b8fb9b089febbe9e07c4a369899df6e7a3b9f3ccebd96ba1043c5f41ef54fe9cd63b9daf240a7f60ebe517569f3f1a9107435ea5a1d5b2ae27758b9ff6060244a114a4e3e7951ec141fe6861a4b8af631b9b688aeab293a11a2cff57bdd316253f041bee7491f39c89a98f365a3107ad158d1d5752c4929f78ce65ec5cb41462287ffdff81e2811fd04c94df4f18fb013c49c900f0050a7c52f7d04342c436fe4309dba87930e09fc8f548fb7f298621d8f5285c2c9d8d3a2b30da9000955c65dac53c714b518b9b1949523d8d8e3326ddc331ae4b2c6e5d855c9418e714b54841dd26cee7cc934827d5841e3213b2e3d2090f6251e20b30c37377ec14f5195a9b0b987702d71552cd94e03bb9ffc690319386ac27c2c66059c3996adc06b69fc06c4569b5fb5ab81ab1da57b101b1a871bb01c429b27362320bb5ee42863b0dd90488c3aee623d575d8332d3a85f4489f5c34116bfc456d2dea848776e50240e7540237cb8ef1c948cea8cf03882121e6497a6c0353a6efcca73923130176eec1a6ac5200d88ed2b8668fd11638b8b39e3bb21fcd232d51f6bd5ebf2b13bfddc6e5f9a28def12740422e81df5f990da6700bcc06e42c82ca94d6f07d74188c626e2642cdf3cbd66038d0596ad4024929df0618a4bd818d71afed8da522a7ad2f852b2fe2941f61cc5b9559ed0802a9e879bff6c3942bdaba4bd4fa262b466e1e26dc10726020f1cdb8900cb8f0b1950119d3899328be18add6ef75a20cc0d9791f7fa37119a3f54b83edc9a54d819678bef59eda6203b1ce20f60927498cc1b6039ffcdb0dfa9de15182a8a261b83c4629ffc65133d84de9a55c772b74a9dad443b64d3fc2a9a4c31d1540e256dcda5fadb20ed113630f506a80f97230225f85c84f89e7783b491d4e4fed9632e937d32204b4e27b386b647430685d8187c59c7421f99b5ebe56e4f5e1e0277da77db782f70e45420912da00379a5f10c1ecfde82ef315162df52d53984c939dfee9d544439b6f072dc36346879614ac1a34c129af0e36dccf7e824afdd27f24d2cb61cc153a20333bd491496fc9862067e6da76344799c1ae285a1edb9cecbe8d63ed70ac9eda4b43d3a4cb6190060ec70f4164d0f83ebbd27fad42fac84e853f3eb5ac3a5466480f7c4b14d57c3ae09215b44b1bd40b93a6963f2672d92a6277c9e256f9c50b0bb106d518d043f803f761ecffb17fe3d298f52737b9081727ddace41cae78c96c28af40fcb3c3015db0c8d123f44d6e86bef4aa7e0ffc099d5aa97b45e482250ebe6e69d8ad2415f9f3b6c81bae4fa344a88fc8e7b70400acd601cb6fc538a95fb591359d3e595e8791b5e2f7a673b7246e9d9fb49d37c2e132d041859eff384f751abf90e5d98cbafceb04400963a8f7e44949dc43a8f9a02744188c4babd069a1deea6836e093ab22af39c1664e09216a7c16bfcb4f191f3e1e66e6423b3bc64468cd310f5900f53affd203b36a929621a41c7524cc741847e0ee577d85a5c039542f9ac0afeaf6326eb3d0dc1cf875a9dbd7d07eb2744d9a7a9f6441df78277e60d2141098f460d095f0ce676c353bfd7ebf65158934a998f87bc07954a8a1eb46dc16ad6b14e7f146cc63b02f927d5164332ec6590092e42987c6b2cebf72487d1590773745966f00bd1b42bf902fac9fbfec714f85de3639e0c7e20f838b929235256ed278aa87aa4571bd04fb530478ae4aee20b02b51f153a50687872a33cf0820be0f67e530c8a8811f7677638882690f8e7c0c65e2d00d0904ebdee16348cd7a34912a8175c3c83a75d70a9ec096c4cc585e6e3b28ea3230cfab900234448c5e4a1a6feb0c2c0695e9575159bb61bc557da2e70fef103415af2261c06984fa940b39788e4d090a8d55a452653ecbaf1d7d4fd4cdc1942ad90afc40244a4b1547a9f4e2ec2474f0c3bbeb91265fd87fbda0fd4781c4be069d6d31b7891f924a21052b87fbb8ea5d5cb8b8008b119889d6defbf05426a6f2f6c82677a1e9ac8918aaf149a2b89874a3aabe6266088793987991a9bd604167b6d05dbb412681b8802069537d3023299247d5d22c70b9c9ee2d85fa56576bb6f3fa766113f24575520def7e60f4231547f2751e361ede3d081cb7acb29eac0e8d13348525c1f25b06239476001cbafbab58a83087612c30748e354e009331339d632f36b02ff6340325a6e5fff10be1e8a486dffeafd3f919861d0b92bb5db1958511a6d6747b02a23efa5de3eae3504d89581a5619a3513e4d04e9afd255854639261e04342923d60e00fb077d0b659117041dbaa060fae086b314110a8b6b430ee7a1e58f1d098f06b1f2827196c1ba07ffd7d93d2c076efd8933cfeca731dae25e7839ef31335a76b9f222c2da87df03b09c217dc18cf7cb2f4ee42d480cb67312e5d0c6ea9bb4217df27a43511fdf231599a8cfe5f6de096512fc75bbe3a2f6e077cd634cc07749426dfbad13df77238cf3c28835743bbb1e82629a7bf9c816a1e766b3346ea44f524e0bc35bb7513ca35431c581eedc55b962ac3a0d82ddbadc23c319a6419f5706efc5aad8a2e0926e724b28de411223e5c237f144b0e8702ba103bdb7f4b728fe023c6b53eec11c0c753f58dd7a812e3b6040c3e7fc553958397daed71d85df67965f63aa800b2d33c4ee9b08f57c346c4c13e1af3c253ca71651ff3ccf44faf6ae104d012144aa50416d474b628721fdc1d192a5bc70ec79c0316e27c012a8660780d8e724878f34c3b6f58e5eb09a5b87b3c6fda392cb53e4e66", 0x1000}, {&(0x7f0000000c00)="6fcbe0b63591e1bc892143935b946984cb168ffc73859ee7d00ea9ea93b1a070bf99160dbd6d3189c6af77b9965ed13af63399684a2a00a979d9b3edd6f114e2f3d04b13afb0f1f94867917efee56cce845e91fbe5d2b0297aee7f47ac37e121f45b936a2df53afcaa38cf8a48cd3947f15516d373161dcad6703827490ae305ef19256c65b069ca35d9e51bfd1fab0116ec", 0x92}, {&(0x7f00000043c0)="879e0f1f5a1224721b3e3ae15a43b7d0bbf9344fd69dfaa99df5babcb1d782980a737f32a63e3e4d4df0c2b231a6c3d2fc397d0ac0ca5c625f85655520699597e0ea6b6564126b5e859fd91817fd1acc4e2f335c8f6cfd9e4cf660d278205e9d66e3d6dbdad48f7e029546cb18552f4bf2c8ecaa6e90e855757639fea00df15feb4612ab043f9c842b2c5af0ea3fb615dfa13e67ce8b3cbd54288f4853d515d7308adfafae3315acaa9379a59656c696f3a7f1e5839bcacaeec09094e7be8de8307c592b77c59deca8a0aee564853630f6cfa35ad3890c460ca4c2b8468a5ac6eb30696bb1b5a6be15d5addb1835d0a4b00e8f03a5ac60aaa14e9eb6d8404e13254deb34544f514f440af0f63bcd173fcafcb1da559e2f7c9109049578850758a8e8d4e21213cf940eb7eb2a2aad312f23387ca519caf1cb325e13000e5425d81d0bc07fc5d10637e2aaf8f536442f4bd5ccfc2b2db708f9362db2bdce1c0a584b1382c8e02647ea102554574bde1798466695a91728be400d5a598c90da94493fb41bb61bd3b0dc216ac6e9688211c2710090b8af1b14113b549e79cc0858e170a7af0603d2a21f39565315a9cbe3a34a7803d3fbe9a36d92959d1e5e119235702cd4a623d20293fb802f5c759ef41fcaec067b6f0a2032562d6bc57460f8bbcedea0b104be1dbee67c645bce5347c7f875f618e36b4b04904fcce1758180faa5598869b6938252be83426f02ebefff051e9653c5d34e36bb128e4e8836b2eaf0f477a05a9d4a665db2fd5f28e2b2fd92a5930db29c5c9ccd56a84040fd20484ded0fecdd4013fbae374e2d257abad642e7419965e1ce25e3e3c1e5504052b6eae5ec563e522a2438700f0c0186ecc55280635866dad0e4e0cae1052ecd76210cc5993be855760b30cf0c8a3353ac9183bcbfdc817836106187c0e752fe19f1acdd66f4cb1b7999b0156db677e6d4a710a4033e720070ee169929cc36086949872053dda88b68a503d861b6738d5d84fd5dd642370b27770a357ecf6966fee065dc970aba0c8f4c5eb01d56042b76d85c0d456f3d407c71e775c5b831e32a7852d724a44cf817f6980af562383b1773a2973f0b04805e71124f17292d90d4207c5e4a0d1963c0f6d76af7f3d4be66a9ba934e4b2967e3560b1f6a43e983a99e2dfc1145c3585b71727b31c17611a2d157dcf1b4993eebb4494dee266d748edf232d1c95e9b6301330d3d9fdb268801db29bc041f46dcfbc2e3c06879208df95ae2663766c366fdf9bcbf50bb360fd9a5a896bb206d921a86944cf1adf582bca9c433b84ad87b018bb597cf62b8149efbea90894acd415afc763d23bd2813f20bb936ce465b9eb81136af174aa4ea1afaf1dca6b0566cb75ff5c65f19008d79c391913f216e7e749e2d01ee7527a2970e0f6944726cf1dcaa1fc2aea5f5d0de77f0b134942df60b5c83a8b6f83148775f055ab1f8eef66aa8b36285373ca7088a0763d62de061459f142ab8cc822b09e0d82d9b91839951624422f6c54cd7935875b4553094626c9d3707b3997314ba1132315f4b00f5decc13e5da742f60c482bdf45a7481b90a9378cbcf0125d7494feba80e26837ecec25bf226133655370112a3c1bde3fd42d6e2b9c2e6a4405713b41341513c8d23d35440c3609d4a94a88697649f319d5d0e0b771f5959a2e6db1dedda1667cad94fb7c3ecc377e3733d4aaff47e6d7f94d20d76fd4c2be4691a11febd3be369ecb4bf4701f42216fad754859b2c07c71fc440be798443d995a58f8f5956b4cf849d0a2b770e56b6cd54d46eb60629f69cee00eb2a1d133041d8b83498649b3cd764ff106c277ed5d0f96443353abf6956983ecec9ce0d14e6ee577b9756e057e1e8e701214f3c602157aa58d94c5a786f4c742993497caa6d543cccb829385b80d3f9928ac1dc2a99d7837c761edc805f5f7b6a095e3596aaedf6aeb4a28a68ca3f84fb5ea81e67df0f248c79945282ec3561db2f61f9a0e0d0460756683c296e04dd96f85b113e2336d4c87f76d6f3a45b967058247aca50027791e0f88dfce1f1ecedede69247a529bce74c757968fde68d579f135b79beacf95ecf4b4b593278a265f01dda154f4b8049558092e153a974000237f3fbbc937e1fb5f8ce224db401426c7f17007359e947da21d1b64b3a34c98e3f12e5a2b7f56da9834784f3131b24985221154bfb0f868af403534e1e14066b110189c0d2c60af38ba776b94c6e8dd7da5b76d8787f969cf5d554f60efac57648f1c36e30c0fecb364e37227f0f12cf891a4b226e057160d61f43b8147cb08acc1a5379af3245756505372902b200a136053e10a251dccc9513c007ee5a4dc7e0d31848a72cc02dfd3db3f5206858906c499d0956949b37faca98c6950c81207b7fdb4f65683413706ca5cfb83170e477853f5d0e06c20662a198806abdbbff03bdeb8780c1cb0ddfe4482b49d8a36ad568827ad140cb0cb3489e302532655c946e3138f36ed1aa921dc6b4a7fa3770af8288a4333ad2aef7961b30493b109bc6120deb9147c35e31fcbaf6030e119cf6129622fd57e9dc16f2dc56f08a1870c4469a2f6de9ccc26e5de017fd65160a8d280c61256851270b52c73b0a0ae8122bb3e12c6807d8ed41c559f1f02a61c3ccffcf28329f76f4f52cdb15235a392fd2c96c23da92add5fc02f6b8b734e8e80991fb4cddf2678034ce5bcf57c18bcebe4aec2c781de923acfcf5a8eeff7b8cf441047ff30ff61c7875acf0694a0ba21d16a6e136234cb470465b6cc02787530c9619b2d2d1ee42e000bc053b223adf1a1e302d43bcbb7490db7bd815561c540d6b8ceabc1d3b6f5062d08d8d25081564764962b0e8a72338dca6930dbc3ac07dd291680dbbde588195b2124b18425beb79e29b1bc51bcb3ce4780d1d3728f73e1db727a8788438d79aea91735a9d34e86fd1432c4c17352770354509667a365ad985e5bfb74f5d655fa1998c0d675e0e88d4afdf352e59f53d908b4c5c7757393c374b05bfd20abf08108426c9b8a0e6b2a2771da048fa3c7a2ffe3057f28b50e8155733612da1e95f4104cccd9ff9f99352ce12e8f5f327ab87a83de5a9661a3523649c0ebaeef901e30493a465c48ec7bf3530e1cb3c5aaf981c0f8c1994bc683904f6a78422d3c40e6fe970b2436d501fc8e5285743581729bec73bc370d4583ed27f1079508850d35a22631dfd3725b434178c3b389d145800f5e5b5645ef18faff75c2091edd1934b9f8eeca6304921f6d031df5eb527557a53bc0cc9e12ac6f091eddb7e7cc574e2cac9262cb5199547e96376542d1fc6246a26c5729d6aeab283f758ca7dc5a06a776eb31ea48c0279549151e16b3c045983b37e16d0972d17dab1e425e0006de9b65cf83d693717d882d90e13f76a0e13924856beb37ce59fcf077c6ffd08d1207858d8b6c1eb17734100238bffc9674e69d2c82d21f5f48836641ff145eed691b31607c51a0b519b6c64fbfca44303e33f057832c44deff1d4a7e6c06935c4cb7638abfc5e189c13a7a48d8025ca7cb594c268bbd558acfdbb5ca88c11b3e68180530a81cbb074a6f06844265d8e09b249adf0124e3b95a7341d98b3be3a04c15af187d28b05e2b5d3440090e8493e537326d1e93c59fbf4d8be84bf5f713c909c8e8b26e821481aad5d526c59e8ad9a38d72d33983204515524c2d6b6fdad4359724c29f8e6cd9b9b3b1a81a71458ae16a22f20e135f4103532e9d3771d5e5f71d61f6980b32238ece67d211a681d8b10df54364b205eb0410701e5aed20b716e2f7d3f1e94b011ebe63ca3d0325dda86e28f239057d0d72a905d98dba152e35bd130c6a606a5d3bd64be053ee66a22ee2a6d30f15146674b3e6fab04b4d72aace7b66ef566c50d921da2134a8924051378c3fce4737fcf74c54666df76df397334cc524f3826bfd6a15fc037a95c247729b924b6ef1510b5ab473d283092ad66bf627ed9fd60d6990f49f3535656044d6486444ac40ad96d5766e454e6a917d4257a4f495c12e12d2001dcd6893ff3cc6fff6f7f16f3c72b16adeacd2d42cffd56d464594c761bdd906d6feb1efe93390ee6ab2b7896c4e7bbcd08533a6ff83d03486f6a032cc4520481af0adc87a21b7ea0008457a3c416b864e9e69f4ad854470c094fe0684823c76b2ef5750675a823a21aaa0947440934b0ba69709cd5494a0123bf92c125688c81b8c4effae6a6c9e8015dd31e7085a19aae159cd0208fe657d6681929d9304942671502d8697303a669dbeb0694050e8d9f2c2bb9ac5dfc2f95e80be6c0cfa851363046b5391c4b51ee5843b06d23e6a2a5bf1e3b0f3a7eeed320087a7185a1a7fb702c13c1b2eef226ccc9ef357e7fcfa3392811cc4cf950e46cd6d7a27dfae79cbed1ac4dea4ce14f97f649ce4dc5bc2380cd1ac046d6e1bb1ff3cde42f7f4cfb68c6ef9c7ded79129feef3ba2966441b99ffd05994c0e161a11e2e6a08f85ca541919dd31f1eec84b96607f582d6c3e110376d2420a6958821dc6251117924ced2842983bf817a944b5441cd6ce6ae122c92c85fe7e45d9b0177a4d27f23c657deb22ea377686ae259a3b2f658525ff8d6134f6cbcc63378c4801c0b6702c2a5162327f10fd41ca2f6c6d97ae0322ef13910843698f032c4fe9bfce27a41a25dc189f6309edd1fcffdb8d311612d412cd7933a110a4d0207e4fe277dc1e1fbd18c29312939a7afe024767fb5bff55cacb05756c0b9694de79d81d7715320931a2c6d2d354510e64557ec965c67b451c7038e0b2f72a69f3087beb6107f9d95e3ccece181ea0ffb98aa3514738f66ac653bfb74565be06c430ff0c58cb97369a761f0042dbe1b152c25abf79bc17fecb19bfab97208895e35d0dc47352594b39a6a503b3984200614af25939d77cf53e1ec255426ea83e5d3e0c1601f6dda4699312b35f16ece9f8903983c9c9e3c2c29823eba5ba6cfd7d4f58678150ad9f16ad56dc55aeb5cd6b7c0784432c3cbfcb944510b7c380bed6c936f0efd324b6124663f962c6a3b0aecce35d006172b0c1bce6e5f4f8a9000cf62bede4b9de2e6061cd279d0eaf25e6fdb036ebd1f5c90017e5c49b10f817e17f94e4fa00f025c71af88c0c9c45fd329d29415ec8fd0cfbf35d6098b2164b6de414ead6604b8fa920dc8b7276ad494e784481bda07123354f207fc2bf0d8d32ba114b6aa2537622c915fcd27454e17291cff3633fc891692cf83cc41171f0f71f2fd4e7586a90c9b83384893bee9d8f62c2a9a84fae1b844577510820065db26086d19b30cb4caccb8dbb1d214539675c2d47b9985a1e5e0890174cac2402030a732024584eae16dbb2001c97a9354913b0d8bfaebcebb11a23281f60170d5088432c955abe88acf4d7de4bafdb2a038b0d53c6bd3e06d8dc72e8f7e10c7d60c5463185f29ed72dacdfd11d6b7e5826a6315b5269dfdebbc295c4f26a71e7b22efe70ec5bfd201a624964d59852c3474dec2b92fe23df3959223cf59ba0714c1b5df86902e323e81492c1698684124a48714600e8345e5d22537d9c1647cdc89d5abb5edbbf2f3cf7e232125c3a0c8f79210da669f71d41273f81086808335a4bae46099648f9342fffcc901620d54675e9959b639e87010199e57bb4a4e1a60b4d23b1a2290d5752148f70a91fc0e755b2ce0a929a929f6b82d320db280a6a6768851350cef4957d09d2f22e5d77c55dc9eddc3b5719c7d6874920a52c8d9356d8232a18faf692561dd6c16160785742e27c0311", 0x1000}], 0x7, 0x0, 0x0, 0x4000}, 0x8001) close(r5) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r5}, &(0x7f0000000080), &(0x7f0000000180)=r12}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r12, r5}, 0xc) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) r14 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r14}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0x1, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x7, [@const={0xe, 0x0, 0x0, 0xa, 0x4}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x4b, 0x0, 0x69, 0x2}, @enum={0x7, 0x2, 0x0, 0x6, 0x4, [{0x9, 0x8}, {0xd, 0x3d3f}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000400)=""/246, 0x57, 0xf6, 0x0, 0x6}, 0x28) sendmsg$inet(r10, &(0x7f00000012c0)={&(0x7f0000000e40)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000001240)=[{&(0x7f0000000e80)="5d08bc5bb568554775bc9a9c395accc5dce137218dbacde3641f5497f532b04547cc20d2fa5a10840f43bcf055008173d9337e3c0aa826f6c7be12d9de137daccf5dfbc9352a673b922d559595575ba7a4c2c1b02a01dc7f23e6cd0f81ba6c684917cb3b2352b51c35bfb10f5857cd61", 0x70}, {&(0x7f0000000f00)="10af3bbe4b89b58865a7e6479b5bb2c7bc8b3ebfb0047f5bb49ad104993dbd8d13998549660f16ad138462fe50f8b3e051bfa017f2386bac373ad189bfe0bdd35855ef3c5cfd34ee5bc9eac0a18b74bf228f87911795cebb687850f01a3276c8175a75a9e7bebfb2562d7cf60ff22a8b587f54f91e03baacd62ba160a82a45506afb5c2a22a3f6c791b4a6ebe7835103563faae432898ac6cb9b074785687a49e49a3670bd4fa817e64a8063620dd6166721594ae4043965ca", 0xb9}, {&(0x7f0000000fc0)="13e3cecd226be0d6c529f1eac73d79b1239ce68bd0509a18cf1687a6688bad1e104661fd674b084a42639d98bcfd1b6bac7699573fb9fdf40bdc9aab2bd86e97a8bf63dea2c26c735a49c35308e77c82e55b5e7f102e86fc1fab020dcb4724ea59eb58593606a58bb39e3de76b56aa1ba8fce55677a36c842d311424485c945c6704582431e9442ca15a34132b45ed7c8ac8d649e5f74161e494da98a80d0a87eabc53291f9590b0e76ebd5c39a55450a7cf689c6469df7842340dfde2cf8bd7d2c2960a5a52070e0ca493c322", 0xcd}, {&(0x7f00000010c0)="40c0bf057bb4ece7765ed0c14065fa34408c42982612bdedefa6a415eb29b716dd1527b28398e655be238a799c72578f6a0452c3a8f6b9d8f14691f3c02a4080b4052b76abb0763cffc41d4bd454493cd3eafb4302a226e996066801a009a71d7b1903bdb2d0a04fc0fffe39d216cae0488eaebae5f987e0582a3132a05e88b4df74e035d8fcd3f1829e05b3a90868f05b19da9a89b8547dc3debedcebdfc5d0b9b7", 0xa2}, {&(0x7f0000001180)="616ee01ee1f3d27dc3b251bf6abd95807980eba713ff24a602c9fca67ed09447839e6062610c436b82134ee47681e6f820b58ceb991c40408f55a6e29c8310b55e5540b466ca71f60ba9ee8e645c7b35eab3468859e1218145cddbcf85a3e7c9fa69f9467751cbfdf3964082fd93175b6af048e5aa4d2c8a2a269cbfb54b6427ada4d482be620c8d3c1ad14853dd", 0x8e}], 0x5, &(0x7f00000053c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x20, 0x0, 0x7, {[@timestamp={0x44, 0x10, 0x17, 0x0, 0xa, [0x8, 0x7, 0x9]}]}}}], 0x98}, 0x5) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_ext={0x1c, 0x12, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x4, 0x5, 0x0, 0xfffffffffffffff0, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x400}, @ldst={0x1, 0x0, 0x1, 0x3, 0x2, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xe}, @map_val={0x18, 0xa, 0x2, 0x0, r14, 0x0, 0x0, 0x0, 0xcc6}, @map_val={0x18, 0x7, 0x2, 0x0, r16, 0x0, 0x0, 0x0, 0x80000000}, @exit, @map_fd={0x18, 0x3, 0x1, 0x0, r5}, @map_val={0x18, 0x5, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f00000001c0)='GPL\x00', 0x2, 0x88, &(0x7f0000000200)=""/136, 0x41100, 0x41, '\x00', r15, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000540)={0x1, 0x0, 0x9, 0x1}, 0x10, 0x450, r0, 0x2, 0x0, &(0x7f0000000580)=[{0x3, 0x5, 0x6}, {0x5, 0x4, 0x2, 0xc}]}, 0x94) 1.703772149s ago: executing program 3 (id=5164): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='(m\xf0\x10f&\"\"\xd5Y\x9d\x87=\xe1\x17\x9e\x18\xff{4\xa3\xaa\x81\xda\xd2\x10\xb5\x124\xdf\xef/+}\t\xc8r\xbaU\xfar\x9dJB\x8a\xee\xdf\xec\x1c\xad\xa6V\x83\x8e\xf9\x1c\xaf{%\xe3\xdd\x06\xc3Q\xb6\xd2\xc9)') socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000003000000000000000000000071120b000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfd, 0xfd, 0x4, [@fwd={0xc}, @decl_tag={0xe, 0x0, 0x0, 0x11, 0x4, 0x8}, @var={0xe, 0x0, 0x0, 0xe, 0x2, 0x2}, @datasec={0xb, 0x8, 0x0, 0xf, 0x2, [{0x1}, {0x3, 0x7, 0x7fffffff}, {0x4, 0x7d4, 0x33}, {0x2, 0x451dce03, 0x2}, {0x2, 0xfffffff7, 0x4}, {0x4, 0x2, 0xfffff0ca}, {0x3, 0x1, 0x9}, {0x1, 0x1, 0x9}], "1b65"}, @volatile={0x10, 0x0, 0x0, 0x9, 0x5}, @float={0xf, 0x0, 0x0, 0x10, 0x2}, @type_tag={0x9, 0x0, 0x0, 0x12, 0x2}, @enum64={0xf, 0x2, 0x0, 0x13, 0x0, 0xc, [{0xd, 0x2, 0x3}, {0x3, 0x80000000, 0x3}]}, @datasec={0xd, 0x1, 0x0, 0xf, 0x3, [{0x3, 0xa01e, 0x9}], "103747"}]}, {0x0, [0x3e, 0x30]}}, &(0x7f0000000380)=""/83, 0x11c, 0x53, 0x0, 0x40}, 0x28) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.624817466s ago: executing program 1 (id=5166): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe0002476619f28d99cd0aa7b73340cc2160a1fe3c184b751c51160fbce841f8a97be6148ba532e6ea097a75dfebd31a08b32808b80200000000009dd27080e71113610e10d859e8327ef03fb6c86adac12233f9a1fb9c2aec61ce63a3462fd50117b89a9ab7599903488de0a3763a094226b4eeb8cb000067d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c972780870014605c83d7d11c3c975d5aec84222fff0d7216fdb0d3a0ec4bfae5afe2348754000000000000007642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc5a788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d5a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8e12baf5cc9398c88607a08d191430baab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f77b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b4150900000000000000f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ff010000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a30280bc586e79a5dd8076c248e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99c07dfe27fe6d61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f5874c24411d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a013709003f509e6e540c9ba9c2a589ac5d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d54aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be66c2242f8184733b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa0500e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5a45706bda78ab60200000000000000000000000000000000000000706f78f0a2ea9667fb5b951808545a46830970c2dfae01adbda7d29bf1f7abdaf52e0de6f9d7150808ed086642e64ebf98762f34338b80e41b704c3eefaf0bb5f7d895de17a10b0a0ea15ccc0d7a830b6eb33b6b61675511d693ef5e3c44bbf71cabc5175d879e7499f8baae2a1a09cf38da73297764fbc0e723e1cc3abb12e3076982ed32c94a2ce3e6f37c47e983da4ca5c96187db5a2a2e1742bc93a65d7187126126b3a80f17dd2f7dbbe82d104ede9ba6925afc2ee6cb94f56f1363cad635abf8f983292c49c0ebf5005154c7b58a3a2a2e5a00d2f953a86d2fd92b8661264f781e3fb02d05a28f3f17b64d0258853d45cb5ebde10cd3d82eeed2f1ed925b7cf400304932c5ed0a362b235ce37e1f17700f7d1fecf8be8a2c5d25a9c60657560d05441387ff158a018d19a286c56d0886eb59d509ee89cc2df52881d005b2e5c27563ba54e4153c132d0366a9660000000000000009c1aaec93ec0f925921fb2e9eb202a29bef28224dbabe723de5c584bc398a8792e493048c87f60a51a391e95921218149403558fd13c649f90b0911d57eeb298b590581eba1ce383b539ab80fd15445987b1bb4eb512545e1ab65fef310e10b1ee362b51c72f82edf2f502ddf52567775e34a56d1be892f1e62b08950d517fa6fb1b0ef2edf1b67f8644786116b037d4a36fdd30b000063e58c856ec44cbbc2d370553f832af9480215e09aaa3843fe360b1c293a14627f2cfbe278f31d0abc0f5aaa10926dbbfe8a4b131c13a73d4e6d065c2c0fed3ab8442520ce0e0ad7d2d177377ab197ace3ef8b1c24ceb0bdee84bd6e6317633938dd19dc42de7f8f860eca6d9c74525fcd3497526df4c13e3ba5f0d75365a4542ae9440d2fede416d618cdaaf7e038879c5d177b3876fda4121e15a00adb976064a93e8d000000000000903350932d3eef7fdada20c19807066e2c72d0d816eb9fa50be213bf6bbb7ccb9f2e8a153e6ced68f192ebed6e86af0f2cec7335fa8039fd6eb025440bc2a34d071f0a0e6774308a2c5986aa9200a1306ffa5a71ca69e89a6980612b35fc858f37c2c398515a910a35e22ab0573c10b85df4c2972a2fb8b9c080fbb41a753791df727fdeadc5cf218a6eda31312256191c620cce34d1e3bf40a4a207ab1575b399eb8155781bfc7cb5920b49c039935a888d77041814f60fbbcafa487ee96b368e8769da90b44190e569fe8b1d155d0765baaca5c5548b5a78bb43e5d9e47a1d5809bb178184b5672d08e29aecf1f572ac1e6cab7e820751e95999b7532603494d37a2bff3000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x5, 0x2, 0xb4, 0x7f}, 0x50) close(0x3) perf_event_open$cgroup(&(0x7f00000046c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x61, 0x0, 0x0, 0x64}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x5}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x7b, 0x0, &(0x7f0000000100)="b9ff030f6044238cb89e14f088a81bff88caffff4000632f77fbac14142ce934a0a662079f4b4d2f87e56dca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000)="ffabeeb6ab51a48157219144d3619b5cb8cbe72e2e49c15c8546cc944e1eea07229c36ff23a9fdc249c00c3368e20431c100149b8925001b89aa24e3037645d8b1908f8ff028ddedb0390d5aa98e879d7ae537970fffac36a053cd2f4ed3a74b6a58ede7b852ed394968f50ce6846d7ca9"}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000050000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000007000000095", @ANYRES16], &(0x7f0000000300)='GPL\x00', 0x2, 0xdd, &(0x7f0000002500)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf8, 0x10, 0x0, 0x34, 0x0, 0x0, 0xfffffffffffffe65}, 0x39) 1.568748551s ago: executing program 2 (id=5167): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000900000000000000010000040000400006000000030000001b000000002e2e6161302e5f002c3920c9f8624dff87dd50b2aace192f1235a420b9d7058e0fac123b1b135aebdf89815b462ed5818c7c3ed80d30ed996c9885785e712ac2ab77693da2c2c2df2c957db2f70daddc6d6e05c1b1362ef4990c7ff6e642"], &(0x7f0000000580)=""/250, 0x39, 0xfa, 0x1}, 0x28) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffc, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs$namespace(r0, &(0x7f00000006c0)='ns/pid\x00') r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x89, 0x0, 0x0, 0x4d31, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp, 0x1053e0, 0x2, 0xd, 0x8, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) perf_event_open$cgroup(0x0, r2, 0x3, r1, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x7, [@ptr={0x7, 0x0, 0x0, 0x2, 0x1}, @struct={0x5, 0x8, 0x0, 0x4, 0x0, 0xde0, [{0x9, 0x0, 0x496}, {0x2, 0x0, 0x2334}, {0x4, 0x0, 0x9}, {0x5, 0x1, 0xff}, {0x7, 0x0, 0x6}, {0xa, 0x0, 0x9}, {0x6, 0x1, 0x8}, {0xe, 0x0, 0xd}]}, @ptr={0x7, 0x0, 0x0, 0x2, 0x4}, @decl_tag={0x1, 0x0, 0x0, 0x11, 0x3, 0x1}, @typedef={0xe, 0x0, 0x0, 0x8, 0x3}, @decl_tag={0x5, 0x0, 0x0, 0x11, 0x3, 0x2}, @restrict={0xe, 0x0, 0x0, 0xb, 0x4}, @func={0x3, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x0, 0x0, 0x2e, 0x0, 0x61]}}, &(0x7f0000000000)=""/23, 0xe7, 0x17, 0x1, 0x4, 0x10000, @value=r2}, 0x28) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, @perf_config_ext={0xfffffffffffffffd}, 0x102002, 0xc, 0x0, 0x0, 0x6, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x1000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r3, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8940, &(0x7f0000000080)) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0e0000000400000008000000080000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000280)="d2ff03076003008cb89e08f088a8", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x12) 1.527888335s ago: executing program 4 (id=5168): r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x38, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_config_ext={0x100000001000}, 0x31, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000b304e91962fb046fa7a224bc000000ed0000000000000018110000d115190f24ff0bf4cb33d2b64f0800287c18b0413013101c1ed5f56d7d917ede65b3e9cad1a717e07b767452db935a1261ed1c242d2461cf1680c144fde2247fb04623e5eca6cf92327117e5e43332cc73d7465913e3ac6ea14485143d0d98de353d857b36f208acfdffffff0316d147eba81ccdd75c9945bdced3c49c42b12ed7efcb0cb1933d47412bf418795206edb8e0f509d4a5fedbf6d99dddf49bf492f0bbdd759e0bfffffd000000000000000000652a", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000052c099be0ecb5f7daf3b7430e41daeacef06ea5e930ab9158eef2f32c38276eb0c31d733b167940e22989754c3", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000d020000000000000001000004001800000000000002000000000000000000"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r4, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xc5bf) r5 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)={[{0x6, 'cpu'}]}, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r6, 0x20, &(0x7f0000000280)={0xfffffffffffffffc, 0x0, 0x0, 0x0}}, 0x10) syz_clone(0xa49a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r7, 0x0, 0x0}, 0x20) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\'\x00\x00\x00\x00\x00'], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000600)={r8, &(0x7f00000003c0)="4bdcc70b", &(0x7f0000000580)=""/78}, 0x20) 1.46611668s ago: executing program 3 (id=5169): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x81, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x801, 0x2000000, 0x40000000, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x20000000, 0x80}, 0x10, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000000400000006"], 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000100)=r0, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) 1.444279322s ago: executing program 1 (id=5170): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xec001, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c23004a) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230005) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110c23003f) close(0x3) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xba98575a95aeb70d) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101040, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101042, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x30, 0x9, 0x0, 0xfffff028}, {0x6, 0x0, 0x8}]}) ioctl$TUNSETVNETBE(r4, 0x400454de, 0x0) 1.428011694s ago: executing program 3 (id=5171): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x79, 0x0, 0x0, 0x48}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x7}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x3}]}, @ptr, @restrict={0x1, 0x0, 0x0, 0x4, 0x4}]}, {0x0, [0x2e]}}, 0x0, 0x4b}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r5, 0x0, 0x1}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xf33c61f7af86a82d) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x10}, 0x109000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x26}, [@ldst={0x4}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"/1582], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r4}, 0x4) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r6, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1c200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x6}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)=0x6fa6, 0x12) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000100)="1947fb98fbe7df10928ad0a13e249fa649ec3c2a7ddecf", &(0x7f0000000140)=""/10, &(0x7f0000000180)="6ff4c36763374ff22e99f5354aff1d085f8b7edcc762f84277052cf56d9989f5f201344f2cd0a7c82d7df8559091eb423d5326706407dc3eb6acfa490a8d6c471ebf2c1db6cea2260c82fd4653e0d70bf09dcd6900c9362609d09be9de0296935866d7ae20f42107fca44cc201005f9011549269489fbffaa8563c4ac050c44a2c323afa6edaa28d663572432a9f5650e6eb0b7a93d127804735bb793b82af38ff4738862cd49d450693554f24a31248e394802dacc0eaeeb43691", &(0x7f0000000500)="cf0c0d96815ea2afa91ca2e9a6467686100aa70172a8aec1fe81d8710bbe307ff2910fdb00f7e8ef07f3e3244c9ccc66c8b030d5ca6c46aecc0f41243d0002a0e8066a3c8e9811f49c60a0d052c80bdaa7fbbcc8884827d230030b5772237e40d5c1ec83beb9aea57b1eda528fe33070cf4c3c038d3182c51cb85c0193fad458bad186542e778ec86308", 0x0, r2}, 0x38) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x1a, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@generic={0x7, 0x3, 0x5, 0x8000, 0x7ff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffff8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f00000006c0)='syzkaller\x00', 0xa, 0x77, &(0x7f0000000700)=""/119, 0x41000, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x4, 0x7, 0x200, 0x4}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[{0x3, 0x4, 0x0, 0x9}, {0x4, 0x1, 0x8, 0x3}, {0x2, 0x4, 0x8, 0x3}, {0x5, 0x5, 0x8, 0xa}, {0x3, 0x5, 0x1, 0x7}, {0x2, 0x1, 0xb, 0x4}, {0x1, 0x1, 0x2, 0x1}, {0x5, 0x2, 0x9, 0x9}, {0x2, 0x5, 0x0, 0x7}, {0x5, 0x2, 0x1, 0x7}], 0x10, 0xde87}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c80)={r0, 0xe0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000003a, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000cc0)=[0x0, 0x0], &(0x7f0000000a00), 0x0, 0x44, &(0x7f0000000a80)=[{}], 0x8, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0x4a, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000980)={@ifindex=r8, r3, 0x17, 0x1, r7, @void, @value=r0}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 1.205232743s ago: executing program 2 (id=5172): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=@framed={{0x6a, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x53}}, &(0x7f0000000480)='GPL\x00'}, 0x80) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000013c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001580)={r1, 0x18000000000002a0, 0xe, 0xfffffffffffffe79, &(0x7f0000000040)="76ea09ff010400000000000088a8", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000ff0700000000000000000000850000002a00000018010000646c6c2500000000bc583e9cc515e81d00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072000000950000000000000036d6eea14dd575e26efc27bed9af4b89b35a0f875d1251f9f8dbf6b7a652716aed95198c2a5b2d0614c8da13541b13f5f08e9a3f74db9b027d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffdf) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20d0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x4e, 0x8, 0x0, 0x0}}, 0x10) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000039c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffe8}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x18000000000002a0, 0x38, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f086dd", 0x0, 0x63, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001280)='memory.events\x00', 0x26e1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid_for_children\x00') bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r4}, &(0x7f00000004c0), &(0x7f0000000500)='%-5lx \x00'}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x8, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x64}, @initr0, @exit]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xea, &(0x7f0000000340)=""/234}, 0x80) (async) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305829, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x10, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, &(0x7f0000000000), &(0x7f0000000040)=r3}, 0x20) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) (async) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.204539543s ago: executing program 4 (id=5173): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000001000000000000000000000850000005300000018010000207834b000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000a00ef00850000009b0000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x45) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x880, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async, rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.203575503s ago: executing program 2 (id=5174): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=r2], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x46390, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfff0000000000001, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x100846}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00'/12, @ANYRES32=0x0, @ANYRES32], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007300000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000bc0)={r5, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, @flow_dissector=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000004000000850000000600000085000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x10, r8}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1f, 0x2, 0xfffff992, 0x1, 0x1060, r9, 0x4, '\x00', r10, 0xffffffffffffffff, 0x3, 0x5, 0x1}, 0x50) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x150, 0x150, 0x6, [@ptr={0x4, 0x0, 0x0, 0x2, 0x1}, @union={0xb, 0x3, 0x0, 0x5, 0x0, 0x5, [{0x3, 0x4, 0xc}, {0xd, 0x0, 0x5}, {0x2, 0x1, 0x7}]}, @enum64={0x3, 0x8, 0x0, 0x13, 0x1, 0xe, [{0xf, 0x4, 0xfff}, {0x6, 0xdfdd}, {0xd, 0x8001}, {0x4, 0x11, 0x6}, {0x7, 0x4, 0x400}, {0xd, 0x6, 0x7}, {0x3, 0x3, 0x86ed}, {0x6, 0x5, 0xffffff10}]}, @enum={0xd, 0x2, 0x0, 0x6, 0x4, [{0xe}, {0xc, 0x7d}]}, @datasec={0x1, 0x1, 0x0, 0xf, 0x2, [{0x5, 0xb, 0x2295}], 'Ck'}, @type_tag={0x9, 0x0, 0x0, 0x12, 0x2}, @datasec={0x2, 0x5, 0x0, 0xf, 0x2, [{0x4, 0x0, 0x2ce}, {0x2, 0xde9d, 0x1}, {0x2, 0x6, 0xfff}, {0x1, 0x7fff, 0x7}, {0x1, 0x6f2f8d7e}], '7A'}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x10, 0x4}, {0x10, 0x3}]}]}, {0x0, [0x61, 0x2e, 0x0, 0x0]}}, &(0x7f0000001140)=""/4096, 0x16e, 0x1000, 0x1, 0x6}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xa, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000004000000000000ffffff3718170000", @ANYRES32=0x1, @ANYBLOB="0000000000000000186b00000600000000000000a600000085000000a6000000fc75e2ae0500000088483000040000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0xef, &(0x7f0000000680)=""/239, 0x41100, 0x2, '\x00', r10, 0x25, r11, 0x8, &(0x7f0000000280)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0xa, 0xfffffffa, 0xff}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000380)=[r3, r3, 0xffffffffffffffff], &(0x7f0000000400)=[{0x5, 0x3, 0x8, 0x2}, {0x0, 0x2, 0x3, 0x4}], 0x10, 0xfcee}, 0x94) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r12, &(0x7f0000000b80)='syz0\x00', 0x1ff) 1.203254913s ago: executing program 4 (id=5175): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018010000756c6c2500560000002020207b1af8ff00000000bfa100000000000007010000f8ffff21ce3f27b2aca86400b703000000000000850000009b0000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r2, 0x27, 0xe, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b0800", 0x0, 0x8d8b, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000001380)='!\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xbfffffffffffffff, r0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x6, 0xb}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xd0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x80, 0x0, 0x0, 0xffdffffc, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x2, 0x0, 0x3, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) 1.080310474s ago: executing program 5 (id=5176): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000780)="d4c487", 0x3}, 0x38) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async, rerun: 64) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000240)=ANY=[@ANYRES16=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x24}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x1f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41100, 0x28, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000940)={0x3, 0xa, 0x2, 0xf}, 0x10, 0x0, r4, 0x0, 0x0, 0x0, 0x10, 0xfffffff8}, 0x94) (async) close(0xffffffffffffffff) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3d, &(0x7f0000000000)='cgroup\x00\x8d\f\xf3\xcd\xc6X$\x01n-Hg\x144-.\xe2\x053\xe2\xf4\xbf[\xe9\xdddU\x91\x9d,\t\x8d\xc3@\x86,\x7f\xe2Z\xe8L\x80\xdbe~c\xbc\x9b\xcf\x9b\x1cH\x95\xf3'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000500)=ANY=[@ANYRES32=r6, @ANYBLOB="026727ae26dc8e52547cffbeea4454a64c0679bc1719d2328578afd07e5c68022413c8160202e378fd6824780095e231fc7c1cef27be1b2b017f1e8131e5d887e0d3d97ae12a8155ab8e3375262bb4d51c6415944e897f1e39b096092a2548d1766a215860c19bdb1e0600"], 0x10) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000440)=ANY=[], 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00', @ANYRESDEC=r5], 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r7 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x5, 0x4, 0x8, 0x8}, 0x50) (async, rerun: 32) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) (rerun: 32) 970.870344ms ago: executing program 1 (id=5177): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) close(0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x9, 0xf, &(0x7f0000000940)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0xabe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x87}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6342}}]}, &(0x7f0000000a00)='syzkaller\x00', 0xccf4, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000a80)=[r0, r0, r0, r0, r0, r0, r0, r0], &(0x7f0000000ac0)=[{0x3, 0x1, 0x4, 0x6}, {0x0, 0x5, 0x10, 0xa}, {0x5, 0x4, 0x8, 0x5}, {0x0, 0x2, 0xf, 0x5}, {0x3, 0x5, 0x8}, {0x5, 0x4, 0x5, 0x3}, {0x5, 0x3, 0xf, 0x3}], 0x10, 0x81}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x17, 0x11, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0xb6a0}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x53}]}, &(0x7f0000000800)='GPL\x00', 0x59, 0x59, &(0x7f0000000840)=""/89, 0x41000, 0x4, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xa, 0xb13, 0x6}, 0x10, 0xffffffffffffffff, r1, 0x3, &(0x7f0000000c00)=[r0, r0], &(0x7f0000000c40)=[{0x2, 0x2, 0xc, 0x3}, {0x2, 0x2, 0xa, 0x5}, {0x0, 0x1, 0xd, 0x4}], 0x10, 0x6}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080600000c"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000f91f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0x1b, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000055a6070100000000010000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70200000300000085000000860000001801000020756c2500000000002020207b1af0ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) openat$cgroup_ro(r4, &(0x7f00000005c0)='blkio.bfq.dequeue\x00', 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="620ac4ff0000000071102100000000009500000000000000d4eec21f20d72163fb31eee8d11609128c13f7db4b65b634d426821523ef53cd0443283aebbae76879f4dd49999a005187edf4ec5f74aa749059ccc9b7b0f7bf7232bbc7254452c467314bc5980f6d16d1c9c42c95bcf90173121009eee6087a7bf65dcb3058ce59100047194b1c6c0089b8fa4da1b2b8488d121b249f70913243e2336d3041e44f72c99fa622c80d1c01751fe7d846c7d517f2a8c14313c53fb748"], &(0x7f0000000480)='GPL\x00'}, 0x80) perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x80, 0x3, 0xc, 0x7, 0x5, 0x0, 0x7fffffff, 0x4000, 0xc, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x4120, 0x3, 0x0, 0x9, 0x5, 0xf, 0x4, 0x0, 0x5, 0x0, 0x5}, r4, 0x7, r3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000004000000080000000100", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="000000000000000001f8b209f08886e455d968"], 0x48) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1a}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) 776.598711ms ago: executing program 2 (id=5178): close(0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x18}, @printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f00000001c0)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x45, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x8c, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x6, '\x00', r3, 0xffffffffffffffff, 0x0, 0x3, 0x5}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x609, 0xe, 0x0, &(0x7f0000000140)="dd800000000000005d8ec6f10000", 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x18}, @printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f00000001c0)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x45, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x8c, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x6, '\x00', r3, 0xffffffffffffffff, 0x0, 0x3, 0x5}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x609, 0xe, 0x0, &(0x7f0000000140)="dd800000000000005d8ec6f10000", 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) 652.952812ms ago: executing program 1 (id=5179): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000100002020207b1af8ff00000000bf86a26db800000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa1000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x2f, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xa5bc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000840)=ANY=[@ANYBLOB="1800400000000000000000000000000071120b000000000095000000001d1b24bc3e1745a3aa000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_freezer_state(r5, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b000094f21fd42049f6ad18033adfc16d6c86cf0000000400000000004d5a03002660e60a64092d3fce8147e11e40d78893013e307104da93189388dc1e1060de22865cbb4b6f00007df247203991c79a8a22bc2374e6797360028a780300f843739640382c650e907ecd1c69040f6df93b61b68c50997945bd25d0c5de099cef627e6c6513445f51f8b4adc05bb51aa7be3418f5811956894a110000000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x10, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000074f6967d00000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @sk_msg, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_freezer_state(r6, &(0x7f0000000040)='FROZEN\x00', 0x7) r8 = openat$cgroup_procs(r5, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r8, &(0x7f0000000180)=r9, 0x12) write$cgroup_freezer_state(r6, &(0x7f0000000080)='THAWED\x00', 0x7) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0xcfa4) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x2, 0x8, 0x1, 0x0, 0xb, 0x100, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x4043, 0xff, 0x9, 0x0, 0x4, 0x145d, 0x3, 0x0, 0x3f8, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x6) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r9, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)='\x00'}, 0x30) r10 = bpf$TOKEN_CREATE(0x24, &(0x7f00000004c0)={0x0, r3}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@ptr={0xd, 0x0, 0x0, 0x2, 0x5}, @restrict={0x10, 0x0, 0x0, 0xb, 0x4}, @fwd={0x2}]}, {0x0, [0x0, 0x0]}}, &(0x7f00000005c0)=""/140, 0x40, 0x8c, 0x0, 0x5d, 0x10000, @value=r10}, 0x28) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r11) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 647.302803ms ago: executing program 5 (id=5180): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x8, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x4}, 0x10c333, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x3, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r0, 0x0, 0xe, 0x0, &(0x7f0000000e40)="3242702ecfd6570416cc88c91c0e", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x31) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x4, 0xfd, 0x0, 0x0, 0x98629, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1010000, 0x2, @perf_config_ext={0x9, 0x80000000000}, 0x800, 0x3, 0x20, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x2ff, 0x0, 0x9}, 0x0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r2, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0], 0x0, 0x43, &(0x7f0000000540), 0x0, 0x10, &(0x7f00000006c0), &(0x7f0000000e80), 0x8, 0xd0, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001040)=0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6972f00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1e000000050000000000000005000000c0800000", @ANYRES32=r1, @ANYBLOB='\b\x00'/20, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0200000004000d000000000001000000000000003e856ea24ab911beef23404b5c4266ec67db051c01b3f8734e2bfe8df945f04b08ccac1718486dc8276724c256bc9bbefc822b36d9143805c9f6f004d2a8d5a143afc0a605f207fc1e7168b75e5ddd5c1e33fc4c9d63597c6734adb56c5fecf962ab499ac9cc173af06150a3020b93fc95c526fd6d906c817373be3c85e1a6d4ce51eca98e", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00'], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xc, 0xff}, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[], 0x0, 0x5}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 616.531295ms ago: executing program 2 (id=5181): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x81, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x801, 0x2000000, 0x40000000, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x20000000, 0x80}, 0x10, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000000400000006"], 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000100)=r0, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) 273.927856ms ago: executing program 2 (id=5182): syz_clone(0x600, &(0x7f0000000040)="b1a5a11b47b228a7d2c0f65141912b59ad204f05a3c9cc6dfb0c7371af8879c8168c31926c594929f0b949154f6d844543626585fb2966acfd0d02fe44f4ccb1b9c9165f81e08274cab7ca70cb263b08918fb9248fdc2b97e9289c30eef2f027e3cc10ec1e60818af97c8e76807cb3af7487834b6d205bf87f5e201808520129a82fa2164b7e917d82b4c144cc999bdaff824127e3d62456188a0c5bb3824c54a683f3cb5c09af3025a52e2fbd5f5111210e03db4d9bf90563fc6affbb2f84d05bad1423c074d36e18ee3be86797ba3750171b83f4e775d1b3776848929d5ea05ca61c8ca322ee55de51344cf6b643b91ebca0", 0xf3, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000380)="5a010c5d7a20dad8888033d0c02b0831cc0bcf7cbc37dfe737ff5fcfa5bd579e46275c39ef34f25f33eb630096cc6bae83aade239b9a622c79364ed5f229fe7eeb2306e2ed9332a592d19d75e21cefa37c75d0155aa1feda81de5d7dd5054a988cca1694413c45be91f95bfb6f490e7bb3e36bbaae918118911f00ae477f16d40a625543e2b051d07484c3dc754fb1a32e730d8446e34d1a0d65fdcd629a29acba80dcbf0e8f4a680e443ef4d5fba1e1fd82552b4e1ac78cb813b2a3b6d7a0") ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x45, 0x0, 0x2}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b000000b9000000010001000900000001"], 0x48) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000008b000000050000000900000001000000", @ANYRES32=0x1, @ANYBLOB="0000000000000079b1ff02000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x80}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000600)={@fallback=r0, 0x3, 0x1, 0x1000, &(0x7f0000000500)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0]}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000002c0)={r1, &(0x7f00000002c0), &(0x7f0000000380)=""/107}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f0000000840)=""/215}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r4, 0x20, &(0x7f00000002c0)={&(0x7f0000000280)=""/15, 0xf, 0x0, &(0x7f0000001380)=""/227, 0xe3}}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'pimreg0\x00', 0x7c2}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000640)=""/204, 0x5c, 0xcc, 0x1}, 0x28) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x5}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001540)=@generic={&(0x7f0000001500)='./file0\x00', r6}, 0x18) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 114.07951ms ago: executing program 3 (id=5183): socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x304) (async) ioctl$TUNSETLINK(r2, 0x400454cd, 0x304) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) openat$tun(0xffffffffffffff9c, 0x0, 0x4100, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) (async) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000280)=0x6, 0x13) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x88, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000340)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x88, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000340)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000009000000f4e6b7b166bf9e2f5c4be5d8e585000000130000009500"/40], &(0x7f0000000000)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000009000000f4e6b7b166bf9e2f5c4be5d8e585000000130000009500"/40], &(0x7f0000000000)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r6, 0x0, 0x16, 0x0, &(0x7f00000008c0)="c1dfb080cd21d308098e000081007e2288a8849088a8", 0x0, 0x8006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r6, 0x0, 0x16, 0x0, &(0x7f00000008c0)="c1dfb080cd21d308098e000081007e2288a8849088a8", 0x0, 0x8006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x10, 0x2, 0x4, 0x0) (async) socketpair(0x10, 0x2, 0x4, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 111.13857ms ago: executing program 5 (id=5184): recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x9, 0x82a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x9200b000, 0x0, 0x49, 0x0, 0x0, 0x0) 16.043838ms ago: executing program 5 (id=5185): bpf$MAP_CREATE(0x300000000000000, 0x0, 0x48) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152, 0x0, 0x1b}, 0x94) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x19, 0x4, 0x8, 0x9}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="0b00000008000000020000000900000001"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000005c0)={r2}, 0xc) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xc5bf) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007044f16c01b1fbfd000000000000008af65f0df9928941994cc8c173fac5688671085a86d143c59fed0e57feb97f422c51d8e63b4ed9e295df3ccd1a55752dfc2f32f14b6c8f0e7413c3e9caaad30dcb412d0f54623f388bb2c63d2b1f7d83cd0cc021867bb4aee9967a6ee83e1b18fd8beca7d7eddcd96634"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x1}, 0x80) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x38, 0x0, &(0x7f0000000500)="2077e7dedda60fb505e6394d02d95ae1583b0f97782b80bb0e15fd51433a497e67474911a70c77e53c2086485135099591ce5d5bd6fc4e68", &(0x7f0000000000), 0x0, 0x0, 0xfffffffd}, 0x50) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$TUNSETPERSIST(r5, 0x400454cb, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000600)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x4000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000cd0a00000000000063019d00000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7}, 0x48) 0s ago: executing program 3 (id=5186): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x6) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x7, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0xab}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) kernel console output (not intermixed with test programs): ] RSP: 002b:00007f10de8a8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 59.081678][ T1699] RAX: ffffffffffffffda RBX: 00007f10e00c6fa0 RCX: 00007f10dfe4d629 [ 59.090018][ T1699] RDX: 0000000000000047 RSI: 0000200000000040 RDI: 0000000000000005 [ 59.098144][ T1699] RBP: 00007f10dfee3b39 R08: 0000000000000000 R09: 0000000000000000 [ 59.106254][ T1699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 59.116616][ T1699] R13: 00007f10e00c7038 R14: 00007f10e00c6fa0 R15: 00007fffedb56148 [ 59.124968][ T1699] ---[ end trace 8776cd30202e0f7e ]--- [ 59.283579][ T24] audit: type=1400 audit(1771432427.150:154): avc: denied { attach_queue } for pid=1761 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 59.735218][ T1778] tap0: tun_chr_ioctl cmd 1074025675 [ 59.740978][ T1778] tap0: persist enabled [ 59.745616][ T1778] tap0: tun_chr_ioctl cmd 1074025675 [ 59.751208][ T1778] tap0: persist enabled [ 59.755520][ T1778] tap0: tun_chr_ioctl cmd 2148553947 [ 59.761119][ T1779] tap0: tun_chr_ioctl cmd 2148553947 [ 59.776500][ T1778] tap0: tun_chr_ioctl cmd 1074025684 [ 59.805064][ T1778] device lo entered promiscuous mode [ 59.811756][ T1782] syz.1.446[1782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.811811][ T1782] syz.1.446[1782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.851456][ T1784] device syzkaller0 entered promiscuous mode [ 59.881574][ T1790] syzkaller0: create flow: hash 2422923682 index 0 [ 59.931659][ T662] syzkaller0: tun_net_xmit 48 [ 59.965354][ T1792] device syzkaller0 entered promiscuous mode [ 59.995170][ T1789] device syzkaller0 entered promiscuous mode [ 60.108784][ T24] audit: type=1400 audit(1771432427.970:155): avc: denied { create } for pid=1799 comm="syz.1.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 60.810805][ T1838] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.818059][ T1838] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.947093][ T1838] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.954344][ T1838] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.961674][ T1838] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.968718][ T1838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.179257][ T1838] device bridge0 entered promiscuous mode [ 61.861393][ T1893] device pim6reg1 left promiscuous mode [ 62.959231][ C1] syzkaller0: delete flow: hash 2422923682 index 0 [ 65.218396][ T24] audit: type=1400 audit(1771432433.080:156): avc: denied { create } for pid=2064 comm="syz.4.518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 65.239067][ T24] audit: type=1400 audit(1771432433.080:157): avc: denied { create } for pid=2064 comm="syz.4.518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 65.510969][ T2071] device pim6reg1 entered promiscuous mode [ 67.429190][ T24] audit: type=1400 audit(1771432435.270:158): avc: denied { create } for pid=2127 comm="syz.1.540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 68.165557][ T2202] device syzkaller0 entered promiscuous mode [ 68.615594][ T2210] device syzkaller0 entered promiscuous mode [ 70.523125][ T2339] batadv0: tun_chr_ioctl cmd 1074025677 [ 70.586757][ T2339] batadv0: linktype set to 823 [ 70.623172][ T2345] syzkaller0: tun_net_xmit 1280 [ 70.657794][ T2345] syzkaller0: create flow: hash 1058962602 index 1 [ 70.800577][ T2338] syzkaller0: delete flow: hash 1058962602 index 1 [ 72.716373][ T2422] device syzkaller0 entered promiscuous mode [ 73.092770][ T2447] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.101420][ T2447] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.321310][ T2454] device bridge_slave_1 left promiscuous mode [ 73.352835][ T2454] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.370039][ T2454] device bridge_slave_0 left promiscuous mode [ 73.391549][ T2454] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.066609][ T2485] device syzkaller0 left promiscuous mode [ 74.399960][ T2501] tun0: tun_chr_ioctl cmd 1074025678 [ 74.426033][ T2501] tun0: group set to 1 [ 76.169399][ T24] audit: type=1400 audit(1771432444.030:159): avc: denied { read } for pid=2599 comm="syz.1.686" name="cgroup.subtree_control" dev="cgroup2" ino=330 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 79.579969][ T2723] device syzkaller0 entered promiscuous mode [ 79.867595][ T2735] batadv0: tun_chr_ioctl cmd 1074025677 [ 79.893047][ T2735] batadv0: linktype set to 823 [ 82.092554][ T2861] device syzkaller0 entered promiscuous mode [ 82.135296][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 82.831737][ T2890] tap0: tun_chr_ioctl cmd 1074025675 [ 82.837081][ T2890] tap0: persist enabled [ 82.936176][ T2894] tap0: tun_chr_ioctl cmd 1074025675 [ 82.977735][ T2894] tap0: persist disabled [ 83.482484][ T24] audit: type=1400 audit(1771432451.350:160): avc: denied { create } for pid=2912 comm="syz.4.776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 85.016623][ T2977] device veth0_vlan left promiscuous mode [ 85.061179][ T2977] device veth0_vlan entered promiscuous mode [ 85.209427][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.217771][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.259540][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 85.508278][ T3012] device syzkaller0 entered promiscuous mode [ 85.657479][ T3005] device syzkaller0 entered promiscuous mode [ 86.085993][ T24] audit: type=1400 audit(1771432453.950:161): avc: denied { create } for pid=3036 comm="syz.2.811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 86.109751][ T3040] syz.3.812[3040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.109810][ T3040] syz.3.812[3040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.238446][ T24] audit: type=1400 audit(1771432454.100:162): avc: denied { read } for pid=3052 comm="syz.2.816" dev="nsfs" ino=4026532924 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.378881][ T24] audit: type=1400 audit(1771432454.190:163): avc: denied { open } for pid=3052 comm="syz.2.816" path="cgroup:[4026532924]" dev="nsfs" ino=4026532924 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.964894][ T3093] syz.4.829[3093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.964956][ T3093] syz.4.829[3093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.302938][ T3122] device syzkaller0 entered promiscuous mode [ 87.450898][ T3130] syz.4.840[3130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.450958][ T3130] syz.4.840[3130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.220719][ T3175] syz.4.852[3175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.298401][ T3175] syz.4.852[3175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.001155][ T3242] device syzkaller0 entered promiscuous mode [ 91.415324][ T3307] syz.0.891[3307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.415397][ T3307] syz.0.891[3307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.882525][ T3339] device syzkaller0 entered promiscuous mode [ 92.931010][ T3343] syz.2.904[3343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.931071][ T3343] syz.2.904[3343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.039534][ T3340] : renamed from bond_slave_0 [ 93.276885][ T3350] device wg2 entered promiscuous mode [ 93.313141][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 93.511712][ T3364] device syzkaller0 entered promiscuous mode [ 93.683146][ T3388] pimreg0: tun_chr_ioctl cmd 35111 [ 93.701365][ T3391] tap0: tun_chr_ioctl cmd 1074025677 [ 93.715184][ T3391] tap0: linktype set to 778 [ 93.729107][ T3388] : renamed from bond_slave_0 [ 95.754788][ T3507] syz.1.959[3507] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.760353][ T3507] syz.1.959[3507] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.011921][ T24] audit: type=1400 audit(1771432463.880:164): avc: denied { associate } for pid=3527 comm="syz.1.965" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 96.404960][ T3540] device wg2 left promiscuous mode [ 96.498399][ T3547] device wg2 entered promiscuous mode [ 96.532571][ T3547] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 98.627637][ T3656] device syzkaller0 entered promiscuous mode [ 99.310356][ T3691] device wg2 left promiscuous mode [ 99.376997][ T3697] device wg2 entered promiscuous mode [ 100.761712][ T3752] device syzkaller0 entered promiscuous mode [ 100.832541][ T3743] device wg2 entered promiscuous mode [ 101.245393][ T3785] device sit0 entered promiscuous mode [ 102.193796][ T3815] device syzkaller0 entered promiscuous mode [ 103.385250][ T3859] device dummy0 entered promiscuous mode [ 103.765307][ T24] audit: type=1400 audit(1771432471.630:165): avc: denied { create } for pid=3909 comm="syz.1.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 103.796649][ T3905] tun0: tun_chr_ioctl cmd 1074025678 [ 103.815171][ T3905] tun0: group set to 1 [ 104.145712][ T24] audit: type=1400 audit(1771432472.010:166): avc: denied { create } for pid=3944 comm="syz.3.1088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 104.320520][ T3964] tun0: tun_chr_ioctl cmd 1074025678 [ 104.326178][ T3964] tun0: group set to 1 [ 105.136777][ T4015] tun0: tun_chr_ioctl cmd 1074025678 [ 105.142656][ T4015] tun0: group set to 1 [ 105.770934][ T4051] syz.0.1121 (4051) used obsolete PPPIOCDETACH ioctl [ 106.039925][ T4064] tun0: tun_chr_ioctl cmd 1074025678 [ 106.057606][ T4064] tun0: group set to 1 [ 106.508724][ T4085] syz.1.1133[4085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.508786][ T4085] syz.1.1133[4085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.875228][ T4100] tun0: tun_chr_ioctl cmd 1074025678 [ 106.902756][ T4100] tun0: group set to 1 [ 107.820762][ T4122] syz.4.1144[4122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.820825][ T4122] syz.4.1144[4122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.311077][ T24] audit: type=1400 audit(1771432476.180:167): avc: denied { create } for pid=4137 comm="syz.2.1149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 108.448519][ T4146] tun0: tun_chr_ioctl cmd 1074025678 [ 108.494560][ T4146] tun0: group set to 1 [ 111.311476][ T4304] device syzkaller0 entered promiscuous mode [ 111.340819][ T4312] device syzkaller0 left promiscuous mode [ 111.474678][ T4316] device syzkaller0 entered promiscuous mode [ 111.614139][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 111.657238][ T4340] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 111.670915][ T4340] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 111.701973][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 111.715631][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 111.782509][ T4353] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 111.808921][ T4353] device syzkaller0 entered promiscuous mode [ 111.815442][ T4353] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 112.398487][ T4393] device wg2 entered promiscuous mode [ 112.418468][ T4393] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 112.786093][ T4417] device wg2 left promiscuous mode [ 113.486446][ T4445] device sit0 left promiscuous mode [ 113.602913][ T4450] device syzkaller0 left promiscuous mode [ 114.246391][ T4474] device syzkaller0 entered promiscuous mode [ 114.433121][ T4480] tun0: tun_chr_ioctl cmd 1074025678 [ 114.438582][ T4480] tun0: group set to 1 [ 115.391839][ T4529] device sit0 entered promiscuous mode [ 119.219595][ T4704] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.226784][ T4704] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.241261][ T4704] device bridge0 left promiscuous mode [ 119.316237][ T4704] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.323355][ T4704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 119.330705][ T4704] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.337789][ T4704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 119.353280][ T4704] device bridge0 entered promiscuous mode [ 119.661218][ T4748] tun0: tun_chr_ioctl cmd 1074025678 [ 119.666594][ T4748] tun0: group set to 1 [ 119.956005][ T4775] device syzkaller0 entered promiscuous mode [ 120.741987][ T4809] tun0: tun_chr_ioctl cmd 1074025678 [ 120.829077][ T4809] tun0: group set to 1 [ 120.883163][ T4806] device veth0_vlan left promiscuous mode [ 120.907330][ T4806] device veth0_vlan entered promiscuous mode [ 121.047741][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.056108][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.064415][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 121.334888][ T4820] device wg2 left promiscuous mode [ 121.403306][ T4822] device wg2 entered promiscuous mode [ 121.409597][ T4822] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 121.805715][ T4864] device wg2 left promiscuous mode [ 121.823540][ T4864] device wg2 entered promiscuous mode [ 121.840603][ T4867] tun0: tun_chr_ioctl cmd 1074025678 [ 121.846240][ T4867] tun0: group set to 1 [ 121.870143][ T4870] syz.1.1374[4870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.870194][ T4870] syz.1.1374[4870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.086516][ T4887] device pim6reg1 entered promiscuous mode [ 122.430795][ T4909] syz.1.1386[4909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.430849][ T4909] syz.1.1386[4909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.502123][ T4916] tun0: tun_chr_ioctl cmd 1074025678 [ 122.547311][ T4916] tun0: group set to 1 [ 123.164713][ T4928] device veth0_vlan left promiscuous mode [ 123.181734][ T4928] device veth0_vlan entered promiscuous mode [ 123.271116][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.280771][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.288330][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 123.637154][ T4957] tun0: tun_chr_ioctl cmd 1074025678 [ 123.646661][ T4957] tun0: group set to 1 [ 125.553854][ T5036] syz.3.1423[5036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.553914][ T5036] syz.3.1423[5036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.214751][ T5066] device syzkaller0 entered promiscuous mode [ 126.386468][ T5074] syz.4.1437[5074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.386525][ T5074] syz.4.1437[5074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.716825][ T5097] tun0: tun_chr_ioctl cmd 1074025673 [ 126.733931][ T5097] tun0: tun_chr_ioctl cmd 1074025673 [ 126.739968][ T5097] tun0: tun_chr_ioctl cmd 1074025673 [ 126.745368][ T5097] tun0: tun_chr_ioctl cmd 1074025673 [ 126.751669][ T5097] tun0: tun_chr_ioctl cmd 1074025673 [ 126.757342][ T5097] tun0: tun_chr_ioctl cmd 1074025673 [ 128.436198][ T24] audit: type=1400 audit(1771432496.300:168): avc: denied { ioctl } for pid=5171 comm="syz.4.1469" path="net:[4026532451]" dev="nsfs" ino=4026532451 ioctlcmd=0x54da scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 128.869075][ T5196] device aaaaaaaaaaaaaaa entered promiscuous mode [ 129.269627][ T5215] +: renamed from team_slave_1 [ 131.658765][ T5293] device sit0 left promiscuous mode [ 131.680796][ T5293] device sit0 entered promiscuous mode [ 132.822796][ T24] audit: type=1400 audit(1771432500.690:169): avc: denied { create } for pid=5330 comm="syz.4.1520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 133.139149][ T5345] tun0: tun_chr_ioctl cmd 1074025678 [ 133.155659][ T5345] tun0: group set to 1 [ 133.178388][ T5348] lo: mtu less than device minimum [ 133.560631][ T5361] device syzkaller0 entered promiscuous mode [ 133.952469][ T5381] tun0: tun_chr_ioctl cmd 1074025678 [ 133.957974][ T5381] tun0: group set to 1 [ 134.118481][ T24] audit: type=1400 audit(1771432501.980:170): avc: denied { create } for pid=5389 comm="syz.4.1538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 134.794347][ T5423] tun0: tun_chr_ioctl cmd 1074025678 [ 134.799986][ T5423] tun0: group set to 1 [ 135.537532][ T5463] : renamed from team_slave_1 [ 135.638177][ T5466] tun0: tun_chr_ioctl cmd 1074025678 [ 135.643667][ T5466] tun0: group set to 1 [ 136.224246][ T5489] device sit0 entered promiscuous mode [ 137.019557][ T5517] tun0: tun_chr_ioctl cmd 1074025678 [ 137.069360][ T5517] tun0: group set to 1 [ 137.643549][ T5545] -: renamed from syzkaller0 [ 138.135823][ T5573] tun0: tun_chr_ioctl cmd 1074025678 [ 138.143882][ T5573] tun0: group set to 1 [ 138.371114][ T5594] device syzkaller0 entered promiscuous mode [ 138.480019][ T5612] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 138.485871][ T5612] syzkaller0: linktype set to 773 [ 138.879771][ T5638] tun0: tun_chr_ioctl cmd 1074025678 [ 138.885292][ T5638] tun0: group set to 1 [ 139.266673][ T5676] device syzkaller0 entered promiscuous mode [ 139.976265][ T5701] tun0: tun_chr_ioctl cmd 1074025678 [ 139.984240][ T5701] tun0: group set to 1 [ 139.988451][ T5699] device syzkaller0 entered promiscuous mode [ 140.029737][ T5699] syzkaller0: mtu less than device minimum [ 141.172906][ T5764] tun0: tun_chr_ioctl cmd 1074025678 [ 141.191066][ T5764] tun0: group set to 1 [ 142.294640][ T5799] device sit0 left promiscuous mode [ 142.327195][ T5799] device sit0 entered promiscuous mode [ 142.392090][ T5808] device syzkaller0 entered promiscuous mode [ 143.381038][ T24] audit: type=1400 audit(1771432511.240:171): avc: denied { create } for pid=5857 comm="syz.2.1670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 145.153059][ T6013] device syzkaller0 entered promiscuous mode [ 146.721573][ T6113] device syzkaller0 entered promiscuous mode [ 146.805971][ T6126] syz.1.1747[6126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.806031][ T6126] syz.1.1747[6126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.121397][ T6135] syz.0.1752[6135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.202237][ T6135] syz.0.1752[6135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.412926][ T6181] syz.1.1760[6181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.505456][ T6181] syz.1.1760[6181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.649596][ T6190] tun0: tun_chr_ioctl cmd 1074025678 [ 148.667627][ T6190] tun0: group set to 1 [ 149.470660][ T6226] device pim6reg1 left promiscuous mode [ 149.750559][ T6246] syz.4.1782[6246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.750616][ T6246] syz.4.1782[6246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.831594][ T6248] tun0: tun_chr_ioctl cmd 1074025678 [ 149.848709][ T6248] tun0: group set to 1 [ 150.590909][ T6304] device wg2 left promiscuous mode [ 150.620707][ T6300] device syzkaller0 entered promiscuous mode [ 150.656295][ T6304] device wg2 entered promiscuous mode [ 151.332128][ T6343] syz.0.1812[6343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.332199][ T6343] syz.0.1812[6343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.351026][ T6341] device veth1_macvtap left promiscuous mode [ 152.680295][ T6410] device syzkaller0 entered promiscuous mode [ 153.255614][ T6437] syz.3.1840[6437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.255673][ T6437] syz.3.1840[6437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.731151][ T6475] syz.4.1854[6475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.788067][ T6475] syz.4.1854[6475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.649642][ T6532] syz.3.1871[6532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.685289][ T6532] syz.3.1871[6532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.443863][ T6570] device syzkaller0 entered promiscuous mode [ 155.502355][ T6571] device bridge_slave_0 entered promiscuous mode [ 155.535402][ T6575] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.542621][ T6575] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.783284][ T24] audit: type=1400 audit(1771432523.650:172): avc: denied { ioctl } for pid=6591 comm="syz.1.1890" path="" dev="cgroup2" ino=330 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 155.835783][ T6595] batadv0: tun_chr_ioctl cmd 1074025677 [ 155.845907][ T6595] batadv0: linktype set to 823 [ 156.037196][ T6603] device veth0_vlan left promiscuous mode [ 156.050230][ T6603] device veth0_vlan entered promiscuous mode [ 156.083264][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.095753][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.104210][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.171291][ T6608] tun0: tun_chr_ioctl cmd 1074025678 [ 156.176628][ T6608] tun0: group set to 1 [ 156.206830][ T6625] syz.1.1902 uses obsolete (PF_INET,SOCK_PACKET) [ 156.567232][ T6650] tun0: tun_chr_ioctl cmd 1074025678 [ 156.579452][ T6650] tun0: group set to 1 [ 156.836922][ T6671] device syzkaller0 entered promiscuous mode [ 157.239160][ T6701] tun0: tun_chr_ioctl cmd 1074025678 [ 157.244613][ T6701] tun0: group set to 1 [ 157.831919][ T6752] tun0: tun_chr_ioctl cmd 1074025678 [ 157.837323][ T6752] tun0: group set to 1 [ 158.151104][ T6771] device wg2 left promiscuous mode [ 158.185339][ T6771] device wg2 entered promiscuous mode [ 158.361350][ T6812] tun0: tun_chr_ioctl cmd 1074025678 [ 158.367511][ T6812] tun0: group set to 1 [ 158.921094][ T6882] tun0: tun_chr_ioctl cmd 1074025678 [ 158.934100][ T6882] tun0: group set to 1 [ 158.974191][ T6884] syz.2.1976[6884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.974247][ T6884] syz.2.1976[6884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.817076][ T6906] device veth0_vlan left promiscuous mode [ 159.872144][ T6906] device veth0_vlan entered promiscuous mode [ 160.110535][ T6918] syz.3.1988[6918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.110591][ T6918] syz.3.1988[6918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.248038][ T24] audit: type=1400 audit(1771432528.110:173): avc: denied { create } for pid=6925 comm="syz.3.1990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 161.041706][ T7005] device wg2 left promiscuous mode [ 161.048389][ T7005] device wg2 entered promiscuous mode [ 161.082575][ T7005] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 161.289700][ T7028] syz.4.2022[7028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.289760][ T7028] syz.4.2022[7028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.341036][ T7076] syz.1.2037[7076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.360139][ T7076] syz.1.2037[7076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.672890][ T7108] tap1: tun_chr_ioctl cmd 1074025677 [ 162.698989][ T7108] tap1: linktype set to 778 [ 162.704939][ T7106] device sit0 left promiscuous mode [ 162.756686][ T7110] : renamed from bond_slave_0 [ 162.762361][ T7113] device sit0 entered promiscuous mode [ 164.140010][ T7199] device syzkaller0 entered promiscuous mode [ 164.181243][ T7203] device syzkaller0 left promiscuous mode [ 164.700777][ T7229] device syzkaller0 entered promiscuous mode [ 165.041282][ T24] audit: type=1400 audit(1771432532.900:174): avc: denied { create } for pid=7252 comm="syz.1.2096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 165.131076][ T7264] device syzkaller0 entered promiscuous mode [ 167.491161][ T7354] device syzkaller0 entered promiscuous mode [ 169.342354][ T7441] syz.0.2149[7441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.342411][ T7441] syz.0.2149[7441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.509623][ T7444] batadv0: tun_chr_ioctl cmd 1074812118 [ 171.696590][ T7524] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 171.736849][ T7524] device syzkaller0 entered promiscuous mode [ 172.969256][ T7599] : renamed from vlan0 [ 174.510501][ T7675] device syzkaller0 entered promiscuous mode [ 175.168156][ T7710] device syzkaller0 entered promiscuous mode [ 175.691586][ T7736] tun0: tun_chr_ioctl cmd 1074025678 [ 175.717494][ T7736] tun0: group set to 1 [ 176.511587][ T7759] pimreg0: tun_chr_ioctl cmd 35111 [ 176.713201][ T7772] device veth0_vlan left promiscuous mode [ 176.735170][ T7772] device veth0_vlan entered promiscuous mode [ 176.810104][ T788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.818150][ T788] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.849131][ T788] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 176.910613][ T7791] tun0: tun_chr_ioctl cmd 1074025678 [ 176.969286][ T7791] tun0: group set to 1 [ 177.265364][ T7807] tap0: tun_chr_ioctl cmd 1074025681 [ 177.303481][ T7807] tap0: tun_chr_ioctl cmd 1074025673 [ 178.030192][ T7839] device wg2 entered promiscuous mode [ 180.768921][ T7986] tap1: tun_chr_ioctl cmd 1074025677 [ 180.779054][ T7986] tap1: linktype set to 270 [ 181.399993][ T8019] syzkaller0: create flow: hash 1058962602 index 2 [ 181.490651][ T8016] syzkaller0: delete flow: hash 1058962602 index 2 [ 182.536483][ T8085] IPv6: ADDRCONF(NETDEV_CHANGE): dummy0: link becomes ready [ 182.587877][ T8087] tun0: tun_chr_ioctl cmd 1074025678 [ 182.597340][ T8087] tun0: group set to 1 [ 182.637733][ T8089] device syzkaller0 entered promiscuous mode [ 184.692009][ T8197] syz.1.2373[8197] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.692072][ T8197] syz.1.2373[8197] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.568071][ T8240] device syzkaller0 entered promiscuous mode [ 186.880821][ T8270] syz.2.2393[8270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.880905][ T8270] syz.2.2393[8270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.530131][ T8277] tun0: tun_chr_ioctl cmd 1074025678 [ 187.549186][ T8277] tun0: group set to 1 [ 187.936003][ T8307] syz.4.2404[8307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.936068][ T8307] syz.4.2404[8307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.808317][ T8338] device syzkaller0 entered promiscuous mode [ 189.445015][ T8351] device lo entered promiscuous mode [ 190.210578][ T8393] device veth1_macvtap left promiscuous mode [ 190.275855][ T8393] device veth1_macvtap entered promiscuous mode [ 190.282637][ T8393] device macsec0 entered promiscuous mode [ 190.347398][ T8398] device syzkaller0 entered promiscuous mode [ 190.597080][ T8422] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 193.426761][ T8586] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 193.435388][ T8586] syzkaller0: persist disabled [ 193.792325][ T8601] device syzkaller0 entered promiscuous mode [ 194.281682][ T8618] bY4`Ҙ: renamed from lo [ 196.323565][ T8700] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 196.889323][ T8731] device bridge0 left promiscuous mode [ 196.990096][ T8731] device bridge_slave_1 left promiscuous mode [ 196.997954][ T8731] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.021262][ T8731] device bridge_slave_0 left promiscuous mode [ 197.044313][ T8731] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.133752][ T24] audit: type=1400 audit(1771432565.000:175): avc: denied { create } for pid=8741 comm="syz.1.2532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 197.464590][ T8743] device syzkaller0 entered promiscuous mode [ 198.320661][ T8797] tun0: tun_chr_ioctl cmd 1074025678 [ 198.326096][ T8797] tun0: group set to 1 [ 199.264909][ T8868] tun0: tun_chr_ioctl cmd 1074025678 [ 199.299082][ T8868] tun0: group set to 1 [ 199.967490][ T8900] device syzkaller0 entered promiscuous mode [ 200.445125][ T8949] device syzkaller0 entered promiscuous mode [ 201.407066][ T8991] device syzkaller0 left promiscuous mode [ 201.910556][ T9027] syz.3.2611[9027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.910616][ T9027] syz.3.2611[9027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.449928][ T9114] device pim6reg1 entered promiscuous mode [ 203.934542][ T9126] -: renamed from syzkaller0 [ 204.494288][ T9151] device veth0_vlan left promiscuous mode [ 204.509365][ T9151] device veth0_vlan entered promiscuous mode [ 204.516048][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.524293][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.532600][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 204.540140][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.562062][ T9193] syzkaller0: tun_chr_ioctl cmd 21731 [ 206.309264][ T9234] FAULT_INJECTION: forcing a failure. [ 206.309264][ T9234] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 206.408971][ T9234] CPU: 0 PID: 9234 Comm: syz.1.2678 Tainted: G W syzkaller #0 [ 206.417793][ T9234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 206.427892][ T9234] Call Trace: [ 206.431222][ T9234] __dump_stack+0x21/0x24 [ 206.435582][ T9234] dump_stack_lvl+0x1a7/0x208 [ 206.440291][ T9234] ? show_regs_print_info+0x18/0x18 [ 206.445530][ T9234] ? stack_trace_save+0xa6/0xf0 [ 206.450414][ T9234] ? stack_trace_snprint+0xf0/0xf0 [ 206.455589][ T9234] dump_stack+0x15/0x1c [ 206.459856][ T9234] should_fail+0x3c1/0x510 [ 206.464347][ T9234] should_fail_alloc_page+0x4f/0x60 [ 206.469569][ T9234] __alloc_pages_nodemask+0x119/0x620 [ 206.474991][ T9234] ? do_syscall_64+0x31/0x40 [ 206.479638][ T9234] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 206.485720][ T9234] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 206.491296][ T9234] kmalloc_order+0x4c/0x160 [ 206.495847][ T9234] kmalloc_order_trace+0x16/0x80 [ 206.500814][ T9234] __kmalloc+0x1eb/0x330 [ 206.505081][ T9234] kvmalloc_node+0x88/0x130 [ 206.509726][ T9234] btf_new_fd+0x1e4/0xa00 [ 206.514075][ T9234] bpf_btf_load+0x5e/0x70 [ 206.518418][ T9234] __se_sys_bpf+0x4ea/0x740 [ 206.522937][ T9234] ? __x64_sys_bpf+0x90/0x90 [ 206.527549][ T9234] ? debug_smp_processor_id+0x17/0x20 [ 206.532943][ T9234] __x64_sys_bpf+0x7b/0x90 [ 206.537386][ T9234] do_syscall_64+0x31/0x40 [ 206.541829][ T9234] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 206.547762][ T9234] RIP: 0033:0x7faf9621b629 [ 206.552214][ T9234] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 206.572021][ T9234] RSP: 002b:00007faf94c76028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 206.580709][ T9234] RAX: ffffffffffffffda RBX: 00007faf96494fa0 RCX: 00007faf9621b629 [ 206.588789][ T9234] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000012 [ 206.596866][ T9234] RBP: 00007faf94c76090 R08: 0000000000000000 R09: 0000000000000000 [ 206.604865][ T9234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 206.612851][ T9234] R13: 00007faf96495038 R14: 00007faf96494fa0 R15: 00007fffd073dcd8 [ 206.982194][ T9251] device pim6reg1 entered promiscuous mode [ 208.091613][ T9308] syz.3.2702[9308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.091674][ T9308] syz.3.2702[9308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.544702][ T9375] FAULT_INJECTION: forcing a failure. [ 209.544702][ T9375] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 209.659134][ T9375] CPU: 0 PID: 9375 Comm: syz.1.2718 Tainted: G W syzkaller #0 [ 209.668092][ T9375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 209.678167][ T9375] Call Trace: [ 209.681478][ T9375] __dump_stack+0x21/0x24 [ 209.685815][ T9375] dump_stack_lvl+0x1a7/0x208 [ 209.690499][ T9375] ? thaw_kernel_threads+0x220/0x220 [ 209.695787][ T9375] ? vsnprintf+0x189c/0x1990 [ 209.700390][ T9375] ? show_regs_print_info+0x18/0x18 [ 209.705602][ T9375] dump_stack+0x15/0x1c [ 209.709767][ T9375] should_fail+0x3c1/0x510 [ 209.714189][ T9375] should_fail_usercopy+0x1a/0x20 [ 209.719217][ T9375] _copy_to_user+0x20/0x90 [ 209.723643][ T9375] simple_read_from_buffer+0xe9/0x160 [ 209.729025][ T9375] proc_fail_nth_read+0x1a6/0x220 [ 209.734060][ T9375] ? proc_fault_inject_write+0x310/0x310 [ 209.739698][ T9375] ? rw_verify_area+0x1c0/0x360 [ 209.744551][ T9375] ? proc_fault_inject_write+0x310/0x310 [ 209.750193][ T9375] vfs_read+0x209/0xa60 [ 209.754357][ T9375] ? kernel_read+0x70/0x70 [ 209.758780][ T9375] ? __kasan_check_write+0x14/0x20 [ 209.763901][ T9375] ? mutex_lock+0x92/0xf0 [ 209.768237][ T9375] ? mutex_trylock+0xa0/0xa0 [ 209.772828][ T9375] ? __fget_files+0x2c4/0x320 [ 209.777509][ T9375] ? __fdget_pos+0x2d2/0x380 [ 209.782103][ T9375] ? ksys_read+0x71/0x250 [ 209.786439][ T9375] ksys_read+0x149/0x250 [ 209.790694][ T9375] ? vfs_write+0xdc0/0xdc0 [ 209.795118][ T9375] ? __kasan_check_read+0x11/0x20 [ 209.800143][ T9375] __x64_sys_read+0x7b/0x90 [ 209.804672][ T9375] do_syscall_64+0x31/0x40 [ 209.809108][ T9375] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 209.815002][ T9375] RIP: 0033:0x7faf961dbece [ 209.819423][ T9375] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 209.839039][ T9375] RSP: 002b:00007faf94c75fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 209.847452][ T9375] RAX: ffffffffffffffda RBX: 00007faf94c766c0 RCX: 00007faf961dbece [ 209.855428][ T9375] RDX: 000000000000000f RSI: 00007faf94c760a0 RDI: 0000000000000004 [ 209.863397][ T9375] RBP: 00007faf94c76090 R08: 0000000000000000 R09: 0000000000000000 [ 209.871368][ T9375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 209.879341][ T9375] R13: 00007faf96495038 R14: 00007faf96494fa0 R15: 00007fffd073dcd8 [ 210.331239][ T9393] FAULT_INJECTION: forcing a failure. [ 210.331239][ T9393] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 210.381572][ T9393] CPU: 0 PID: 9393 Comm: syz.0.2727 Tainted: G W syzkaller #0 [ 210.390388][ T9393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 210.400454][ T9393] Call Trace: [ 210.403763][ T9393] __dump_stack+0x21/0x24 [ 210.408106][ T9393] dump_stack_lvl+0x1a7/0x208 [ 210.412793][ T9393] ? thaw_kernel_threads+0x220/0x220 [ 210.418094][ T9393] ? show_regs_print_info+0x18/0x18 [ 210.423322][ T9393] ? proc_fail_nth_read+0x220/0x220 [ 210.428533][ T9393] dump_stack+0x15/0x1c [ 210.432701][ T9393] should_fail+0x3c1/0x510 [ 210.437143][ T9393] should_fail_usercopy+0x1a/0x20 [ 210.442182][ T9393] _copy_from_user+0x20/0xd0 [ 210.446788][ T9393] perf_copy_attr+0x14c/0x730 [ 210.451478][ T9393] __se_sys_perf_event_open+0x100/0x1b90 [ 210.457129][ T9393] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 210.462783][ T9393] __x64_sys_perf_event_open+0xbf/0xd0 [ 210.468266][ T9393] do_syscall_64+0x31/0x40 [ 210.472716][ T9393] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 210.478624][ T9393] RIP: 0033:0x7f042cfd8629 [ 210.483061][ T9393] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 210.502689][ T9393] RSP: 002b:00007f042ba33028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 210.511202][ T9393] RAX: ffffffffffffffda RBX: 00007f042d251fa0 RCX: 00007f042cfd8629 [ 210.519180][ T9393] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000040 [ 210.527159][ T9393] RBP: 00007f042ba33090 R08: 0000000000000000 R09: 0000000000000000 [ 210.535134][ T9393] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 210.543141][ T9393] R13: 00007f042d252038 R14: 00007f042d251fa0 R15: 00007ffe3d3bbbb8 [ 211.816210][ T9460] syzkaller0: tun_chr_ioctl cmd 1074025678 [ 211.824515][ T9460] syzkaller0: group set to 10 [ 213.055733][ T9514] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 214.318435][ T9564] device syzkaller0 entered promiscuous mode [ 214.731068][ T9573] device syzkaller0 entered promiscuous mode [ 214.969754][ T9596] device syzkaller0 entered promiscuous mode [ 215.203546][ T9622] device syzkaller0 entered promiscuous mode [ 216.163669][ T9665] tun0: tun_chr_ioctl cmd 1074025678 [ 216.185814][ T9665] tun0: group set to 1 [ 216.254713][ T9672] device syzkaller0 entered promiscuous mode [ 216.285497][ T9674] device sit0 entered promiscuous mode [ 216.869425][ T9707] device syzkaller0 entered promiscuous mode [ 217.445649][ T9726] device syzkaller0 entered promiscuous mode [ 217.991695][ T9753] bY4`Ҙ: renamed from lo [ 219.217176][ T9826] -1: renamed from syzkaller0 [ 219.700565][ T9841] syz.4.2862[9841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.700625][ T9841] syz.4.2862[9841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.434173][ T9866] device syzkaller0 entered promiscuous mode [ 220.764563][ T9885] syz.1.2875[9885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.764624][ T9885] syz.1.2875[9885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.018845][ T9909] tun0: tun_chr_ioctl cmd 1074025678 [ 221.036302][ T9909] tun0: group set to 1 [ 221.037997][ T24] audit: type=1400 audit(1771432588.900:176): avc: denied { mounton } for pid=9912 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 221.101760][ T9911] device syzkaller0 entered promiscuous mode [ 221.115716][ T9911] syzkaller0: create flow: hash 1058962602 index 1 [ 221.142383][ T5984] syzkaller0: tun_net_xmit 48 [ 221.162547][ T9910] syzkaller0: delete flow: hash 1058962602 index 1 [ 221.250252][ T9912] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.257376][ T9912] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.265458][ T9912] device bridge_slave_0 entered promiscuous mode [ 221.276576][ T9912] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.284023][ T9912] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.292123][ T9912] device bridge_slave_1 entered promiscuous mode [ 221.376414][ T9912] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.383769][ T9912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.391227][ T9912] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.398275][ T9912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.426628][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.446280][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.494388][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.526105][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.539488][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.546593][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.696993][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.720483][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.727593][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.818544][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.935095][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 221.955170][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.978675][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.998147][ T9912] device veth0_vlan entered promiscuous mode [ 222.025738][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.040544][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.085793][ T9912] device veth1_macvtap entered promiscuous mode [ 222.146915][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.188399][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 222.199873][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.237302][ T24] audit: type=1400 audit(1771432590.100:177): avc: denied { unmount } for pid=9912 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 222.237473][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 222.282806][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 222.301136][ T9971] tun0: tun_chr_ioctl cmd 1074025678 [ 222.306529][ T9971] tun0: group set to 1 [ 222.401554][ T9985] @: renamed from bond_slave_0 [ 223.122724][T10012] tun0: tun_chr_ioctl cmd 1074025678 [ 223.128083][T10012] tun0: group set to 1 [ 223.166652][T10017] device syzkaller0 entered promiscuous mode [ 223.212462][ T350] device macsec0 left promiscuous mode [ 223.218207][ T350] nr0: port 1(macsec0) entered disabled state [ 223.281195][ T350] device veth0_vlan left promiscuous mode [ 223.867923][T10036] device syzkaller0 entered promiscuous mode [ 224.694295][T10067] tun0: tun_chr_ioctl cmd 1074025678 [ 224.717887][T10067] tun0: group set to 1 [ 225.186799][T10093] device syzkaller0 entered promiscuous mode [ 225.574873][T10126] syz.1.2945[10126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.574941][T10126] syz.1.2945[10126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.683788][T10129] tun0: tun_chr_ioctl cmd 1074025678 [ 225.701658][T10129] tun0: group set to 1 [ 226.750602][T10172] syz.0.2956[10172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.750665][T10172] syz.0.2956[10172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.435858][T10220] device syzkaller0 entered promiscuous mode [ 228.316705][T10260] device macsec0 entered promiscuous mode [ 228.394904][T10260] device veth1_macvtap entered promiscuous mode [ 228.957680][T10274] device syzkaller0 entered promiscuous mode [ 229.167685][T10292] device syzkaller0 entered promiscuous mode [ 229.234564][T10275] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.261998][T10275] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.299123][T10275] device bridge_slave_0 entered promiscuous mode [ 229.317601][T10275] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.329215][T10275] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.340088][T10275] device bridge_slave_1 entered promiscuous mode [ 229.351892][T10299] device sit0 left promiscuous mode [ 229.597129][T10275] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.604257][T10275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.611651][T10275] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.618695][T10275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.629840][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.647080][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.769052][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.789311][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.817166][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.848569][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.864835][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.871972][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.899457][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.913424][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.929023][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.936167][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.952475][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.966164][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.124434][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.147582][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.261379][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.293684][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.339196][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.357380][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.380264][T10275] device veth0_vlan entered promiscuous mode [ 230.397876][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.428097][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.554559][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.568240][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.585822][T10338] syz.2.3006[10338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.585884][T10338] syz.2.3006[10338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.601391][T10275] device veth1_macvtap entered promiscuous mode [ 230.681023][T10337] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.688300][T10337] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.707323][T10337] device bridge0 left promiscuous mode [ 230.714118][T10344] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.721220][T10344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.728563][T10344] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.735636][T10344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.754621][T10344] device bridge0 entered promiscuous mode [ 230.769129][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.853265][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.862788][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.871452][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.881720][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.013205][T10373] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.026447][T10373] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.034060][T10373] device bridge_slave_0 entered promiscuous mode [ 233.043684][T10373] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.051412][T10373] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.058916][T10373] device bridge_slave_1 entered promiscuous mode [ 233.164794][ T350] device veth1_macvtap left promiscuous mode [ 233.414387][T10383] device sit0 left promiscuous mode [ 233.571084][T10384] device sit0 entered promiscuous mode [ 233.751208][T10394] syz.2.3020[10394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.751279][T10394] syz.2.3020[10394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.813474][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.833357][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.859501][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.870018][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.878353][ T783] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.885427][ T783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.910338][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.918878][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.927450][ T783] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.934553][ T783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.942907][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.961961][T10407] tun0: tun_chr_ioctl cmd 1074025678 [ 233.967384][T10407] tun0: group set to 1 [ 234.002554][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.011464][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.057658][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.069373][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.077765][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.087132][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.096917][T10373] device veth0_vlan entered promiscuous mode [ 234.134294][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 234.158942][T10373] device veth1_macvtap entered promiscuous mode [ 234.211595][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.226735][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 234.891262][ T350] device veth1_macvtap left promiscuous mode [ 235.689609][T10444] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.714558][T10444] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.742070][T10444] device bridge_slave_0 entered promiscuous mode [ 235.765010][T10444] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.772148][T10444] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.779732][T10444] device bridge_slave_1 entered promiscuous mode [ 235.959947][T10468] device syzkaller0 entered promiscuous mode [ 236.158119][T10444] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.165236][T10444] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.172598][T10444] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.179659][T10444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.235551][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.246501][ T783] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.254456][ T783] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.300752][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.316556][ T783] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.323703][ T783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.332405][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.341105][ T783] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.348183][ T783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.355945][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.364084][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.476984][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 236.530527][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 236.562479][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 236.579576][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.591414][T10444] device veth0_vlan entered promiscuous mode [ 236.618366][T10502] device syzkaller0 entered promiscuous mode [ 236.647881][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 236.679456][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 236.697883][T10444] device veth1_macvtap entered promiscuous mode [ 236.931766][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 236.946003][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.978003][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.031066][T10520] device wg2 left promiscuous mode [ 237.076810][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 237.091956][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 237.363913][T10525] device syzkaller0 entered promiscuous mode [ 237.542642][ T350] GPL: port 1(erspan0) entered disabled state [ 237.564618][ T350] device erspan0 left promiscuous mode [ 237.584612][ T350] GPL: port 1(erspan0) entered disabled state [ 237.710937][T10556] device syzkaller0 entered promiscuous mode [ 238.262217][ T350] device bridge_slave_1 left promiscuous mode [ 238.268434][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.286139][ T350] device bridge_slave_0 left promiscuous mode [ 238.302251][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.318589][ T350] device veth1_macvtap left promiscuous mode [ 239.724404][T10656] GPL: port 1(erspan0) entered blocking state [ 239.739094][T10656] GPL: port 1(erspan0) entered disabled state [ 239.758174][T10656] device erspan0 entered promiscuous mode [ 239.816624][T10663] GPL: port 1(erspan0) entered blocking state [ 239.822804][T10663] GPL: port 1(erspan0) entered forwarding state [ 240.622435][T10673] device syzkaller0 entered promiscuous mode [ 242.331956][T10763] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.342089][T10763] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.683151][T10865] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 245.003792][T10878] device syzkaller0 entered promiscuous mode [ 245.254885][T10902] device syzkaller0 entered promiscuous mode [ 246.671085][T10961] syz.3.3197[10961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.671148][T10961] syz.3.3197[10961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.693919][T10959] device syzkaller0 entered promiscuous mode [ 247.143127][T10986] device syzkaller0 entered promiscuous mode [ 247.406938][T10996] device syzkaller0 entered promiscuous mode [ 248.304180][T11065] device wg2 entered promiscuous mode [ 248.812559][ T278] cgroup: fork rejected by pids controller in /syz3 [ 249.417184][T11117] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.432109][T11117] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.447694][T11117] device bridge_slave_0 entered promiscuous mode [ 249.494928][T11117] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.504971][T11117] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.513333][T11117] device bridge_slave_1 entered promiscuous mode [ 249.691564][T11136] device lo entered promiscuous mode [ 249.780054][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.790263][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.840506][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.849554][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.870497][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.877679][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.899299][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.919382][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.937850][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.944958][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.973447][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.989364][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.028712][T11117] device veth0_vlan entered promiscuous mode [ 250.052064][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.070113][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.088485][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.101533][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.124882][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.149115][T11117] device veth1_macvtap entered promiscuous mode [ 250.170415][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.193225][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.222768][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 251.079142][T11251] device syzkaller0 entered promiscuous mode [ 251.586588][T11311] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.594150][T11311] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.941239][T11400] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.951097][T11400] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.037645][T11400] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.044837][T11400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.056397][T11400] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.063701][T11400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.075207][T11400] device bridge0 entered promiscuous mode [ 253.472747][T11420] device syzkaller0 entered promiscuous mode [ 254.052519][T11440] device syzkaller0 entered promiscuous mode [ 254.093230][T11451] device syzkaller0 entered promiscuous mode [ 254.207132][T11455] device syzkaller0 entered promiscuous mode [ 255.364264][T11521] device syzkaller0 entered promiscuous mode [ 255.711973][T11551] device syzkaller0 entered promiscuous mode [ 257.585220][T11635] tun0: tun_chr_ioctl cmd 1074025678 [ 257.600952][T11635] tun0: group set to 1 [ 258.668353][T11694] device syzkaller0 entered promiscuous mode [ 260.716370][T11806] syz.1.3507[11806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.716433][T11806] syz.1.3507[11806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.032227][T11832] syz.0.3516[11832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.079604][T11832] syz.0.3516[11832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.097871][T11827] device syzkaller0 entered promiscuous mode [ 261.345657][T11850] syz.3.3523[11850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.348318][T11850] syz.3.3523[11850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.684954][T11859] tun0: tun_chr_ioctl cmd 1074025678 [ 261.730103][T11859] tun0: group set to 1 [ 262.175501][T11890] syz.2.3535[11890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.175554][T11890] syz.2.3535[11890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.970391][T11937] syz.0.3550[11937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.008925][T11937] syz.0.3550[11937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.448889][T11970] cgroup: fork rejected by pids controller in /syz4 [ 264.584288][T12025] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.591611][T12025] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.599161][T12025] device bridge_slave_0 entered promiscuous mode [ 264.648095][T12025] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.655404][T12025] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.663229][T12025] device bridge_slave_1 entered promiscuous mode [ 264.977085][T12025] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.984431][T12025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.991753][T12025] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.998784][T12025] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.256594][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.265041][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.437679][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.445502][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.453084][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.462343][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.471075][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.478129][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.533610][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.555653][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.571356][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.578476][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.586088][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 265.594686][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.617095][ T9] device bridge_slave_1 left promiscuous mode [ 265.624531][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.632771][ T9] device bridge_slave_0 left promiscuous mode [ 265.639306][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.657930][ T9] device veth1_macvtap left promiscuous mode [ 265.762423][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 265.770658][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.797482][T12078] device syzkaller0 entered promiscuous mode [ 265.943689][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 265.968131][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 266.042918][T12084] device veth1_macvtap left promiscuous mode [ 266.100837][T12025] device veth0_vlan entered promiscuous mode [ 266.107439][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 266.116025][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.211845][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.221198][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.233585][T12025] device veth1_macvtap entered promiscuous mode [ 266.267420][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 266.276394][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 266.285478][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 266.410521][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 266.419293][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 266.480268][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 266.489813][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 266.816389][T12112] tun0: tun_chr_ioctl cmd 1074025678 [ 266.822001][T12112] tun0: group set to 1 [ 268.214146][T12152] syz.3.3614[12152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.214221][T12152] syz.3.3614[12152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.451925][T12172] 0: renamed from pim6reg1 [ 268.992856][T12186] device syzkaller0 entered promiscuous mode [ 270.604927][T12282] tap0: tun_chr_ioctl cmd 1074025677 [ 270.639377][T12282] tap0: linktype set to 270 [ 271.551791][T12323] device wg2 left promiscuous mode [ 272.182603][T12375] ref_ctr_offset mismatch. inode: 0x31a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 272.961367][T12409] device syzkaller0 entered promiscuous mode [ 274.822290][T12514] device sit0 entered promiscuous mode [ 274.974500][T12525] syz.1.3729[12525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.974565][T12525] syz.1.3729[12525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.459937][T12558] device syzkaller0 entered promiscuous mode [ 275.962138][T12585] device syzkaller0 entered promiscuous mode [ 277.123441][T12619] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 277.436955][T12631] FAULT_INJECTION: forcing a failure. [ 277.436955][T12631] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 277.527051][T12631] CPU: 0 PID: 12631 Comm: syz.3.3767 Tainted: G W syzkaller #0 [ 277.535960][T12631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 277.546037][T12631] Call Trace: [ 277.549356][T12631] __dump_stack+0x21/0x24 [ 277.553712][T12631] dump_stack_lvl+0x1a7/0x208 [ 277.558413][T12631] ? show_regs_print_info+0x18/0x18 [ 277.563640][T12631] dump_stack+0x15/0x1c [ 277.567831][T12631] should_fail+0x3c1/0x510 [ 277.572277][T12631] should_fail_usercopy+0x1a/0x20 [ 277.577328][T12631] strncpy_from_user+0x24/0x2e0 [ 277.582354][T12631] bpf_prog_load+0x18c/0x14a0 [ 277.587050][T12631] ? avc_has_perm_noaudit+0x260/0x260 [ 277.592436][T12631] ? map_freeze+0x320/0x320 [ 277.596953][T12631] ? vfs_write+0xb27/0xdc0 [ 277.601389][T12631] ? selinux_bpf+0xc7/0xf0 [ 277.605834][T12631] ? security_bpf+0x82/0xa0 [ 277.610357][T12631] __se_sys_bpf+0x49a/0x740 [ 277.614880][T12631] ? __x64_sys_bpf+0x90/0x90 [ 277.619501][T12631] ? debug_smp_processor_id+0x17/0x20 [ 277.624902][T12631] __x64_sys_bpf+0x7b/0x90 [ 277.629328][T12631] do_syscall_64+0x31/0x40 [ 277.633764][T12631] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 277.639680][T12631] RIP: 0033:0x7f0a84a20629 [ 277.644120][T12631] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 277.663749][T12631] RSP: 002b:00007f0a8347b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 277.672195][T12631] RAX: ffffffffffffffda RBX: 00007f0a84c99fa0 RCX: 00007f0a84a20629 [ 277.680186][T12631] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 0000000000000005 [ 277.688173][T12631] RBP: 00007f0a8347b090 R08: 0000000000000000 R09: 0000000000000000 [ 277.696180][T12631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.704181][T12631] R13: 00007f0a84c9a038 R14: 00007f0a84c99fa0 R15: 00007ffcef372898 [ 277.716469][T12629] device syzkaller0 entered promiscuous mode [ 278.363339][T12671] FAULT_INJECTION: forcing a failure. [ 278.363339][T12671] name failslab, interval 1, probability 0, space 0, times 1 [ 278.376244][T12671] CPU: 0 PID: 12671 Comm: syz.2.3780 Tainted: G W syzkaller #0 [ 278.385124][T12671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 278.395203][T12671] Call Trace: [ 278.398513][T12671] __dump_stack+0x21/0x24 [ 278.402860][T12671] dump_stack_lvl+0x1a7/0x208 [ 278.407551][T12671] ? thaw_kernel_threads+0x220/0x220 [ 278.412848][T12671] ? show_regs_print_info+0x18/0x18 [ 278.418060][T12671] ? unwind_get_return_address+0x4d/0x90 [ 278.423706][T12671] ? stack_trace_save+0xf0/0xf0 [ 278.428573][T12671] dump_stack+0x15/0x1c [ 278.432754][T12671] should_fail+0x3c1/0x510 [ 278.437183][T12671] ? __get_vm_area_node+0x113/0x450 [ 278.442398][T12671] __should_failslab+0xa4/0xe0 [ 278.447178][T12671] should_failslab+0x9/0x20 [ 278.451838][T12671] kmem_cache_alloc_trace+0x3a/0x2e0 [ 278.457152][T12671] __get_vm_area_node+0x113/0x450 [ 278.462196][T12671] __vmalloc_node_range+0xe0/0x790 [ 278.467323][T12671] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 278.472884][T12671] ? _kstrtoull+0x3c0/0x4d0 [ 278.477401][T12671] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 278.482970][T12671] __vmalloc+0x79/0x90 [ 278.487057][T12671] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 278.492614][T12671] bpf_prog_alloc_no_stats+0x3b/0x250 [ 278.497999][T12671] ? bpf_prog_alloc+0x17/0x1f0 [ 278.502787][T12671] bpf_prog_alloc+0x21/0x1f0 [ 278.507385][T12671] bpf_prog_load+0x7c4/0x14a0 [ 278.512076][T12671] ? map_freeze+0x320/0x320 [ 278.516585][T12671] ? vfs_write+0xb27/0xdc0 [ 278.521013][T12671] ? selinux_bpf+0xc7/0xf0 [ 278.525440][T12671] ? security_bpf+0x82/0xa0 [ 278.529956][T12671] __se_sys_bpf+0x49a/0x740 [ 278.534476][T12671] ? __x64_sys_bpf+0x90/0x90 [ 278.539131][T12671] ? debug_smp_processor_id+0x17/0x20 [ 278.544519][T12671] __x64_sys_bpf+0x7b/0x90 [ 278.548962][T12671] do_syscall_64+0x31/0x40 [ 278.553393][T12671] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 278.559288][T12671] RIP: 0033:0x7f7829afe629 [ 278.563725][T12671] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 278.583350][T12671] RSP: 002b:00007f7828559028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 278.591776][T12671] RAX: ffffffffffffffda RBX: 00007f7829d77fa0 RCX: 00007f7829afe629 [ 278.599757][T12671] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 0000000000000005 [ 278.607736][T12671] RBP: 00007f7828559090 R08: 0000000000000000 R09: 0000000000000000 [ 278.615717][T12671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.623716][T12671] R13: 00007f7829d78038 R14: 00007f7829d77fa0 R15: 00007ffd403d9b18 [ 278.639167][T12671] syz.2.3780: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 278.679050][T12671] CPU: 1 PID: 12671 Comm: syz.2.3780 Tainted: G W syzkaller #0 [ 278.687954][T12671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 278.698044][T12671] Call Trace: [ 278.701360][T12671] __dump_stack+0x21/0x24 [ 278.705715][T12671] dump_stack_lvl+0x1a7/0x208 [ 278.710416][T12671] ? show_regs_print_info+0x18/0x18 [ 278.715645][T12671] ? pr_cont_kernfs_name+0xe3/0xf0 [ 278.720779][T12671] dump_stack+0x15/0x1c [ 278.724949][T12671] warn_alloc+0x1dc/0x200 [ 278.729300][T12671] ? __get_vm_area_node+0x113/0x450 [ 278.734516][T12671] ? zone_watermark_ok_safe+0x250/0x250 [ 278.740218][T12671] ? __get_vm_area_node+0x345/0x450 [ 278.745436][T12671] __vmalloc_node_range+0x27d/0x790 [ 278.750651][T12671] ? _kstrtoull+0x3c0/0x4d0 [ 278.755157][T12671] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 278.760702][T12671] __vmalloc+0x79/0x90 [ 278.764787][T12671] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 278.770334][T12671] bpf_prog_alloc_no_stats+0x3b/0x250 [ 278.775707][T12671] ? bpf_prog_alloc+0x17/0x1f0 [ 278.780472][T12671] bpf_prog_alloc+0x21/0x1f0 [ 278.785060][T12671] bpf_prog_load+0x7c4/0x14a0 [ 278.789742][T12671] ? map_freeze+0x320/0x320 [ 278.794258][T12671] ? vfs_write+0xb27/0xdc0 [ 278.798680][T12671] ? selinux_bpf+0xc7/0xf0 [ 278.803098][T12671] ? security_bpf+0x82/0xa0 [ 278.807620][T12671] __se_sys_bpf+0x49a/0x740 [ 278.812121][T12671] ? __x64_sys_bpf+0x90/0x90 [ 278.816717][T12671] ? debug_smp_processor_id+0x17/0x20 [ 278.822087][T12671] __x64_sys_bpf+0x7b/0x90 [ 278.826501][T12671] do_syscall_64+0x31/0x40 [ 278.830924][T12671] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 278.836817][T12671] RIP: 0033:0x7f7829afe629 [ 278.841239][T12671] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 278.860847][T12671] RSP: 002b:00007f7828559028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 278.869264][T12671] RAX: ffffffffffffffda RBX: 00007f7829d77fa0 RCX: 00007f7829afe629 [ 278.877240][T12671] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 0000000000000005 [ 278.885213][T12671] RBP: 00007f7828559090 R08: 0000000000000000 R09: 0000000000000000 [ 278.893191][T12671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.901173][T12671] R13: 00007f7829d78038 R14: 00007f7829d77fa0 R15: 00007ffd403d9b18 [ 279.036022][T12676] device syzkaller0 entered promiscuous mode [ 279.221509][T12671] Mem-Info: [ 279.296473][T12671] active_anon:41 inactive_anon:53955 isolated_anon:0 [ 279.296473][T12671] active_file:25145 inactive_file:2931 isolated_file:0 [ 279.296473][T12671] unevictable:0 dirty:176 writeback:0 [ 279.296473][T12671] slab_reclaimable:7567 slab_unreclaimable:86314 [ 279.296473][T12671] mapped:29438 shmem:34670 pagetables:619 bounce:0 [ 279.296473][T12671] free:1507973 free_pcp:1046 free_cma:0 [ 279.349167][T12671] Node 0 active_anon:164kB inactive_anon:213720kB active_file:100580kB inactive_file:11724kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117752kB dirty:704kB writeback:0kB shmem:136780kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:7808kB all_unreclaimable? no [ 279.379018][T12671] DMA32 free:2985148kB min:62644kB low:78304kB high:93964kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2986532kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1384kB local_pcp:52kB free_cma:0kB [ 279.430974][T12671] lowmem_reserve[]: 0 3941 3941 [ 279.436015][T12671] Normal free:3055364kB min:84808kB low:106008kB high:127208kB reserved_highatomic:0KB active_anon:164kB inactive_anon:207420kB active_file:100580kB inactive_file:11724kB unevictable:0kB writepending:704kB present:5242880kB managed:4036112kB mlocked:0kB pagetables:2328kB bounce:0kB free_pcp:2944kB local_pcp:1400kB free_cma:0kB [ 279.506312][T12671] lowmem_reserve[]: 0 0 0 [ 279.511029][T12671] DMA32: 5*4kB (UM) 3*8kB (M) 3*16kB (M) 7*32kB (UM) 8*64kB (UM) 5*128kB (UM) 7*256kB (UM) 6*512kB (M) 5*1024kB (UM) 4*2048kB (UM) 724*4096kB (M) = 2985148kB [ 279.527352][T12671] Normal: 1606*4kB (UME) 753*8kB (UME) 743*16kB (UME) 795*32kB (UME) 420*64kB (UME) 578*128kB (UME) 109*256kB (UM) 19*512kB (UM) 8*1024kB (UME) 1*2048kB (M) 701*4096kB (UM) = 3069808kB [ 279.545939][T12671] 56446 total pagecache pages [ 279.555896][T12671] 0 pages in swap cache [ 279.560572][T12671] Swap cache stats: add 0, delete 0, find 0/0 [ 279.567039][T12671] Free swap = 124996kB [ 279.571444][T12671] Total swap = 124996kB [ 279.575622][T12671] 2097051 pages RAM [ 279.579743][T12671] 0 pages HighMem/MovableOnly [ 279.593733][T12671] 341390 pages reserved [ 279.597936][T12671] 0 pages cma reserved [ 280.855966][T12727] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.863485][T12727] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.871046][T12727] device bridge_slave_0 entered promiscuous mode [ 280.878284][T12727] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.885697][T12727] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.893430][T12727] device bridge_slave_1 entered promiscuous mode [ 281.150774][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 281.165078][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.197560][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.231168][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.239726][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.247100][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.254822][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.279969][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.288308][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.295482][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.332439][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 281.372386][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.380703][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.398607][T12727] device veth0_vlan entered promiscuous mode [ 281.469871][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.498667][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.507406][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.515263][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.532869][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.567989][T12727] device veth1_macvtap entered promiscuous mode [ 281.629886][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.649604][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.668553][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.717425][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 282.033482][ T48] device bridge_slave_1 left promiscuous mode [ 282.051672][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.120660][ T48] device bridge_slave_0 left promiscuous mode [ 282.170085][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.245914][ T48] device veth1_macvtap left promiscuous mode [ 282.254919][ T48] device veth0_vlan left promiscuous mode [ 282.554017][T12809] : renamed from vlan1 [ 282.791815][T12815] device syzkaller0 entered promiscuous mode [ 282.851802][T12817] tun0: tun_chr_ioctl cmd 1074025678 [ 282.857148][T12817] tun0: group set to 1 [ 282.915255][T12820] syz.1.3825[12820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.915318][T12820] syz.1.3825[12820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.219559][T12933] device sit0 left promiscuous mode [ 287.026441][T13016] syz.1.3883[13016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.026508][T13016] syz.1.3883[13016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.068495][T13019] device syzkaller0 entered promiscuous mode [ 288.093852][T13086] device syzkaller0 entered promiscuous mode [ 288.171258][T13099] device syzkaller0 entered promiscuous mode [ 289.030565][T13157] syz.1.3931[13157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.030605][T13156] syz.1.3931[13156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.030612][T13157] syz.1.3931[13157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.139012][T13163] device sit0 entered promiscuous mode [ 290.769992][T13230] FAULT_INJECTION: forcing a failure. [ 290.769992][T13230] name failslab, interval 1, probability 0, space 0, times 0 [ 290.776527][T13227] device syzkaller0 entered promiscuous mode [ 290.789789][T13230] CPU: 0 PID: 13230 Comm: syz.4.3955 Tainted: G W syzkaller #0 [ 290.798681][T13230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 290.808764][T13230] Call Trace: [ 290.812088][T13230] __dump_stack+0x21/0x24 [ 290.816542][T13230] dump_stack_lvl+0x1a7/0x208 [ 290.821258][T13230] ? show_regs_print_info+0x18/0x18 [ 290.826488][T13230] ? __stack_depot_save+0x1c0/0x4c0 [ 290.831716][T13230] dump_stack+0x15/0x1c [ 290.835896][T13230] should_fail+0x3c1/0x510 [ 290.840339][T13230] ? __get_vm_area_node+0x113/0x450 [ 290.845568][T13230] __should_failslab+0xa4/0xe0 [ 290.850346][T13230] should_failslab+0x9/0x20 [ 290.854858][T13230] kmem_cache_alloc_trace+0x3a/0x2e0 [ 290.860149][T13230] __get_vm_area_node+0x113/0x450 [ 290.865185][T13230] __vmalloc_node_range+0xe0/0x790 [ 290.870323][T13230] ? dev_map_create_hash+0x29/0x1e0 [ 290.875540][T13230] bpf_map_area_alloc+0xd5/0xe0 [ 290.880394][T13230] ? dev_map_create_hash+0x29/0x1e0 [ 290.885598][T13230] dev_map_create_hash+0x29/0x1e0 [ 290.890635][T13230] ? bpf_map_charge_init+0x1ae/0x240 [ 290.895928][T13230] dev_map_alloc+0x340/0x6b0 [ 290.900523][T13230] map_create+0x44e/0x2090 [ 290.904947][T13230] __se_sys_bpf+0x24b/0x740 [ 290.909453][T13230] ? __x64_sys_bpf+0x90/0x90 [ 290.914064][T13230] ? debug_smp_processor_id+0x17/0x20 [ 290.919473][T13230] __x64_sys_bpf+0x7b/0x90 [ 290.923925][T13230] do_syscall_64+0x31/0x40 [ 290.928349][T13230] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 290.934244][T13230] RIP: 0033:0x7f18c612b629 [ 290.938669][T13230] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 290.958291][T13230] RSP: 002b:00007f18c4b86028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 290.966717][T13230] RAX: ffffffffffffffda RBX: 00007f18c63a4fa0 RCX: 00007f18c612b629 [ 290.974694][T13230] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 290.982687][T13230] RBP: 00007f18c4b86090 R08: 0000000000000000 R09: 0000000000000000 [ 290.990669][T13230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.998646][T13230] R13: 00007f18c63a5038 R14: 00007f18c63a4fa0 R15: 00007ffc34922398 [ 293.336297][ T24] audit: type=1400 audit(1771432661.200:178): avc: denied { create } for pid=13325 comm="syz.2.3981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 293.363298][T13324] bridge0: port 3(veth0_to_team) entered blocking state [ 293.376434][T13324] bridge0: port 3(veth0_to_team) entered disabled state [ 293.384426][T13324] device veth0_to_team entered promiscuous mode [ 293.456652][T13334] syz.2.3986[13334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.456714][T13334] syz.2.3986[13334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.614860][T13356] -: renamed from syzkaller0 [ 294.091442][T13382] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 294.389614][T13397] device syzkaller0 entered promiscuous mode [ 294.566536][T13405] device syzkaller0 entered promiscuous mode [ 295.532073][T13435] syz.0.4013[13435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.532140][T13435] syz.0.4013[13435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.549186][T13478] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.567801][T13478] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.623319][T13478] device bridge0 left promiscuous mode [ 296.700531][T13481] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.707629][T13481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.714978][T13481] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.722076][T13481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.739557][T13481] device bridge0 entered promiscuous mode [ 296.780656][T13486] lo: mtu less than device minimum [ 297.280610][T13511] : renamed from vlan1 [ 298.713499][T13563] device bridge0 entered promiscuous mode [ 299.698725][T13624] FAULT_INJECTION: forcing a failure. [ 299.698725][T13624] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 299.754234][T13624] CPU: 1 PID: 13624 Comm: syz.3.4074 Tainted: G W syzkaller #0 [ 299.763136][T13624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 299.773242][T13624] Call Trace: [ 299.776563][T13624] __dump_stack+0x21/0x24 [ 299.780920][T13624] dump_stack_lvl+0x1a7/0x208 [ 299.785633][T13624] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 299.791805][T13624] ? show_regs_print_info+0x18/0x18 [ 299.797029][T13624] dump_stack+0x15/0x1c [ 299.801195][T13624] should_fail+0x3c1/0x510 [ 299.805628][T13624] should_fail_alloc_page+0x4f/0x60 [ 299.810838][T13624] __alloc_pages_nodemask+0x119/0x620 [ 299.816242][T13624] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 299.821801][T13624] ? _raw_spin_trylock_bh+0x150/0x150 [ 299.827199][T13624] ? kvm_sched_clock_read+0x18/0x40 [ 299.832425][T13624] ? sched_clock+0x3a/0x40 [ 299.836851][T13624] __get_free_pages+0xe/0x30 [ 299.841484][T13624] kasan_populate_vmalloc_pte+0x29/0x120 [ 299.847135][T13624] __apply_to_page_range+0x74e/0x9e0 [ 299.852449][T13624] ? kasan_populate_vmalloc+0x70/0x70 [ 299.857842][T13624] ? kasan_populate_vmalloc+0x70/0x70 [ 299.863222][T13624] apply_to_page_range+0x3b/0x50 [ 299.868176][T13624] kasan_populate_vmalloc+0x60/0x70 [ 299.873395][T13624] alloc_vmap_area+0x18e0/0x1a20 [ 299.878357][T13624] ? vm_map_ram+0x9c0/0x9c0 [ 299.882875][T13624] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 299.888431][T13624] ? __get_vm_area_node+0x113/0x450 [ 299.893653][T13624] __get_vm_area_node+0x147/0x450 [ 299.898696][T13624] ? sched_clock+0x3a/0x40 [ 299.903131][T13624] ? sched_clock_cpu+0x1b/0x3d0 [ 299.908002][T13624] __vmalloc_node_range+0xe0/0x790 [ 299.913131][T13624] ? dev_map_create_hash+0x29/0x1e0 [ 299.918342][T13624] ? __irq_exit_rcu+0x40/0x150 [ 299.923132][T13624] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 299.929042][T13624] bpf_map_area_alloc+0xd5/0xe0 [ 299.933911][T13624] ? dev_map_create_hash+0x29/0x1e0 [ 299.939121][T13624] dev_map_create_hash+0x29/0x1e0 [ 299.944218][T13624] ? bpf_map_charge_init+0x1ae/0x240 [ 299.949523][T13624] dev_map_alloc+0x340/0x6b0 [ 299.954125][T13624] map_create+0x44e/0x2090 [ 299.958558][T13624] __se_sys_bpf+0x24b/0x740 [ 299.963074][T13624] ? __x64_sys_bpf+0x90/0x90 [ 299.967698][T13624] ? debug_smp_processor_id+0x17/0x20 [ 299.973083][T13624] __x64_sys_bpf+0x7b/0x90 [ 299.977516][T13624] do_syscall_64+0x31/0x40 [ 299.981954][T13624] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 299.987859][T13624] RIP: 0033:0x7f0a84a20629 [ 299.992284][T13624] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 300.011910][T13624] RSP: 002b:00007f0a8347b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 300.020339][T13624] RAX: ffffffffffffffda RBX: 00007f0a84c99fa0 RCX: 00007f0a84a20629 [ 300.028326][T13624] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 300.036314][T13624] RBP: 00007f0a8347b090 R08: 0000000000000000 R09: 0000000000000000 [ 300.044309][T13624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 300.052417][T13624] R13: 00007f0a84c9a038 R14: 00007f0a84c99fa0 R15: 00007ffcef372898 [ 300.731718][T13654] FAULT_INJECTION: forcing a failure. [ 300.731718][T13654] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 300.809208][T13654] CPU: 0 PID: 13654 Comm: syz.2.4083 Tainted: G W syzkaller #0 [ 300.818127][T13654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 300.828211][T13654] Call Trace: [ 300.831526][T13654] __dump_stack+0x21/0x24 [ 300.835874][T13654] dump_stack_lvl+0x1a7/0x208 [ 300.840573][T13654] ? show_regs_print_info+0x18/0x18 [ 300.845804][T13654] dump_stack+0x15/0x1c [ 300.850070][T13654] should_fail+0x3c1/0x510 [ 300.854508][T13654] should_fail_alloc_page+0x4f/0x60 [ 300.859725][T13654] __alloc_pages_nodemask+0x119/0x620 [ 300.865117][T13654] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 300.870686][T13654] ? irq_exit_rcu+0x9/0x10 [ 300.875116][T13654] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 300.881381][T13654] pte_alloc_one+0x1f/0xc0 [ 300.885829][T13654] handle_pte_fault+0x246c/0x3750 [ 300.890875][T13654] ? _raw_spin_unlock+0x4d/0x70 [ 300.895828][T13654] handle_mm_fault+0xf81/0x1710 [ 300.900686][T13654] ? sched_clock_cpu+0x1b/0x3d0 [ 300.905559][T13654] ? can_reuse_spf_vma+0xe0/0xe0 [ 300.910514][T13654] ? irq_exit_rcu+0x9/0x10 [ 300.914949][T13654] ? vmacache_find+0x3f7/0x490 [ 300.919727][T13654] ? find_vma+0x30/0x150 [ 300.923980][T13654] do_user_addr_fault+0x5a8/0xc90 [ 300.929037][T13654] ? do_kern_addr_fault+0x80/0x80 [ 300.934081][T13654] ? __ia32_compat_sys_ioctl+0x8e0/0x8e0 [ 300.939756][T13654] exc_page_fault+0x5a/0xc0 [ 300.944275][T13654] asm_exc_page_fault+0x1e/0x30 [ 300.949141][T13654] RIP: 0010:__get_user_4+0x1c/0x30 [ 300.954272][T13654] Code: 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 48 ba fd ef ff ff ff 7f 00 00 48 39 d0 0f 83 90 00 00 00 48 19 d2 48 21 d0 0f 01 cb <8b> 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 90 48 ba [ 300.973898][T13654] RSP: 0018:ffffc90000d27d78 EFLAGS: 00050206 [ 300.979985][T13654] RAX: 000000110e22fff6 RBX: ffff888128c94d00 RCX: 0000000000000005 [ 300.987975][T13654] RDX: ffffffffffffffff RSI: ffffffff868a2b50 RDI: 00000000c004743e [ 300.995964][T13654] RBP: ffffc90000d27eb0 R08: ffff888118a10000 R09: 0000000000000003 [ 301.003947][T13654] R10: 00000000c004743e R11: 0000000000000000 R12: 00000000c004743e [ 301.011935][T13654] R13: 1ffff920001a4fb8 R14: ffff88811ab9c900 R15: 1ffff1102357393b [ 301.019938][T13654] ? ppp_ioctl+0x3b1/0x15d0 [ 301.024476][T13654] ? ppp_poll+0x260/0x260 [ 301.028820][T13654] ? __fget_files+0x2c4/0x320 [ 301.033624][T13654] ? security_file_ioctl+0x84/0xa0 [ 301.038760][T13654] ? ppp_poll+0x260/0x260 [ 301.043102][T13654] __se_sys_ioctl+0x121/0x1a0 [ 301.047803][T13654] __x64_sys_ioctl+0x7b/0x90 [ 301.052433][T13654] do_syscall_64+0x31/0x40 [ 301.056874][T13654] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 301.062771][T13654] RIP: 0033:0x7f7829afe629 [ 301.067197][T13654] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 301.086821][T13654] RSP: 002b:00007f7828559028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.095249][T13654] RAX: ffffffffffffffda RBX: 00007f7829d77fa0 RCX: 00007f7829afe629 [ 301.103227][T13654] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000009 [ 301.111200][T13654] RBP: 00007f7828559090 R08: 0000000000000000 R09: 0000000000000000 [ 301.119172][T13654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 301.127170][T13654] R13: 00007f7829d78038 R14: 00007f7829d77fa0 R15: 00007ffd403d9b18 [ 301.349387][T13669] device veth1_macvtap left promiscuous mode [ 301.413022][T13674] device aaaaaaaaaaaaaaa entered promiscuous mode [ 301.618285][T13693] FAULT_INJECTION: forcing a failure. [ 301.618285][T13693] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 301.661209][T13693] CPU: 0 PID: 13693 Comm: syz.0.4096 Tainted: G W syzkaller #0 [ 301.670134][T13693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 301.680202][T13693] Call Trace: [ 301.683691][T13693] __dump_stack+0x21/0x24 [ 301.688033][T13693] dump_stack_lvl+0x1a7/0x208 [ 301.692725][T13693] ? show_regs_print_info+0x18/0x18 [ 301.697937][T13693] dump_stack+0x15/0x1c [ 301.702130][T13693] should_fail+0x3c1/0x510 [ 301.706554][T13693] should_fail_alloc_page+0x4f/0x60 [ 301.711759][T13693] __alloc_pages_nodemask+0x119/0x620 [ 301.717141][T13693] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 301.722703][T13693] ? _raw_spin_trylock_bh+0x150/0x150 [ 301.728085][T13693] ? kvm_sched_clock_read+0x18/0x40 [ 301.733304][T13693] ? sched_clock+0x3a/0x40 [ 301.737726][T13693] __get_free_pages+0xe/0x30 [ 301.742324][T13693] kasan_populate_vmalloc_pte+0x29/0x120 [ 301.747963][T13693] __apply_to_page_range+0x74e/0x9e0 [ 301.753259][T13693] ? kasan_populate_vmalloc+0x70/0x70 [ 301.758649][T13693] ? kasan_populate_vmalloc+0x70/0x70 [ 301.764037][T13693] apply_to_page_range+0x3b/0x50 [ 301.768999][T13693] kasan_populate_vmalloc+0x60/0x70 [ 301.774226][T13693] alloc_vmap_area+0x18e0/0x1a20 [ 301.779178][T13693] ? vm_map_ram+0x9c0/0x9c0 [ 301.783701][T13693] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 301.789265][T13693] ? __get_vm_area_node+0x113/0x450 [ 301.794474][T13693] __get_vm_area_node+0x147/0x450 [ 301.799508][T13693] __vmalloc_node_range+0xe0/0x790 [ 301.804634][T13693] ? dev_map_create_hash+0x29/0x1e0 [ 301.809853][T13693] bpf_map_area_alloc+0xd5/0xe0 [ 301.814714][T13693] ? dev_map_create_hash+0x29/0x1e0 [ 301.819919][T13693] dev_map_create_hash+0x29/0x1e0 [ 301.824960][T13693] ? bpf_map_charge_init+0x1ae/0x240 [ 301.830250][T13693] dev_map_alloc+0x340/0x6b0 [ 301.834842][T13693] map_create+0x44e/0x2090 [ 301.839267][T13693] __se_sys_bpf+0x24b/0x740 [ 301.843780][T13693] ? __x64_sys_bpf+0x90/0x90 [ 301.848389][T13693] ? debug_smp_processor_id+0x17/0x20 [ 301.853770][T13693] __x64_sys_bpf+0x7b/0x90 [ 301.858202][T13693] do_syscall_64+0x31/0x40 [ 301.862646][T13693] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 301.868567][T13693] RIP: 0033:0x7f7ba8818629 [ 301.873084][T13693] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 301.892696][T13693] RSP: 002b:00007f7ba7273028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 301.901247][T13693] RAX: ffffffffffffffda RBX: 00007f7ba8a91fa0 RCX: 00007f7ba8818629 [ 301.909255][T13693] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 301.917267][T13693] RBP: 00007f7ba7273090 R08: 0000000000000000 R09: 0000000000000000 [ 301.925260][T13693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 301.933257][T13693] R13: 00007f7ba8a92038 R14: 00007f7ba8a91fa0 R15: 00007ffd188e7408 [ 303.318971][T13746] batadv0: tun_chr_ioctl cmd 1074025684 [ 304.009740][T13765] device syzkaller0 entered promiscuous mode [ 304.455347][T13785] FAULT_INJECTION: forcing a failure. [ 304.455347][T13785] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 304.484373][T13783] device syzkaller0 entered promiscuous mode [ 304.485527][T13785] CPU: 0 PID: 13785 Comm: syz.0.4126 Tainted: G W syzkaller #0 [ 304.499282][T13785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 304.509392][T13785] Call Trace: [ 304.512702][T13785] __dump_stack+0x21/0x24 [ 304.517135][T13785] dump_stack_lvl+0x1a7/0x208 [ 304.521829][T13785] ? show_regs_print_info+0x18/0x18 [ 304.527044][T13785] dump_stack+0x15/0x1c [ 304.531217][T13785] should_fail+0x3c1/0x510 [ 304.535649][T13785] should_fail_alloc_page+0x4f/0x60 [ 304.540859][T13785] __alloc_pages_nodemask+0x119/0x620 [ 304.546246][T13785] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 304.551804][T13785] ? _raw_spin_trylock_bh+0x150/0x150 [ 304.557198][T13785] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 304.563493][T13785] __get_free_pages+0xe/0x30 [ 304.568102][T13785] kasan_populate_vmalloc_pte+0x29/0x120 [ 304.573761][T13785] __apply_to_page_range+0x74e/0x9e0 [ 304.579062][T13785] ? kasan_populate_vmalloc+0x70/0x70 [ 304.584457][T13785] ? kasan_populate_vmalloc+0x70/0x70 [ 304.589859][T13785] apply_to_page_range+0x3b/0x50 [ 304.594816][T13785] kasan_populate_vmalloc+0x60/0x70 [ 304.600044][T13785] alloc_vmap_area+0x18e0/0x1a20 [ 304.605001][T13785] ? vm_map_ram+0x9c0/0x9c0 [ 304.609499][T13785] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 304.615036][T13785] ? __get_vm_area_node+0x113/0x450 [ 304.620228][T13785] __get_vm_area_node+0x147/0x450 [ 304.625245][T13785] __vmalloc_node_range+0xe0/0x790 [ 304.630346][T13785] ? dev_map_create_hash+0x29/0x1e0 [ 304.635563][T13785] bpf_map_area_alloc+0xd5/0xe0 [ 304.640611][T13785] ? dev_map_create_hash+0x29/0x1e0 [ 304.645829][T13785] dev_map_create_hash+0x29/0x1e0 [ 304.650874][T13785] ? bpf_map_charge_init+0x1ae/0x240 [ 304.656273][T13785] dev_map_alloc+0x340/0x6b0 [ 304.660893][T13785] map_create+0x44e/0x2090 [ 304.665325][T13785] __se_sys_bpf+0x24b/0x740 [ 304.669842][T13785] ? __x64_sys_bpf+0x90/0x90 [ 304.674428][T13785] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 304.680488][T13785] ? debug_smp_processor_id+0x17/0x20 [ 304.685854][T13785] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 304.691922][T13785] __x64_sys_bpf+0x7b/0x90 [ 304.696353][T13785] do_syscall_64+0x31/0x40 [ 304.700772][T13785] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 304.706671][T13785] RIP: 0033:0x7f7ba8818629 [ 304.711111][T13785] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 304.730724][T13785] RSP: 002b:00007f7ba7273028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 304.739148][T13785] RAX: ffffffffffffffda RBX: 00007f7ba8a91fa0 RCX: 00007f7ba8818629 [ 304.747118][T13785] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 304.755090][T13785] RBP: 00007f7ba7273090 R08: 0000000000000000 R09: 0000000000000000 [ 304.763058][T13785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.771135][T13785] R13: 00007f7ba8a92038 R14: 00007f7ba8a91fa0 R15: 00007ffd188e7408 [ 305.259617][T13803] tun0: tun_chr_ioctl cmd 1074025678 [ 305.265095][T13803] tun0: group set to 1 [ 305.316193][T13813] device syzkaller0 entered promiscuous mode [ 305.993821][T13837] device syzkaller0 entered promiscuous mode [ 307.692814][ T24] audit: type=1400 audit(1771432675.560:179): avc: denied { setattr } for pid=13922 comm="syz.1.4168" path="pipe:[51830]" dev="pipefs" ino=51830 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 308.520680][T13967] device syzkaller0 entered promiscuous mode [ 308.573110][T13974] device vlan0 entered promiscuous mode [ 308.901140][T14003] device syzkaller0 entered promiscuous mode [ 309.819433][T14055] device syzkaller0 entered promiscuous mode [ 311.237704][T14081] device wg2 entered promiscuous mode [ 311.752915][T14094] device syzkaller0 entered promiscuous mode [ 314.529938][T14172] device syzkaller0 entered promiscuous mode [ 314.607510][T14159] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.615151][T14159] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.622895][T14159] device bridge_slave_0 entered promiscuous mode [ 314.640009][T14159] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.647082][T14159] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.654849][T14159] device bridge_slave_1 entered promiscuous mode [ 314.991703][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 315.009513][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 315.086818][T14201] device syzkaller0 entered promiscuous mode [ 315.201928][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 315.230754][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 315.269102][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.276251][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.304017][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 315.314359][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 315.334464][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.341616][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.365973][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 315.389508][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 315.410070][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 315.457137][ T350] device bridge_slave_1 left promiscuous mode [ 315.469630][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.479694][ T350] device bridge_slave_0 left promiscuous mode [ 315.486074][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.710741][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 315.770416][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.778809][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.789222][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.802386][T14159] device veth0_vlan entered promiscuous mode [ 315.825497][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 315.834626][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 315.851015][T14159] device veth1_macvtap entered promiscuous mode [ 315.871426][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 315.879736][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 315.888791][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 315.939145][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 315.947580][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 316.891432][T14250] device veth0_vlan left promiscuous mode [ 316.918571][T14250] device veth0_vlan entered promiscuous mode [ 316.993607][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.011121][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.019633][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.078599][T14265] device syzkaller0 entered promiscuous mode [ 317.808728][T14298] : port 1(ip6gretap0) entered blocking state [ 317.815231][T14298] : port 1(ip6gretap0) entered disabled state [ 317.822272][T14298] device ip6gretap0 entered promiscuous mode [ 319.140461][T14400] syz.4.4314[14400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.140540][T14400] syz.4.4314[14400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.751972][T14457] syz.3.4332[14457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.781730][T14457] syz.3.4332[14457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.363367][T14505] syz.4.4348[14505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.542443][T14505] syz.4.4348[14505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.729370][T14525] device syzkaller0 entered promiscuous mode [ 321.698010][T14546] cgroup: fork rejected by pids controller in /syz0 [ 322.233380][T14575] geneve1: tun_chr_ioctl cmd 1074025672 [ 322.240190][T14575] geneve1: ignored: set checksum enabled [ 322.297425][T14574] geneve1: tun_chr_ioctl cmd 1074025672 [ 322.307339][T14574] geneve1: ignored: set checksum enabled [ 323.704620][T14635] device sit0 entered promiscuous mode [ 324.537823][T14701] device syzkaller0 entered promiscuous mode [ 325.687813][T14759] syz.3.4434[14759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.687875][T14759] syz.3.4434[14759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.938349][T14842] : port 1(vlan1) entered blocking state [ 326.956649][T14842] : port 1(vlan1) entered disabled state [ 326.963458][T14842] device vlan1 entered promiscuous mode [ 328.011877][T14901] tap0: tun_chr_ioctl cmd 1074812118 [ 328.133969][T14914] syz.4.4485[14914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.134029][T14914] syz.4.4485[14914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.225217][T14918] device syzkaller0 entered promiscuous mode [ 328.266913][T14924] tun1: tun_chr_ioctl cmd 1074025678 [ 328.284876][T14924] tun1: group set to 1 [ 328.543181][T14952] syz.3.4499[14952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.543245][T14952] syz.3.4499[14952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.829317][T14965] tun1: tun_chr_ioctl cmd 1074025678 [ 328.941904][T14965] tun1: group set to 1 [ 329.862562][T15019] device syzkaller0 entered promiscuous mode [ 330.420774][T15049] syz.4.4528[15049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.420835][T15049] syz.4.4528[15049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.733120][T15058] device sit0 left promiscuous mode [ 330.835356][T15063] device sit0 entered promiscuous mode [ 330.926302][T15068] device syzkaller0 entered promiscuous mode [ 333.535855][T15191] FAULT_INJECTION: forcing a failure. [ 333.535855][T15191] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 333.549606][T15191] CPU: 0 PID: 15191 Comm: syz.4.4570 Tainted: G W syzkaller #0 [ 333.558474][T15191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 333.568630][T15191] Call Trace: [ 333.571935][T15191] __dump_stack+0x21/0x24 [ 333.576272][T15191] dump_stack_lvl+0x1a7/0x208 [ 333.580960][T15191] ? show_regs_print_info+0x18/0x18 [ 333.586178][T15191] ? sched_clock+0x3a/0x40 [ 333.590611][T15191] ? sched_clock_cpu+0x1b/0x3d0 [ 333.595480][T15191] ? sched_clock+0x3a/0x40 [ 333.599910][T15191] dump_stack+0x15/0x1c [ 333.604075][T15191] should_fail+0x3c1/0x510 [ 333.608507][T15191] should_fail_alloc_page+0x4f/0x60 [ 333.613735][T15191] __alloc_pages_nodemask+0x119/0x620 [ 333.619118][T15191] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 333.624934][T15191] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 333.630493][T15191] ? _raw_spin_trylock_bh+0x150/0x150 [ 333.635885][T15191] ? kasan_check_range+0x180/0x2a0 [ 333.641006][T15191] __get_free_pages+0xe/0x30 [ 333.645613][T15191] kasan_populate_vmalloc_pte+0x29/0x120 [ 333.651259][T15191] __apply_to_page_range+0x74e/0x9e0 [ 333.656556][T15191] ? kasan_populate_vmalloc+0x70/0x70 [ 333.661946][T15191] ? kasan_populate_vmalloc+0x70/0x70 [ 333.667333][T15191] apply_to_page_range+0x3b/0x50 [ 333.672277][T15191] kasan_populate_vmalloc+0x60/0x70 [ 333.677587][T15191] alloc_vmap_area+0x18e0/0x1a20 [ 333.682598][T15191] ? vm_map_ram+0x9c0/0x9c0 [ 333.687118][T15191] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 333.692676][T15191] ? __get_vm_area_node+0x113/0x450 [ 333.697916][T15191] __get_vm_area_node+0x147/0x450 [ 333.702956][T15191] __vmalloc_node_range+0xe0/0x790 [ 333.708078][T15191] ? dev_map_create_hash+0x29/0x1e0 [ 333.713286][T15191] bpf_map_area_alloc+0xd5/0xe0 [ 333.718237][T15191] ? dev_map_create_hash+0x29/0x1e0 [ 333.723444][T15191] dev_map_create_hash+0x29/0x1e0 [ 333.728479][T15191] ? bpf_map_charge_init+0x1ae/0x240 [ 333.733778][T15191] dev_map_alloc+0x340/0x6b0 [ 333.738378][T15191] map_create+0x44e/0x2090 [ 333.742804][T15191] __se_sys_bpf+0x24b/0x740 [ 333.747327][T15191] ? __x64_sys_bpf+0x90/0x90 [ 333.751934][T15191] ? debug_smp_processor_id+0x17/0x20 [ 333.757310][T15191] __x64_sys_bpf+0x7b/0x90 [ 333.761826][T15191] do_syscall_64+0x31/0x40 [ 333.766259][T15191] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 333.772159][T15191] RIP: 0033:0x7f18c612b629 [ 333.776596][T15191] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 333.796223][T15191] RSP: 002b:00007f18c4b86028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 333.804675][T15191] RAX: ffffffffffffffda RBX: 00007f18c63a4fa0 RCX: 00007f18c612b629 [ 333.812657][T15191] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 333.820641][T15191] RBP: 00007f18c4b86090 R08: 0000000000000000 R09: 0000000000000000 [ 333.828623][T15191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 333.836608][T15191] R13: 00007f18c63a5038 R14: 00007f18c63a4fa0 R15: 00007ffc34922398 [ 335.892078][T15254] tun0: tun_chr_ioctl cmd 1074025678 [ 335.904532][T15254] tun0: group set to 1 [ 336.895416][T15315] FAULT_INJECTION: forcing a failure. [ 336.895416][T15315] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 336.949354][T15315] CPU: 1 PID: 15315 Comm: syz.2.4605 Tainted: G W syzkaller #0 [ 336.958246][T15315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 336.968308][T15315] Call Trace: [ 336.971623][T15315] __dump_stack+0x21/0x24 [ 336.975964][T15315] dump_stack_lvl+0x1a7/0x208 [ 336.980648][T15315] ? show_regs_print_info+0x18/0x18 [ 336.986007][T15315] dump_stack+0x15/0x1c [ 336.990293][T15315] should_fail+0x3c1/0x510 [ 336.994734][T15315] should_fail_alloc_page+0x4f/0x60 [ 336.999945][T15315] __alloc_pages_nodemask+0x119/0x620 [ 337.005331][T15315] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 337.010892][T15315] ? _raw_spin_trylock_bh+0x150/0x150 [ 337.016270][T15315] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 337.022518][T15315] __get_free_pages+0xe/0x30 [ 337.027128][T15315] kasan_populate_vmalloc_pte+0x29/0x120 [ 337.032768][T15315] __apply_to_page_range+0x74e/0x9e0 [ 337.038063][T15315] ? kasan_populate_vmalloc+0x70/0x70 [ 337.043446][T15315] ? kasan_populate_vmalloc+0x70/0x70 [ 337.048850][T15315] apply_to_page_range+0x3b/0x50 [ 337.053793][T15315] kasan_populate_vmalloc+0x60/0x70 [ 337.058998][T15315] alloc_vmap_area+0x18e0/0x1a20 [ 337.063951][T15315] ? vm_map_ram+0x9c0/0x9c0 [ 337.068476][T15315] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 337.074033][T15315] ? __get_vm_area_node+0x113/0x450 [ 337.079239][T15315] __get_vm_area_node+0x147/0x450 [ 337.084276][T15315] __vmalloc_node_range+0xe0/0x790 [ 337.089391][T15315] ? dev_map_create_hash+0x29/0x1e0 [ 337.094600][T15315] bpf_map_area_alloc+0xd5/0xe0 [ 337.099456][T15315] ? dev_map_create_hash+0x29/0x1e0 [ 337.104662][T15315] dev_map_create_hash+0x29/0x1e0 [ 337.109698][T15315] ? bpf_map_charge_init+0x1ae/0x240 [ 337.114994][T15315] dev_map_alloc+0x340/0x6b0 [ 337.119593][T15315] map_create+0x44e/0x2090 [ 337.124015][T15315] __se_sys_bpf+0x24b/0x740 [ 337.128520][T15315] ? __x64_sys_bpf+0x90/0x90 [ 337.133123][T15315] ? debug_smp_processor_id+0x17/0x20 [ 337.138501][T15315] __x64_sys_bpf+0x7b/0x90 [ 337.142930][T15315] do_syscall_64+0x31/0x40 [ 337.147357][T15315] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 337.153258][T15315] RIP: 0033:0x7f7829afe629 [ 337.157706][T15315] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 337.177344][T15315] RSP: 002b:00007f7828559028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 337.185769][T15315] RAX: ffffffffffffffda RBX: 00007f7829d77fa0 RCX: 00007f7829afe629 [ 337.193753][T15315] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 337.201737][T15315] RBP: 00007f7828559090 R08: 0000000000000000 R09: 0000000000000000 [ 337.209735][T15315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 337.217715][T15315] R13: 00007f7829d78038 R14: 00007f7829d77fa0 R15: 00007ffd403d9b18 [ 337.869775][T15341] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.878429][T15341] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.890374][T15341] device bridge_slave_0 entered promiscuous mode [ 337.898722][T15352] device syzkaller0 entered promiscuous mode [ 337.905886][T15341] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.914094][T15341] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.921925][T15341] device bridge_slave_1 entered promiscuous mode [ 338.143532][T15355] device syzkaller0 entered promiscuous mode [ 338.150432][T15341] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.157713][T15341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.165066][T15341] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.172160][T15341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.420550][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.431409][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.442405][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.503717][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.519867][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.527144][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.607062][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.637484][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.644600][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.662861][T15367] bridge0: port 3(gretap0) entered blocking state [ 338.669641][T15367] bridge0: port 3(gretap0) entered disabled state [ 338.676614][T15367] device gretap0 entered promiscuous mode [ 338.712268][T15367] bridge0: port 3(gretap0) entered blocking state [ 338.718716][T15367] bridge0: port 3(gretap0) entered forwarding state [ 338.749892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 338.758731][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 338.834781][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 338.844001][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.931452][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 338.951959][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 339.005075][T15341] device veth0_vlan entered promiscuous mode [ 339.042552][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 339.057337][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.116913][T15341] device veth1_macvtap entered promiscuous mode [ 339.192362][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.202233][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 339.217612][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 339.229887][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 339.238267][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 339.309904][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 339.324508][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 339.341889][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 339.352309][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 340.461513][T15415] tun0: tun_chr_ioctl cmd 1074025678 [ 340.474618][T15415] tun0: group set to 1 [ 340.873479][T15433] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.880822][T15433] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.113392][T15433] device bridge_slave_1 left promiscuous mode [ 341.139709][T15433] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.192375][T15433] device bridge_slave_0 left promiscuous mode [ 341.221802][T15433] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.417302][T15454] tun0: tun_chr_ioctl cmd 1074025678 [ 341.449398][T15454] tun0: group set to 1 [ 345.378796][T15643] syz.5.4702[15643] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.378872][T15643] syz.5.4702[15643] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.483888][T15645] device syzkaller0 entered promiscuous mode [ 345.788361][T15654] device syzkaller0 entered promiscuous mode [ 347.115711][T15721] device syzkaller0 entered promiscuous mode [ 347.150996][T15721] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 347.396595][T15743] device veth1_macvtap left promiscuous mode [ 347.914729][T15775] device veth0_vlan left promiscuous mode [ 347.944110][T15775] device veth0_vlan entered promiscuous mode [ 347.969082][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.983831][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 348.028121][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.117717][T15782] ref_ctr_offset mismatch. inode: 0x7bf offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 349.051959][T15838] device sit0 left promiscuous mode [ 349.093287][T15838] device sit0 entered promiscuous mode [ 351.014592][T15974] device syzkaller0 entered promiscuous mode [ 351.497824][T15995] device syzkaller0 entered promiscuous mode [ 353.307517][T16083] device syzkaller0 entered promiscuous mode [ 353.497033][T16083] syzkaller0: tun_net_xmit 1280 [ 353.892178][T16098] syzkaller1: tun_chr_ioctl cmd 21731 [ 353.933745][T16097] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 355.438267][T16157] device syzkaller0 entered promiscuous mode [ 360.669785][T16376] syz.3.4934[16376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.669850][T16376] syz.3.4934[16376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.895706][T16387] device wg2 entered promiscuous mode [ 361.192961][T16423] syz.5.4950[16423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 361.193021][T16423] syz.5.4950[16423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 361.313406][T16418] device syzkaller0 entered promiscuous mode [ 362.254171][T16472] device syzkaller0 entered promiscuous mode [ 362.321302][T16476] device wg2 entered promiscuous mode [ 362.337965][T16476] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 363.025222][T16497] device syzkaller0 entered promiscuous mode [ 363.256588][T16527] device wg2 left promiscuous mode [ 363.273479][T16533] device wg2 entered promiscuous mode [ 363.293581][T16533] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 367.984682][T16770] : renamed from bond_slave_0 [ 368.623290][T16810] : port 1(dummy0) entered blocking state [ 368.632499][T16810] : port 1(dummy0) entered disabled state [ 368.658043][T16810] device dummy0 entered promiscuous mode [ 370.315523][T16851] syz.4.5079[16851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.315587][T16851] syz.4.5079[16851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.762742][T16882] tun0: tun_chr_ioctl cmd 1074025678 [ 370.779933][T16887] FAULT_INJECTION: forcing a failure. [ 370.779933][T16887] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 370.801737][T16882] tun0: group set to 1 [ 370.820616][T16887] CPU: 0 PID: 16887 Comm: syz.1.5091 Tainted: G W syzkaller #0 [ 370.829543][T16887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 370.839624][T16887] Call Trace: [ 370.842946][T16887] __dump_stack+0x21/0x24 [ 370.847314][T16887] dump_stack_lvl+0x1a7/0x208 [ 370.852023][T16887] ? show_regs_print_info+0x18/0x18 [ 370.857247][T16887] dump_stack+0x15/0x1c [ 370.861425][T16887] should_fail+0x3c1/0x510 [ 370.865863][T16887] should_fail_usercopy+0x1a/0x20 [ 370.870914][T16887] _copy_from_user+0x20/0xd0 [ 370.875530][T16887] sock_ioctl+0x678/0x760 [ 370.879878][T16887] ? sock_poll+0x350/0x350 [ 370.884314][T16887] ? __fget_files+0x2c4/0x320 [ 370.889013][T16887] ? security_file_ioctl+0x84/0xa0 [ 370.894146][T16887] ? sock_poll+0x350/0x350 [ 370.898572][T16887] __se_sys_ioctl+0x121/0x1a0 [ 370.903299][T16887] __x64_sys_ioctl+0x7b/0x90 [ 370.907911][T16887] do_syscall_64+0x31/0x40 [ 370.912350][T16887] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 370.918257][T16887] RIP: 0033:0x7fd33c9d9629 [ 370.922689][T16887] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 370.942314][T16887] RSP: 002b:00007fd33b434028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 370.950750][T16887] RAX: ffffffffffffffda RBX: 00007fd33cc52fa0 RCX: 00007fd33c9d9629 [ 370.958739][T16887] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 370.966727][T16887] RBP: 00007fd33b434090 R08: 0000000000000000 R09: 0000000000000000 [ 370.974724][T16887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 370.982718][T16887] R13: 00007fd33cc53038 R14: 00007fd33cc52fa0 R15: 00007ffee30affb8 [ 371.088347][T16887] tun0: tun_chr_ioctl cmd 1074025678 [ 371.099036][T16887] tun0: group set to 1 [ 371.185618][T16900] syz.2.5095[16900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.185680][T16900] syz.2.5095[16900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.475462][T16912] device syzkaller0 entered promiscuous mode [ 372.186935][T16954] bY4`Ҙ: renamed from lo [ 372.358848][T16962] device syzkaller0 entered promiscuous mode [ 373.252882][T17009] device sit0 left promiscuous mode [ 373.310185][T17009] device sit0 entered promiscuous mode [ 374.264225][T17062] FAULT_INJECTION: forcing a failure. [ 374.264225][T17062] name failslab, interval 1, probability 0, space 0, times 0 [ 374.349018][T17062] CPU: 1 PID: 17062 Comm: syz.4.5142 Tainted: G W syzkaller #0 [ 374.358015][T17062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 374.368081][T17062] Call Trace: [ 374.371388][T17062] __dump_stack+0x21/0x24 [ 374.375733][T17062] dump_stack_lvl+0x1a7/0x208 [ 374.380429][T17062] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 374.386617][T17062] ? show_regs_print_info+0x18/0x18 [ 374.391829][T17062] ? dump_stack+0x9/0x1c [ 374.396087][T17062] dump_stack+0x15/0x1c [ 374.400260][T17062] should_fail+0x3c1/0x510 [ 374.404697][T17062] ? kvmalloc_node+0x88/0x130 [ 374.409386][T17062] __should_failslab+0xa4/0xe0 [ 374.414165][T17062] should_failslab+0x9/0x20 [ 374.418679][T17062] __kmalloc+0x60/0x330 [ 374.422848][T17062] ? sprintf+0xe4/0x140 [ 374.427015][T17062] kvmalloc_node+0x88/0x130 [ 374.431539][T17062] alloc_netdev_mqs+0x88/0xc80 [ 374.436323][T17062] ? selinux_capset+0xf0/0xf0 [ 374.441126][T17062] ? IP6_ECN_decapsulate+0x18c0/0x18c0 [ 374.446619][T17062] ip6_tnl_locate+0x5ad/0x710 [ 374.451329][T17062] ? ip6_tnl_link_config+0x9c0/0x9c0 [ 374.456625][T17062] ? memcpy+0x56/0x70 [ 374.460622][T17062] ip6_tnl_ioctl+0x75a/0xf70 [ 374.465222][T17062] ? ip6_tnl_start_xmit+0x13d0/0x13d0 [ 374.470606][T17062] ? __mutex_lock+0x85f/0xc60 [ 374.475305][T17062] ? full_name_hash+0xa0/0xf0 [ 374.479990][T17062] dev_ifsioc+0x6b4/0xa90 [ 374.484340][T17062] ? dev_ioctl+0xb80/0xb80 [ 374.488771][T17062] dev_ioctl+0x5ea/0xb80 [ 374.493033][T17062] sock_ioctl+0x6ce/0x760 [ 374.497369][T17062] ? sock_poll+0x350/0x350 [ 374.501811][T17062] ? __fget_files+0x2c4/0x320 [ 374.506505][T17062] ? security_file_ioctl+0x84/0xa0 [ 374.511623][T17062] ? sock_poll+0x350/0x350 [ 374.516048][T17062] __se_sys_ioctl+0x121/0x1a0 [ 374.520736][T17062] __x64_sys_ioctl+0x7b/0x90 [ 374.525335][T17062] do_syscall_64+0x31/0x40 [ 374.529767][T17062] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 374.535678][T17062] RIP: 0033:0x7f18c612b629 [ 374.540105][T17062] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 374.559723][T17062] RSP: 002b:00007f18c4b86028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 374.568159][T17062] RAX: ffffffffffffffda RBX: 00007f18c63a4fa0 RCX: 00007f18c612b629 [ 374.576149][T17062] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 374.584129][T17062] RBP: 00007f18c4b86090 R08: 0000000000000000 R09: 0000000000000000 [ 374.592123][T17062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 374.600116][T17062] R13: 00007f18c63a5038 R14: 00007f18c63a4fa0 R15: 00007ffc34922398 [ 375.216857][T17120] device syzkaller0 entered promiscuous mode [ 375.852614][T17165] bridge0: port 3(gretap0) entered disabled state [ 375.860311][T17165] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.868126][T17165] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.971775][T17165] device bridge0 left promiscuous mode [ 376.106791][T17169] bridge0: port 3(gretap0) entered blocking state [ 376.113399][T17169] bridge0: port 3(gretap0) entered forwarding state [ 376.120132][T17169] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.127176][T17169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.134500][T17169] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.141588][T17169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.159134][T17169] device bridge0 entered promiscuous mode [ 377.168366][T17180] general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN [ 377.180341][T17180] KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] [ 377.188777][T17180] CPU: 1 PID: 17180 Comm: syz.1.5179 Tainted: G W syzkaller #0 [ 377.197632][T17180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 377.207730][T17180] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 377.213743][T17180] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 2b 64 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 09 64 1a 00 bb 70 02 00 00 49 03 [ 377.233377][T17180] RSP: 0018:ffffc90000b37440 EFLAGS: 00010202 [ 377.239464][T17180] RAX: 0000000000000004 RBX: 1ffff11028bbb279 RCX: 0000000000000000 [ 377.247455][T17180] RDX: 0000000000000008 RSI: 0000000000000000 RDI: ffffc90000b37430 [ 377.255453][T17180] RBP: ffffc90000b37540 R08: ffffc90000b3742f R09: ffffc90000b37428 [ 377.263461][T17180] R10: dffffc0000000000 R11: fffff52000166e86 R12: 00000000ffffffde [ 377.271541][T17180] R13: 0000000000000020 R14: 1ffff92000166e90 R15: dffffc0000000000 [ 377.279530][T17180] FS: 00007fd33b4346c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 377.288480][T17180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 377.295094][T17180] CR2: 0000200000000430 CR3: 000000013932f000 CR4: 00000000003506a0 [ 377.303096][T17180] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000200000000300 [ 377.311083][T17180] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 377.319070][T17180] Call Trace: [ 377.322387][T17180] ? perf_pending_event+0x560/0x560 [ 377.327618][T17180] ? __this_cpu_preempt_check+0x13/0x20 [ 377.333175][T17180] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 377.339436][T17180] __perf_event_overflow+0x1b3/0x340 [ 377.344753][T17180] perf_swevent_event+0x2f7/0x530 [ 377.349801][T17180] ___perf_sw_event+0x3aa/0x4d0 [ 377.354676][T17180] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 377.361108][T17180] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 377.366579][T17180] ? _raw_spin_lock+0xf0/0xf0 [ 377.371273][T17180] ? __skb_wait_for_more_packets+0x2ad/0x590 [ 377.377268][T17180] __perf_sw_event+0x134/0x270 [ 377.382045][T17180] do_user_addr_fault+0xc76/0xc90 [ 377.387086][T17180] ? _raw_spin_unlock+0x4d/0x70 [ 377.391946][T17180] ? unix_dgram_recvmsg+0x5d0/0xd70 [ 377.397160][T17180] ? do_kern_addr_fault+0x80/0x80 [ 377.402220][T17180] ? unix_dgram_sendmsg+0x17e0/0x17e0 [ 377.407622][T17180] exc_page_fault+0x5a/0xc0 [ 377.412164][T17180] asm_exc_page_fault+0x1e/0x30 [ 377.417036][T17180] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 377.422778][T17180] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 90 90 90 90 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 48 bb f9 ef ff ff ff 7f [ 377.442403][T17180] RSP: 0018:ffffc90000b37a78 EFLAGS: 00050246 [ 377.448625][T17180] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000200000000430 [ 377.456632][T17180] RDX: ffffc90000b37eb0 RSI: 0000000000000000 RDI: 00000000ffffffff [ 377.464625][T17180] RBP: ffffc90000b37c10 R08: 0000000000000003 R09: 0000000000000004 [ 377.472616][T17180] R10: dffffc0000000000 R11: fffff52000166f04 R12: dffffc0000000000 [ 377.480602][T17180] R13: 0000200000000400 R14: 0000000000000000 R15: 0000000000000000 [ 377.488609][T17180] ? ____sys_recvmsg+0x399/0x5e0 [ 377.493564][T17180] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 377.499736][T17180] ? __sys_recvmsg_sock+0x50/0x50 [ 377.504794][T17180] ? import_iovec+0x7c/0xb0 [ 377.509310][T17180] ___sys_recvmsg+0x21a/0x5c0 [ 377.514006][T17180] ? __sys_recvmsg+0x270/0x270 [ 377.518783][T17180] ? ktime_get+0x10e/0x140 [ 377.523215][T17180] ? __fdget+0x1a1/0x230 [ 377.527566][T17180] __x64_sys_recvmsg+0x1f6/0x2c0 [ 377.532513][T17180] ? __kasan_check_write+0x14/0x20 [ 377.537634][T17180] ? ___sys_recvmsg+0x5c0/0x5c0 [ 377.542510][T17180] ? __kasan_check_read+0x11/0x20 [ 377.547542][T17180] ? syscall_trace_enter+0x108/0x170 [ 377.552842][T17180] do_syscall_64+0x31/0x40 [ 377.557267][T17180] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 377.563177][T17180] RIP: 0033:0x7fd33c9d9629 [ 377.567607][T17180] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 377.587222][T17180] RSP: 002b:00007fd33b434028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 377.595645][T17180] RAX: ffffffffffffffda RBX: 00007fd33cc52fa0 RCX: 00007fd33c9d9629 [ 377.603630][T17180] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000000005 [ 377.611614][T17180] RBP: 00007fd33ca6fb39 R08: 0000000000000000 R09: 0000000000000000 [ 377.619597][T17180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 377.627586][T17180] R13: 00007fd33cc53038 R14: 00007fd33cc52fa0 R15: 00007ffee30affb8 [ 377.635579][T17180] Modules linked in: [ 377.639724][T17180] ---[ end trace 8776cd30202e0f7f ]--- [ 377.645211][T17180] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 377.651713][T17180] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 2b 64 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 09 64 1a 00 bb 70 02 00 00 49 03 [ 377.671605][T17180] RSP: 0018:ffffc90000b37440 EFLAGS: 00010202 [ 377.677728][T17180] RAX: 0000000000000004 RBX: 1ffff11028bbb279 RCX: 0000000000000000 [ 377.685901][T17180] RDX: 0000000000000008 RSI: 0000000000000000 RDI: ffffc90000b37430 [ 377.694117][T17180] RBP: ffffc90000b37540 R08: ffffc90000b3742f R09: ffffc90000b37428 [ 377.702156][T17180] R10: dffffc0000000000 R11: fffff52000166e86 R12: 00000000ffffffde [ 377.710166][T17180] R13: 0000000000000020 R14: 1ffff92000166e90 R15: dffffc0000000000 [ 377.718190][T17180] FS: 00007fd33b4346c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 377.727188][T17180] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 377.733832][T17180] CR2: 0000200000000430 CR3: 000000013932f000 CR4: 00000000003506a0 [ 377.741853][T17180] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000200000000300 [ 377.749861][T17180] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 377.757869][T17180] Kernel panic - not syncing: Fatal exception [ 377.764239][T17180] Kernel Offset: disabled [ 377.768582][T17180] Rebooting in 86400 seconds..