last executing test programs: 5.895929947s ago: executing program 4 (id=1582): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) close(r1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000008000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @fwd={0x7}, @float={0x2, 0x0, 0x0, 0x10, 0x4}, @type_tag={0x3, 0x0, 0x0, 0x12, 0x5}, @float={0xd, 0x0, 0x0, 0x10, 0x2}]}, {0x0, [0x30]}}, &(0x7f00000000c0)=""/75, 0x63, 0x4b, 0x1, 0x785acfbd, 0x0, @void, @value}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000), 0xe) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB="000000e85f32"], 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x81, 0x5, 0x9, 0x0, r5, 0x40, '\x00', 0x0, r6, 0x5, 0x2, 0x3, 0x7, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) 5.540075442s ago: executing program 4 (id=1586): perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000a1155fa0d1b46466014234f2a37cc7704a7a8b3f71704613ef0a402d299788451c39f2604a78fba225b732cd3cc61952088780d89961dbc75f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) write$cgroup_subtree(r5, &(0x7f0000000000), 0x15) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xe, 0x7, &(0x7f0000000340)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @map_fd={0x18, 0x0, 0x1, 0x0, r8}], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x68, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x0, 0x6}, 0x10, 0x0, r7, 0x3, &(0x7f0000000600)=[r8, r8, r0, r0, r9, r0], &(0x7f0000000640)=[{0x1, 0x1, 0x8, 0xa}, {0x5, 0x5, 0x8, 0x9}, {0x0, 0x5, 0xb, 0x1}], 0x10, 0x7, @void, @value}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000740)=r10, 0x4) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r11}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) 4.972093501s ago: executing program 4 (id=1594): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x5, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x17, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="b61089e004000000000000000000b83c4a8562dfd9924a753aa5a3b4ed379beda744828a8919eb80a72518e97b3bb6267947e57602f39d535ed240cd8d4a0f2d6f50f6f8d436631daefa0f4a9271fcefa97b25e63ca4c7c774c18cf63768a5e7d19ed640a0c56f03738d1df7ce08d3464d3d3c176d0d043de5d40e55ab40", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000100000", @ANYRES64=r0, @ANYRES32, @ANYRESDEC=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r0, @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000080)='mm_lru_activate\x00', r3}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000c0000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRESOCT=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000001001000000000007274600f693eb8e2d001494a5129a1b1bdd25fb7675d719f01c4c956aa535e38e1766ebf0191d6bf5dfdbaa0801b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x84, r8}, 0x38) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='xen_mmu_set_pud\x00', r9}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r11 = perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x4, 0x10, 0x0, 0x3, 0x0, 0x5d30, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x800, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r4, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x40082404, &(0x7f0000000780)=0xea) setsockopt$sock_attach_bpf(r10, 0x1, 0x28, &(0x7f0000000000), 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0xcb}, 0x0, 0x0, r11, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(r14) recvmsg$unix(r13, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r15, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000007c0)={r3, 0x0, 0xa4, 0x0, &(0x7f0000000380)="567805b69e97a106c21811449ba075ec630b9ebb9427fe21d95203f95390fc497471f35a69601f28902def6915a78b9ea8e5bc39f2ac3569974b1fdc11a868c3eb2683ea41431d439b4850dfa697cc2c6ecb404d2eb3338b6eabdbc23c583dd8399c74829ab7f2956e2fb2637f2df6be6524798f856e764494f1269cb6f55ab18a6045612c5a5c671593563c41b072616e9f51493d32f68af796eca30307bda1c82d8ca9", 0x0, 0x1, 0x0, 0x81, 0x0, &(0x7f00000006c0)="87a27d22f5a38a78279cfe76ef7dac0ec4a50d21f33f0bc9e9a4dc6a044052dbed162fa435a7f96c29fbd8fe1f9ea92a12a7712e2eec2dbbe38c32432f611ed16871bffd35cd1fe0f89c0bfc3a392a3bd725e0829b97a04bed997d178a07feccc0b42f9a3c6090733bba60caed98f102a4380f0389c418169b67709e09fa80a484", 0x0, 0x2, 0x0, 0x4}, 0x50) 4.124653662s ago: executing program 4 (id=1608): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000000500000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8904, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000007e6693a186182d79cfb5b20000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d00)={&(0x7f0000000cc0)='mm_page_alloc\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r4 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xf, &(0x7f0000000740)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r2, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x8, '\x00', r6, 0xffffffffffffffff, 0x0, 0x3, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 2.807493901s ago: executing program 0 (id=1626): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb010018000000000000000000540000000500130000000007000000f1baffff00000000080000534000000002000000020000002b040000000800000c0000000000000900000000010000002dfc228394b900000012050000000c0000000000000200000000002e004f000000"], &(0x7f00000002c0)=""/11, 0x71, 0xb, 0x0, 0x4, 0x0, @void, @value}, 0x28) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_procs(r4, &(0x7f0000000e40)='tasks\x00', 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80021, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_config_ext, 0x0, 0x0, 0x3fffc, 0x0, 0x6, 0x400, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_subtree(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e46558"], 0xe) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f00000000c0)=0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r6 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r6, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c4300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000600)='mm_compaction_try_to_compact_pages\x00', r8, 0x0, 0x9}, 0x18) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 2.503615635s ago: executing program 3 (id=1630): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x2000000000000058, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff", @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYRESHEX=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) r8 = openat$tun(0xffffffffffffff9c, 0x0, 0x4c2e81, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYRES32=0x0], 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001100)={@cgroup, 0x13, 0x0, 0x3cb, &(0x7f0000001000)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000001040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001080)=[0x0], &(0x7f00000010c0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001140)={@fallback=r8, 0xffffffffffffffff, 0x1a, 0x2018, 0x0, @value, @void, @void, @void, r9}, 0x20) 2.339419747s ago: executing program 2 (id=1631): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f00000003c0), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f00000007c0)=ANY=[@ANYBLOB="b40800000000000073110900000000008510000002000000b7000000000800009500c2000000000095000012000000001aa9b38297cdcc25eefe7b43518df75f41b9fc1a09edd2bae74c35bbaeefb8ebce9cbd1f82bcef031c34de50e026b05ff800000000be234edc0cae70cf683406982169dfe9ecee7e45df5589bf5d21322c74d0af9b825c2fe67bb12d3b2248cd53baa57f53a9fee32fae6da03c34ea0ae5db2f0848213a2f2d"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x5, 0x40, 0x7, 0x0, 0x7fffffff, 0x9d6d1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0xfffffffffffffffd, 0xf}, 0x10137f, 0x7ff, 0x7, 0x4, 0x81, 0x5, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_sys\x00', 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7020000e94c1fbdb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r8, 0x14a80, 0x10, 0x38, &(0x7f00000002c0)="24006f20a01c2500", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@bloom_filter={0x1e, 0x9, 0x2, 0x2, 0x20090, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4, 0xf, @void, @value, @void, @value}, 0x50) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000f00)={r1}, 0x8) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000f40)=@base={0x2, 0x8, 0x80000001, 0x6, 0x40428, 0xffffffffffffffff, 0xe52, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000fc0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x0, @void, @value, @void, @value}, 0x50) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001080)=@generic={&(0x7f0000001040)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000010c0)={r0, 0xffffffffffffffff}, 0x4) r15 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r16 = openat$cgroup_ro(r15, &(0x7f0000000380)='memory.stat\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r16, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001200)={0x6, 0x18, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xbf, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @exit, @btf_id={0x18, 0x0, 0x3, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000680)='syzkaller\x00', 0x0, 0xa2, &(0x7f00000006c0)=""/162, 0x41000, 0x42, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000e00)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000e40)={0x3, 0x7, 0x2, 0xa1}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001100)=[r9, r10, r11, r12, r3, r13, r14, r16], &(0x7f0000001140)=[{0x4, 0x1, 0x6, 0xb}, {0x2, 0x4, 0xf, 0x4}, {0x2, 0x3, 0xf, 0xb}, {0x5, 0x1, 0xb}, {0x5, 0x4, 0x5, 0x8}, {0x2, 0x4, 0x0, 0xa}, {0x2, 0x3, 0x8, 0xc}, {0x3, 0x5, 0x1, 0x7}, {0x5, 0x1, 0x1, 0xc}, {0x4, 0x3, 0x4, 0xb}], 0x10, 0x6, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/1664], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r17, 0x702, 0xe, 0x0, &(0x7f0000000380)="e460334470b8d480eb00c1520800", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 2.338918347s ago: executing program 3 (id=1632): bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000009"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0d00000001000000040000000100000000000000", @ANYRES32=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000005000000"], 0x50) r3 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r3, 0x0, 0x200000}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r2, 0x0, 0x0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYRESHEX], 0x0, 0x8, 0xffffffffffffff46, 0x0, 0x0, 0x51, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) ioctl$TUNGETVNETLE(r5, 0x40047459, &(0x7f0000001200)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 2.256054898s ago: executing program 0 (id=1634): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x480, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x2, 0x1004, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x34000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0xfffffffe, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r4) syz_open_procfs$namespace(0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r4, 0xc0189436, &(0x7f0000000000)={'bridge_slave_1\x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r9, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="5aee41dea43e63a3f7fb7f110800", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000003000000020000008500", @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000340), &(0x7f0000000240), 0x812, r10, 0x0, 0x80000000c000000}, 0x38) 2.17047335s ago: executing program 2 (id=1635): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="000000000000000000000073a4f4c5b000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000200)='btrfs_add_block_group\x00'}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe6, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000580), 0x8, 0x45, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)={0x1b, 0x0, 0x0, 0xc3f, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x13, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b400}, [@btf_id={0x18, 0x17, 0x3, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf5}}, @ldst={0x1, 0x3, 0x2, 0x1, 0xb, 0x3585ab36a51a5a51, 0x8}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xff8}, @generic={0x4, 0x1, 0x9, 0x8, 0x400}, @exit]}, &(0x7f0000000340)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x9, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x5, 0xc, 0x3, 0xffffffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[r5, r0], 0x0, 0x10, 0x5, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r8, 0x27, 0x22, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b08009f59d351f20c83a50ee033cf5f0759cfc67cb3a4", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0104000000000000000000000000000000000000826e7821aeb10f3f8a5694c3bb0fa4137ad7c792", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) 1.954919343s ago: executing program 0 (id=1636): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x1}) (async) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xf) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x300) 1.46314196s ago: executing program 0 (id=1637): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 1.43342305s ago: executing program 1 (id=1638): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r5}, 0x8) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) (async) close(r2) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) (async) bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r5}, 0x8) (async) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) (async) 1.276942072s ago: executing program 1 (id=1639): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000a50000002a00000095"], &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) (async) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6b", 0x2}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000006b113c001861464d8500000002000000850000007600000095000000000000009500a50500400000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x2b6, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) 1.211981613s ago: executing program 2 (id=1640): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x98, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x48, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000a61a7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r5}, 0x10) (async) socketpair(0x2, 0x0, 0x0, &(0x7f00000006c0)) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x100002, 0x0) (async, rerun: 64) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) (async) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x400}) (async) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x0, 0x8, 0x9, 0xd, 0x0, 0x1, 0x3040, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x200, 0x1190, 0x8, 0x7, 0x10000, 0x6, 0xf801, 0x0, 0x4, 0x0, 0x80000001}, 0xffffffffffffffff, 0x3, r6, 0xc) (async, rerun: 32) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)={'c', ' *:* ', 'rwm\x00'}, 0xa) (async, rerun: 32) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/227, 0xe3}], 0x1}, 0x0) 1.109899404s ago: executing program 0 (id=1641): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1200000002000000040000000200000000000000df95f6e590fb0bcef95e72ea76fa6579f9684972558dd50622b56317dd39b5263ceec5219f8b5c2a3fbd8aa3971b9632340d809a90557cae29fdfc1214163c06d9054615a2b78f18e465a9c17fe4921bf77092cd47f928736436411ed5adfa6adad8e1d00ddd049c7202310bd734db7a1a4fdcd0cf6d54a9f717e08fb2c2b9701329547ab8b26c501dce6572b00f6de2fa942d7873a08ec5ba41e1ff0cf5982b9e57f0832043754cd0fb1efab301beba3ee779", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x24) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000040000000000000000000c0000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000008000000850000008600000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r1}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x10, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000002000001080000000100008400000000000000000300000000000000000000fc000d000000000000000000"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x18, r5}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x200c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.109470095s ago: executing program 1 (id=1642): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80021, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_config_ext, 0x0, 0x0, 0x3fffc, 0x0, 0x6, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000001f00)}}, 0x10) 1.047462305s ago: executing program 1 (id=1643): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xcf) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2000000000c8, 0x0, 0x4, 0x0, 0x0, 0xb, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00'], 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000580)=ANY=[], 0xfdef) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 940.544357ms ago: executing program 3 (id=1644): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@ptr={0x6, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30]}}, &(0x7f0000000100)=""/89, 0x27, 0x59, 0x1, 0x2bed, 0x10000, @value=r2}, 0x28) write$cgroup_type(r2, &(0x7f00000001c0), 0x9) unlink(&(0x7f0000000200)='./file0\x00') openat$cgroup_freezer_state(r1, &(0x7f0000000240), 0x2, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0xa, &(0x7f0000000300)=@raw=[@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x5}], &(0x7f0000000380)='syzkaller\x00', 0x76, 0x58, &(0x7f00000003c0)=""/88, 0x41000, 0x18, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f0000000480)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xa4f7, 0x10000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r2], &(0x7f0000000540), 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001780)={r2, 0x0, 0xae, 0x1000, &(0x7f0000000640)="11c863f2080e082a1aaef9962a140d7952fcc1a64aa075662007bab553c6768452a1352bf778a8070851280613e0b2b64643ac14191486d76f31d39651f46fa321c3713fb6b32e82283328d8ce4d814943adefe4711981522e2814a8c7062ac0091602bc733cecc2f7c3859b393184864ee8a45f40b8a8d47fbd23639f294f774bcbd1b56a1d0d52c14e4fb2d3baf7fa455e37c5b04234660a1f9a7938417a0e54f9e352588095c85f70922574db", &(0x7f0000000700)=""/4096, 0x0, 0x0, 0x12, 0x2d, &(0x7f0000001700)="ae7661119dbe3b2053d189e79cf170ecab5c", &(0x7f0000001740)="86a8ed2bfc0871f2d979e0948417102f135f5dc7395737739f728c9df3d29bd1b677eb47963d57ac60a929e839", 0x6, 0x0, 0x8}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001800)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002b40)={r5, 0x20, &(0x7f0000002b00)={&(0x7f0000001a80)=""/120, 0x78, 0x0, &(0x7f0000001b00)=""/4096, 0x1000}}, 0x10) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002cc0)={0x6, 0x2, &(0x7f0000002b80)=@raw=[@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}], &(0x7f0000002bc0)='syzkaller\x00', 0x3, 0x1c, &(0x7f0000002c00)=""/28, 0x41100, 0x72, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000002c40)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000002c80)={0x0, 0x0, 0x8a1e, 0x31}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000002e00)={0x1e, 0x12, &(0x7f0000001840)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @alu={0x4, 0x1, 0xc, 0x6, 0x1, 0x80}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe03}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}], &(0x7f0000001900)='syzkaller\x00', 0x27a3, 0x9b, &(0x7f0000001940)=""/155, 0xc3000, 0x60, '\x00', 0x0, @sk_lookup, r3, 0x8, &(0x7f0000001a00)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001a40)={0x4, 0xb, 0xe, 0x9}, 0x10, r7, r8, 0x0, &(0x7f0000002d80)=[r4], &(0x7f0000002dc0), 0x10, 0x1000, @void, @value}, 0x94) r9 = openat$cgroup_ro(r1, &(0x7f0000002ec0)='freezer.self_freezing\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000004040)={&(0x7f0000002f00)="61e3cd1ded1a494d84dc9a", &(0x7f0000002f40)=""/4096, &(0x7f0000003f40)="7dbce5410acdd31f0cd8163d80209e12eda476", &(0x7f0000003f80)="4a9c8da2a32bc0158cea21c1d546358c4e5ce6fd80c8171454583bdcd08302f1049fda2e01b0914f27399b73e495784cead70f39534abb53c772d9396f72b0f6f12f059c7579a37523b4540ffed27b3fc0c540cf556c417b6028994c7d12f02f7c59988f4b36db113ed6b5afb411cbbf33ff8219365bc75026aca5318dfa0693fe33f12e1429cc488fe82b1b5fb9638ba939bee4b4ced924be540fa6", 0x5, r9}, 0x38) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000004080)={r9}, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f0000004380)={&(0x7f00000040c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10, &(0x7f0000004280)=[{&(0x7f0000004100)="01f8c87f4b23ba4c3063950a4c614eb3b3d34ae88147eed5de8945525d4cbf8339a426497c89361ffbaa506fc40cc9b2f2c92861957016af595d41aed4447ef620003ad60c40c372c25ff9f7d394de81d6c3f67eb04e12c835a59823edd000f26120d005c8f7daf966852c9c584ad0c70acf2c32e2698a94195abb04e2db41c2e0a6ff1882c337f2af11157e01bba9", 0x8f}, {&(0x7f00000041c0)="8085e061ac1fcd830f21179d140f2c07537a927f2c7be4ab09b3a38612d66f57aab1fad4312be748e8d5b1d98e072266d835bb6237700931fe56e9ab22d908dab87aa10291e5120e51c575a7da19e0e659f815b5feaf195464046164e9fbe5b2f343f727ffd9be4422dbbf47a028bd51e8de629d8ce2aa834287df4f6296aab8677fa8029f0448770bab5678d7f8a978f3efb269526207be248136831f494c88987770a5e64615fcbce9cd23c52a382ed6a4b94a", 0xb4}], 0x2, &(0x7f00000042c0)=[@ip_ttl={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3e}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffff7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}], 0xa8}, 0x10) perf_event_open(&(0x7f0000004400)={0x5, 0x80, 0x9, 0x2a, 0x0, 0x81, 0x0, 0xa, 0x19040, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff7, 0x2, @perf_bp={&(0x7f00000043c0), 0x4}, 0x0, 0xfffffffffffffffe, 0x6, 0x1, 0x5, 0x44, 0x967, 0x0, 0x3, 0x0, 0xfff}, 0x0, 0x2, r10, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={r2, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x27, &(0x7f0000004700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x800}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xa6b9, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x8}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x2}, @exit, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000004840)='syzkaller\x00', 0x1, 0xce, &(0x7f0000004880)=""/206, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000004980)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000049c0)={0x0, 0x5, 0xfffffffb, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000004a00)=[r10, r9], &(0x7f0000004a40)=[{0x4, 0x5, 0x5, 0x9}, {0x1, 0x3, 0x5, 0x1}], 0x10, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000004c00)={0x11, 0x1d, &(0x7f0000004480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x4, 0x0, 0xe0a31dbe6e90bbd4, 0xb, 0x7, 0xfffffffffffffff0, 0xfffffffffffffff1}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @alu={0x4, 0x1, 0xd, 0x5, 0x0, 0x1, 0x4}, @alu={0x4, 0x0, 0xd, 0x2, 0x7, 0x1, 0x10}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000004580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x25, '\x00', r11, @fallback=0xe, 0xffffffffffffffff, 0x8, &(0x7f0000004680)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000046c0)={0x2, 0xb, 0x2, 0x2}, 0x10, 0xffffffffffffffff, r12, 0x5, &(0x7f0000004b40)=[r9], &(0x7f0000004b80)=[{0x1, 0x3, 0x3, 0xb}, {0x3, 0x1, 0x3}, {0x3, 0x4, 0x10, 0x2}, {0x5, 0x3, 0x6, 0x1}, {0x2, 0x3, 0x6}], 0x10, 0x1, @void, @value}, 0x94) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000004f80)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', r11, r9, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000005000)={&(0x7f0000004cc0)="6cb87ad5e32d6f2d60b27ba3040b8a417826eef1fca8e2e1b642109e62822e720214da20e2621f0c58f5f0081170e55cf33dde78b324593d72648f839d49c563e6bdde9f23d53a28b847a20919f1aa7743318edb78f1ad64c3e23385e0147138fadc974f8812e59f7113480a98a381", &(0x7f0000004d40)=""/156, &(0x7f0000004e00)="caaa076af65e716b3c4fa67e909227e44556e7f2e4dbe4a14aba5e3fe2e97742520864278b89cc94eab266a8b4f8acd183ddb6bf65b01741f3d4ca83127c41beff277a0e2fd8ef944edffcfa8c", &(0x7f0000004e80)="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", 0x5, r13}, 0x38) openat$cgroup(r9, &(0x7f0000005040)='syz1\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005340)={r10, 0xe0, &(0x7f0000005240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000005080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f00000050c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000005100)=[0x0], 0x0, 0x6e, &(0x7f0000005140)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000005180), &(0x7f00000051c0), 0x8, 0x65, 0x8, 0x8, &(0x7f0000005200)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000005380)=r14, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000053c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000058c0)={0x6, 0x16, &(0x7f0000005580)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @alu={0x7, 0x0, 0x9, 0x0, 0x5, 0x1, 0x1}, @jmp={0x5, 0x1, 0x7, 0x8, 0x4, 0xfffffffffffffff8}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}}, @map_fd={0x18, 0x8}, @call={0x85, 0x0, 0x0, 0x9a}, @ringbuf_query], &(0x7f0000005640)='GPL\x00', 0x10000, 0xd6, &(0x7f0000005680)=""/214, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000005780)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000057c0)={0x3, 0xe, 0x7, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000005880)=[r2, r10, 0xffffffffffffffff, r13, r6], 0x0, 0x10, 0x4, @void, @value}, 0x94) 934.182067ms ago: executing program 2 (id=1645): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fd"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="07000000040000001800000042a0000000000000", @ANYRES32, @ANYBLOB="010400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000ff0300"/28], 0x50) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0x0, 0xf00}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8000}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r6}, 0x10) (async) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) (async) write$cgroup_type(r4, &(0x7f0000000280), 0x9) perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r0, 0x0, 0x0}, 0x20) (async) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0xa0001f98, 0x0, 0x0, &(0x7f0000000440), 0x0, 0xa70a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)=@generic={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x18) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) (async) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0xfffffffa, 0x0, 0x1, 0x9d7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000380)={0x0, r9}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc85000000040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 762.788389ms ago: executing program 3 (id=1646): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff22, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x9, 0x10800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x4}, 0x104f1, 0xc8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffd, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 762.194569ms ago: executing program 4 (id=1647): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cf84ded40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c86e00f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec231fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895012f1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c3405000000000000003871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d37261774cc5a3bf6b466cb72812da518ff602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d50a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a31b16ac5fb73fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953f88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a5fe1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9d66ebbc8bab4ea81232fbef665f6212f875b2a00000000000000aceb111b66a500ca52fd8f848088c67ee65dfdcc4c580e9bc18c1699dca07d019bf1bf9dd3da480d6c155d7e60674ce88ab5ae07a9d16e22792d99986b531ab4e592ab5925da779e700cf20309a2137877690dc5c07956fc82d7b3bb46d3138041af18508938c9be4e5d0a98073463a5cff6c146d020743da474cb81677a6f389f0e00c33b70b7f8bab95435c27167f365a29fb09cbf35bf192f6a65616fa2ad9a6c7ca3a3ecd96aaecd993e8badb40e7eb8a22b0015e70c885cd519e28448168c6d914265998bff74ea1b0e651a6cae9419096248a0e41573827ad60fafce6e6540734c1f23f75337d836c31497e8112969a039d65aa297e2b046b5f4d11116a89f9f65693d4dc3e70fbfe0b2044fdb3f87e887d1daae8e38a0c19f668f776e19a02bb2449ee4384f6536879c85d7e41bc0276ee2b125d41ff358323311703ec01d64a573bdeb75bdcc87d01de38365ab9222713d2d1640a742d62fefb5403b2ed9969c32a0841e8c36b0107bb888eb14ac62e6d4bdfaeb9ee7436b97bf3825a19d6c8997ce285edf1d277ed703f560460417bfe702af833e83c5b987befb6d1fcf765ab7ea537d9dafb622a1ba8686cb9b1c63b84470364942e90d1cf856cead864f5e38c83b9ed86cc5725a20299ce512b165"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff22, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x9, 0x10800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x4}, 0x104f1, 0xc8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffd, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x4c2e81, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 758.499089ms ago: executing program 2 (id=1648): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x5, 0x40, 0x7, 0x0, 0x7fffffff, 0x9d6d1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0xfffffffffffffffd, 0xf}, 0x10137f, 0x7ff, 0x7, 0x4, 0x81, 0x5, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="b907ef19edfff007049e0ff0888e", 0x0, 0x6500, 0x18000000, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 480.296933ms ago: executing program 0 (id=1649): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000500"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x46) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000100, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x102004, 0x0, 0x0, 0x8, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000740)='xprtrdma_post_recvs_err\x00', r2, 0x0, 0x80}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="010400001700"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000030000000500"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x5, 0x1, 0x40, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 479.759793ms ago: executing program 1 (id=1650): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8001}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @call={0x85, 0x0, 0x0, 0x9e}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xba, &(0x7f00000001c0)=""/186, 0x41100, 0x10, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x1d294, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[r0], 0x0, 0x10, 0x6, @void, @value}, 0x94) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x400}, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000300)=r2, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) (async, rerun: 32) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r7, &(0x7f0000000200)="32252ec325f3ee00e6b87185ae36fade60cbceb7415990a6779fcc6143a37fe0e519c5", &(0x7f0000000280), 0x4}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r8}, 0x10) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 32) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x10000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair(0x21, 0x800, 0x6, &(0x7f0000000000)) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r6, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r9}, 0xc) (async) r11 = getpid() syz_open_procfs$namespace(r11, &(0x7f00000001c0)='ns/cgroup\x00') close(r10) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x88c2, 0x2, 0x0, 0x3, 0x5}, 0x0, 0x0, r5, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000009e7018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r13 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 409.874014ms ago: executing program 3 (id=1651): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{}, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x9, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af800bfa200000000000007020000f8ffffffb703000008090000b70400000000000085000000030000009500000000000000000000010b36e9000000000000e399d738fda54bfbee15c01c068ce3cd4a5da6f653ba9cd4627c6bef450e73570425086b4667aea667a8466ec0b59db3b33d5d3aa9b6168824ba56ca93229268af4e13300579ebbdf858b59754f92a42746db5a2fb4599ad6fc0b9a197dd6c0017d6ef353a7ed49432d8c620226ad8e4cc98d37d77df5eb4eac67c037fa5fb22f95afe1278850ba39b92a77419d0fff70bcab182cd33f5447f61d5a9c1acc47493"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 375.813705ms ago: executing program 2 (id=1652): socketpair(0x0, 0x6, 0x9, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'veth1_to_team\x00', 0x4000}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r0, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)='%-5lx \x00'}, 0x20) openat$cgroup_type(r0, &(0x7f0000000200), 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'bridge0\x00', 0x20}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='.\x00', r0}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r3, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1c, 0x3, 0x8, 0x4, 0x849, 0x1, 0xa718, '\x00', r5, r0, 0x3, 0x3, 0x5, 0x0, @void, @value, @void, @value}, 0x50) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000480)=r0, 0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000004c0)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) write$cgroup_devices(r0, &(0x7f0000000540)={'b', ' *:* ', 'wm\x00'}, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='cachefiles_ondemand_open\x00', r0, 0x0, 0x400}, 0x18) write$cgroup_subtree(r4, &(0x7f0000000600)={[{0x2b, 'net_cls'}, {0x2d, 'freezer'}, {0x2d, 'net_cls'}, {0x2b, 'perf_event'}, {0x2d, 'pids'}, {0x2b, 'rdma'}]}, 0x33) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000000640), 0x2, 0x0) r7 = gettid() r8 = perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x6, 0xff, 0x27, 0xc, 0x0, 0xfffffffffffffffb, 0x800, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xaf1, 0x1, @perf_config_ext={0xffffffff, 0x7}, 0x2101, 0x1, 0x8, 0x0, 0xc7, 0x0, 0x8, 0x0, 0x8, 0x0, 0x46e33f38}, r7, 0x6, r0, 0x3) recvmsg(r4, &(0x7f0000000900)={&(0x7f0000000700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000780)=""/143, 0x8f}], 0x1, &(0x7f0000000880)=""/101, 0x65}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000940), &(0x7f0000000980)='%+9llu \x00'}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000a00)={r0, r9}, 0xc) perf_event_open(&(0x7f0000000a40)={0x5, 0x80, 0x5, 0x8, 0x80, 0x80, 0x0, 0x5, 0x10100, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x1, @perf_config_ext={0x8, 0x1}, 0x0, 0xffffffff, 0x2, 0x0, 0x8, 0x8, 0xa, 0x0, 0x8, 0x0, 0x9}, r7, 0x0, r8, 0xb) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ac0)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x7fffffff, '\x00', r5, r0, 0x3, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001b40)={r2, &(0x7f0000000b40)="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"}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000001b80), 0x40000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000001bc0)={'gretap0\x00', 0x1000}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000001c40)={'caif0\x00', 0x10}) 340.037525ms ago: executing program 1 (id=1653): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000960000000000000000000000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0xa, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000f90000000000000000000000000000e18e64b45c17474c11c82ed299dd15f22c355339608ccd4ff3e719f40000000000000006aa0abd80f38570972242de20013fd38eb9acc11e0f75d4b2ba22ed3534154bad195b99e69470a83e847d62829917ff64df8f99944c9b9876d1d5b6"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r5}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r3, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0], 0x0, 0x99, &(0x7f0000000640)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0x23, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r7}, 0x10) close(r4) 337.365655ms ago: executing program 4 (id=1654): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xdba24f1ae7f3ded2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x5c6fa8aec5e2d98b, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11368}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) write$cgroup_subtree(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x40000000, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x702, 0xe, 0x700, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 0s ago: executing program 3 (id=1655): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x4e22, @broadcast}, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x15, &(0x7f0000000040), 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = gettid() perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x8, 0x2, 0x9, 0x2c, 0x0, 0x7fffffff, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x8, @perf_config_ext={0x6d, 0x59}, 0x108404, 0x0, 0x7, 0x4, 0x4a, 0x13eb, 0x1, 0x0, 0x9, 0x0, 0x401}, r5, 0x4, r4, 0x2) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.143' (ED25519) to the list of known hosts. [ 22.882565][ T30] audit: type=1400 audit(1746862680.321:64): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.883963][ T274] cgroup: Unknown subsys name 'net' [ 22.905344][ T30] audit: type=1400 audit(1746862680.321:65): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.932631][ T30] audit: type=1400 audit(1746862680.351:66): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.932860][ T274] cgroup: Unknown subsys name 'devices' [ 23.166377][ T274] cgroup: Unknown subsys name 'hugetlb' [ 23.171995][ T274] cgroup: Unknown subsys name 'rlimit' [ 23.282665][ T30] audit: type=1400 audit(1746862680.721:67): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.305881][ T30] audit: type=1400 audit(1746862680.721:68): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.312471][ T276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.330842][ T30] audit: type=1400 audit(1746862680.721:69): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 23.362493][ T30] audit: type=1400 audit(1746862680.791:70): avc: denied { relabelto } for pid=276 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.387919][ T30] audit: type=1400 audit(1746862680.791:71): avc: denied { write } for pid=276 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.423448][ T30] audit: type=1400 audit(1746862680.861:72): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.424017][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.449080][ T30] audit: type=1400 audit(1746862680.861:73): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.326528][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.333680][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.341360][ T283] device bridge_slave_0 entered promiscuous mode [ 24.348476][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.355563][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.363034][ T283] device bridge_slave_1 entered promiscuous mode [ 24.458770][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.465848][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.473324][ T285] device bridge_slave_0 entered promiscuous mode [ 24.480904][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.488142][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.495738][ T282] device bridge_slave_0 entered promiscuous mode [ 24.503333][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.510595][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.518013][ T282] device bridge_slave_1 entered promiscuous mode [ 24.529483][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.536658][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.544028][ T285] device bridge_slave_1 entered promiscuous mode [ 24.613202][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.620333][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.627784][ T284] device bridge_slave_0 entered promiscuous mode [ 24.644559][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.651619][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.659204][ T284] device bridge_slave_1 entered promiscuous mode [ 24.683867][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.691101][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.698578][ T286] device bridge_slave_0 entered promiscuous mode [ 24.709088][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.716160][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.723413][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.730540][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.747019][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.754145][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.761673][ T286] device bridge_slave_1 entered promiscuous mode [ 24.889240][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.896313][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.903591][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.910650][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.926858][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.934018][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.941321][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.948373][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.970784][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.978433][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.986065][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.993205][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.000525][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.008164][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.017079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.024579][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.046646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.054938][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.061956][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.087003][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.095415][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.102437][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.137474][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.145005][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.153853][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.184658][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.192340][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.201496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.209970][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.217048][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.224664][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.232897][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.239947][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.247895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.256209][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.263227][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.270818][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.279036][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.286091][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.293434][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.301444][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.309435][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.317623][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.324664][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.332008][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.340242][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.347373][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.355832][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.377577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.385895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.393892][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.401629][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.409480][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.418125][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.426669][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.433707][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.441230][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.449748][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.457916][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.466323][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.474827][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.481846][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.489303][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.497332][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.505434][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.513856][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.521964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.530143][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.538215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.548225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.556481][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.564567][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.573356][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.594746][ T285] device veth0_vlan entered promiscuous mode [ 25.606877][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.615496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.623798][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.632068][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.640405][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.648944][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.657568][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.665744][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.673817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.681450][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.689115][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.696816][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.708396][ T286] device veth0_vlan entered promiscuous mode [ 25.718080][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.726204][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.734240][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.741901][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.750261][ T283] device veth0_vlan entered promiscuous mode [ 25.761620][ T285] device veth1_macvtap entered promiscuous mode [ 25.770212][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.778648][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.787130][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.798393][ T286] device veth1_macvtap entered promiscuous mode [ 25.815762][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.824457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.832691][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.841662][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.849973][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.858272][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.866648][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.875160][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.882988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.891160][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.898721][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.911807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.920376][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.929230][ T284] device veth0_vlan entered promiscuous mode [ 25.944892][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.953324][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.962091][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.971046][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.981976][ T282] device veth0_vlan entered promiscuous mode [ 25.995292][ T283] device veth1_macvtap entered promiscuous mode [ 26.002381][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.011049][ T285] request_module fs-gadgetfs succeeded, but still no fs? [ 26.011065][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.026895][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.035250][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.043378][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.051858][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.059715][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.068266][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.076152][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.095471][ T284] device veth1_macvtap entered promiscuous mode [ 26.110285][ T282] device veth1_macvtap entered promiscuous mode [ 26.121503][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.130479][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.140133][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.148701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.157181][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.188500][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.205255][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.213763][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.222382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.232154][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.240923][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.249767][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.258457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.267094][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.275998][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.497396][ C0] hrtimer: interrupt took 26898 ns [ 26.687219][ T314] bond_slave_1: mtu less than device minimum [ 27.854835][ T359] device sit0 entered promiscuous mode [ 27.893314][ T366] syz.2.17[366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.893418][ T366] syz.2.17[366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.919048][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 28.046302][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 28.046348][ T30] audit: type=1400 audit(1746862685.481:113): avc: denied { create } for pid=368 comm="syz.2.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 28.156498][ T30] audit: type=1400 audit(1746862685.601:114): avc: denied { create } for pid=379 comm="syz.4.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 28.229939][ T381] device veth1_macvtap left promiscuous mode [ 28.251256][ T386] Q±6ã×\b‹¡Y­4: renamed from lo [ 28.634370][ T30] audit: type=1400 audit(1746862686.071:115): avc: denied { read } for pid=395 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.659991][ T398] device veth0_vlan left promiscuous mode [ 28.683793][ T398] device veth0_vlan entered promiscuous mode [ 30.067896][ T460] device pim6reg1 entered promiscuous mode [ 30.114059][ T446] device veth0_vlan left promiscuous mode [ 30.159438][ T446] device veth0_vlan entered promiscuous mode [ 30.207091][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.236063][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.252763][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.842597][ T502] device veth0_vlan left promiscuous mode [ 30.848817][ T502] device veth0_vlan entered promiscuous mode [ 30.860507][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.965050][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.014636][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.048865][ T30] audit: type=1400 audit(1746862689.491:116): avc: denied { write } for pid=509 comm="syz.4.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.257519][ T523] device veth1_macvtap entered promiscuous mode [ 32.290774][ T523] device macsec0 entered promiscuous mode [ 32.297289][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.821472][ T30] audit: type=1400 audit(1746862690.261:117): avc: denied { ioctl } for pid=546 comm="syz.4.75" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 33.061024][ T578] FAULT_INJECTION: forcing a failure. [ 33.061024][ T578] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 33.163351][ T578] CPU: 0 PID: 578 Comm: syz.3.84 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 33.173204][ T578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 33.183387][ T578] Call Trace: [ 33.186688][ T578] [ 33.189649][ T578] __dump_stack+0x21/0x30 [ 33.194015][ T578] dump_stack_lvl+0xee/0x150 [ 33.198632][ T578] ? show_regs_print_info+0x20/0x20 [ 33.203941][ T578] ? __kasan_kmalloc+0xec/0x110 [ 33.208948][ T578] ? bpf_map_area_alloc+0x49/0xe0 [ 33.214084][ T578] ? bpf_ringbuf_alloc+0x37/0x470 [ 33.219227][ T578] dump_stack+0x15/0x20 [ 33.223415][ T578] should_fail+0x3c1/0x510 [ 33.228046][ T578] should_fail_alloc_page+0x55/0x80 [ 33.233405][ T578] prepare_alloc_pages+0x156/0x600 [ 33.238642][ T578] ? __alloc_pages_bulk+0xab0/0xab0 [ 33.243953][ T578] __alloc_pages+0x10a/0x440 [ 33.248643][ T578] ? prep_new_page+0x110/0x110 [ 33.253567][ T578] ? bpf_map_area_alloc+0x49/0xe0 [ 33.258882][ T578] bpf_ringbuf_alloc+0xaf/0x470 [ 33.263764][ T578] ? kmem_cache_alloc_trace+0x119/0x270 [ 33.269427][ T578] ? ringbuf_map_alloc+0x1a3/0x320 [ 33.274566][ T578] ? bpf_map_init_from_attr+0x146/0x350 [ 33.280227][ T578] ringbuf_map_alloc+0x1f6/0x320 [ 33.285187][ T578] map_create+0x455/0x21b0 [ 33.290224][ T578] __sys_bpf+0x2cf/0x730 [ 33.294468][ T578] ? bpf_link_show_fdinfo+0x310/0x310 [ 33.299979][ T578] ? debug_smp_processor_id+0x17/0x20 [ 33.305370][ T578] __x64_sys_bpf+0x7c/0x90 [ 33.309783][ T578] x64_sys_call+0x4b9/0x9a0 [ 33.314376][ T578] do_syscall_64+0x4c/0xa0 [ 33.318796][ T578] ? clear_bhb_loop+0x35/0x90 [ 33.323480][ T578] ? clear_bhb_loop+0x35/0x90 [ 33.328154][ T578] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 33.334069][ T578] RIP: 0033:0x7f623fc0a969 [ 33.338484][ T578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.358727][ T578] RSP: 002b:00007f623e273038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 33.367864][ T578] RAX: ffffffffffffffda RBX: 00007f623fe31fa0 RCX: 00007f623fc0a969 [ 33.375849][ T578] RDX: 0000000000000048 RSI: 00002000000008c0 RDI: 0000000000000000 [ 33.384025][ T578] RBP: 00007f623e273090 R08: 0000000000000000 R09: 0000000000000000 [ 33.392435][ T578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 33.400602][ T578] R13: 0000000000000001 R14: 00007f623fe31fa0 R15: 00007ffc4a766e38 [ 33.408586][ T578] [ 33.530246][ T30] audit: type=1400 audit(1746862690.971:118): avc: denied { create } for pid=594 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 34.396414][ T653] FAULT_INJECTION: forcing a failure. [ 34.396414][ T653] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 34.574579][ T653] CPU: 0 PID: 653 Comm: syz.2.99 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 34.584450][ T653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 34.594621][ T653] Call Trace: [ 34.598122][ T653] [ 34.601078][ T653] __dump_stack+0x21/0x30 [ 34.605621][ T653] dump_stack_lvl+0xee/0x150 [ 34.610426][ T653] ? show_regs_print_info+0x20/0x20 [ 34.615840][ T653] dump_stack+0x15/0x20 [ 34.620111][ T653] should_fail+0x3c1/0x510 [ 34.624680][ T653] should_fail_alloc_page+0x55/0x80 [ 34.630007][ T653] prepare_alloc_pages+0x156/0x600 [ 34.635236][ T653] ? __alloc_pages_bulk+0xab0/0xab0 [ 34.640886][ T653] ? __bpf_trace_mm_page_alloc+0xc0/0xf0 [ 34.646535][ T653] __alloc_pages+0x10a/0x440 [ 34.651128][ T653] ? prep_new_page+0x110/0x110 [ 34.655897][ T653] ? bpf_map_area_alloc+0x49/0xe0 [ 34.660931][ T653] bpf_ringbuf_alloc+0xec/0x470 [ 34.665786][ T653] ? kmem_cache_alloc_trace+0x119/0x270 [ 34.671422][ T653] ? ringbuf_map_alloc+0x1a3/0x320 [ 34.676557][ T653] ? bpf_map_init_from_attr+0x146/0x350 [ 34.682235][ T653] ringbuf_map_alloc+0x1f6/0x320 [ 34.687348][ T653] map_create+0x455/0x21b0 [ 34.691860][ T653] __sys_bpf+0x2cf/0x730 [ 34.696198][ T653] ? bpf_link_show_fdinfo+0x310/0x310 [ 34.701582][ T653] ? debug_smp_processor_id+0x17/0x20 [ 34.707041][ T653] __x64_sys_bpf+0x7c/0x90 [ 34.711458][ T653] x64_sys_call+0x4b9/0x9a0 [ 34.715969][ T653] do_syscall_64+0x4c/0xa0 [ 34.720498][ T653] ? clear_bhb_loop+0x35/0x90 [ 34.725264][ T653] ? clear_bhb_loop+0x35/0x90 [ 34.729952][ T653] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 34.735939][ T653] RIP: 0033:0x7fcde0297969 [ 34.740460][ T653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.761164][ T653] RSP: 002b:00007fcdde900038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.770109][ T653] RAX: ffffffffffffffda RBX: 00007fcde04befa0 RCX: 00007fcde0297969 [ 34.778194][ T653] RDX: 0000000000000048 RSI: 00002000000008c0 RDI: 0000000000000000 [ 34.786367][ T653] RBP: 00007fcdde900090 R08: 0000000000000000 R09: 0000000000000000 [ 34.794489][ T653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.802479][ T653] R13: 0000000000000001 R14: 00007fcde04befa0 R15: 00007ffc8edeb2b8 [ 34.810546][ T653] [ 35.449115][ T30] audit: type=1400 audit(1746862692.891:119): avc: denied { relabelfrom } for pid=675 comm="syz.3.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 35.534924][ T30] audit: type=1400 audit(1746862692.891:120): avc: denied { relabelto } for pid=675 comm="syz.3.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 35.658240][ T693] FAULT_INJECTION: forcing a failure. [ 35.658240][ T693] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 35.700089][ T693] CPU: 1 PID: 693 Comm: syz.1.113 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 35.710070][ T693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 35.721716][ T693] Call Trace: [ 35.725143][ T693] [ 35.728126][ T693] __dump_stack+0x21/0x30 [ 35.732742][ T693] dump_stack_lvl+0xee/0x150 [ 35.737721][ T693] ? show_regs_print_info+0x20/0x20 [ 35.742942][ T693] ? __kasan_kmalloc+0xec/0x110 [ 35.747934][ T693] ? bpf_map_area_alloc+0x49/0xe0 [ 35.753585][ T693] ? bpf_ringbuf_alloc+0x37/0x470 [ 35.758719][ T693] dump_stack+0x15/0x20 [ 35.763050][ T693] should_fail+0x3c1/0x510 [ 35.767594][ T693] should_fail_alloc_page+0x55/0x80 [ 35.772861][ T693] prepare_alloc_pages+0x156/0x600 [ 35.778199][ T693] ? __alloc_pages_bulk+0xab0/0xab0 [ 35.783517][ T693] __alloc_pages+0x10a/0x440 [ 35.788227][ T693] ? prep_new_page+0x110/0x110 [ 35.793215][ T693] ? bpf_map_area_alloc+0x49/0xe0 [ 35.798375][ T693] bpf_ringbuf_alloc+0xec/0x470 [ 35.803266][ T693] ? kmem_cache_alloc_trace+0x119/0x270 [ 35.808918][ T693] ? ringbuf_map_alloc+0x1a3/0x320 [ 35.814052][ T693] ? bpf_map_init_from_attr+0x146/0x350 [ 35.819630][ T693] ringbuf_map_alloc+0x1f6/0x320 [ 35.824850][ T693] map_create+0x455/0x21b0 [ 35.829292][ T693] __sys_bpf+0x2cf/0x730 [ 35.833552][ T693] ? bpf_link_show_fdinfo+0x310/0x310 [ 35.838951][ T693] ? debug_smp_processor_id+0x17/0x20 [ 35.844349][ T693] __x64_sys_bpf+0x7c/0x90 [ 35.849001][ T693] x64_sys_call+0x4b9/0x9a0 [ 35.853522][ T693] do_syscall_64+0x4c/0xa0 [ 35.857955][ T693] ? clear_bhb_loop+0x35/0x90 [ 35.862743][ T693] ? clear_bhb_loop+0x35/0x90 [ 35.867532][ T693] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 35.873448][ T693] RIP: 0033:0x7fb342dda969 [ 35.877882][ T693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 35.897683][ T693] RSP: 002b:00007fb341443038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 35.906117][ T693] RAX: ffffffffffffffda RBX: 00007fb343001fa0 RCX: 00007fb342dda969 [ 35.914519][ T693] RDX: 0000000000000048 RSI: 00002000000008c0 RDI: 0000000000000000 [ 35.922517][ T693] RBP: 00007fb341443090 R08: 0000000000000000 R09: 0000000000000000 [ 35.930936][ T693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 35.938957][ T693] R13: 0000000000000001 R14: 00007fb343001fa0 R15: 00007ffdc49d17c8 [ 35.946949][ T693] [ 36.106647][ T30] audit: type=1400 audit(1746862693.551:121): avc: denied { create } for pid=703 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 36.262936][ T30] audit: type=1400 audit(1746862693.701:122): avc: denied { write } for pid=696 comm="syz.3.114" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.539133][ T30] audit: type=1400 audit(1746862693.981:123): avc: denied { create } for pid=709 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 36.701917][ T711] device pim6reg1 entered promiscuous mode [ 36.903852][ T30] audit: type=1400 audit(1746862694.331:124): avc: denied { create } for pid=719 comm="syz.3.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 36.969977][ T30] audit: type=1400 audit(1746862694.411:125): avc: denied { ioctl } for pid=713 comm="syz.4.117" path="socket:[17310]" dev="sockfs" ino=17310 ioctlcmd=0x7451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 37.053358][ T30] audit: type=1400 audit(1746862694.491:126): avc: denied { create } for pid=727 comm="syz.2.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 38.982614][ T782] device pim6reg1 entered promiscuous mode [ 39.062191][ T798] device veth1_macvtap left promiscuous mode [ 39.116178][ T798] device macsec0 entered promiscuous mode [ 39.209560][ T30] audit: type=1400 audit(1746862696.651:127): avc: denied { create } for pid=804 comm="syz.3.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 39.351154][ T796] device pim6reg1 entered promiscuous mode [ 40.201665][ T30] audit: type=1400 audit(1746862697.641:128): avc: denied { create } for pid=845 comm="syz.1.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 42.264978][ T894] device pim6reg1 entered promiscuous mode [ 42.364477][ T30] audit: type=1400 audit(1746862699.811:129): avc: denied { read write } for pid=922 comm="syz.4.174" name="cgroup.subtree_control" dev="cgroup2" ino=278 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 42.424219][ T30] audit: type=1400 audit(1746862699.841:130): avc: denied { open } for pid=922 comm="syz.4.174" path="" dev="cgroup2" ino=278 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 42.673171][ T938] ip6_vti0: mtu greater than device maximum [ 42.914970][ T968] device syzkaller0 entered promiscuous mode [ 43.132229][ T30] audit: type=1400 audit(1746862700.571:131): avc: denied { create } for pid=978 comm="syz.4.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 43.153194][ T974] device pim6reg1 entered promiscuous mode [ 43.162330][ T979] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.171219][ T979] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.269061][ T972] ÿÿÿÿÿÿ: renamed from vlan1 [ 43.497820][ T1008] device pim6reg1 entered promiscuous mode [ 44.527697][ T1037] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 44.845253][ T1069] syz.1.218[1069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.845357][ T1069] syz.1.218[1069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.915828][ T1070] syz.2.217 (1070) used obsolete PPPIOCDETACH ioctl [ 45.042172][ T30] audit: type=1400 audit(1746862702.481:132): avc: denied { create } for pid=1080 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 45.064021][ T1081] device veth1_macvtap left promiscuous mode [ 46.045187][ T1121] device syzkaller0 entered promiscuous mode [ 46.121295][ T1142] FAULT_INJECTION: forcing a failure. [ 46.121295][ T1142] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 46.202925][ T1142] CPU: 1 PID: 1142 Comm: syz.1.239 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 46.212885][ T1142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 46.222967][ T1142] Call Trace: [ 46.226446][ T1142] [ 46.229413][ T1142] __dump_stack+0x21/0x30 [ 46.233864][ T1142] dump_stack_lvl+0xee/0x150 [ 46.238479][ T1142] ? show_regs_print_info+0x20/0x20 [ 46.243877][ T1142] ? __kasan_kmalloc+0xec/0x110 [ 46.248758][ T1142] ? bpf_map_area_alloc+0x49/0xe0 [ 46.253806][ T1142] ? bpf_ringbuf_alloc+0x37/0x470 [ 46.258939][ T1142] dump_stack+0x15/0x20 [ 46.263166][ T1142] should_fail+0x3c1/0x510 [ 46.267605][ T1142] should_fail_alloc_page+0x55/0x80 [ 46.273096][ T1142] prepare_alloc_pages+0x156/0x600 [ 46.278598][ T1142] ? __alloc_pages_bulk+0xab0/0xab0 [ 46.283829][ T1142] __alloc_pages+0x10a/0x440 [ 46.288458][ T1142] ? prep_new_page+0x110/0x110 [ 46.293426][ T1142] ? bpf_map_area_alloc+0x49/0xe0 [ 46.298483][ T1142] bpf_ringbuf_alloc+0x1b5/0x470 [ 46.303803][ T1142] ringbuf_map_alloc+0x1f6/0x320 [ 46.309382][ T1142] map_create+0x455/0x21b0 [ 46.313831][ T1142] __sys_bpf+0x2cf/0x730 [ 46.318102][ T1142] ? bpf_link_show_fdinfo+0x310/0x310 [ 46.323599][ T1142] ? debug_smp_processor_id+0x17/0x20 [ 46.329590][ T1142] __x64_sys_bpf+0x7c/0x90 [ 46.334028][ T1142] x64_sys_call+0x4b9/0x9a0 [ 46.338656][ T1142] do_syscall_64+0x4c/0xa0 [ 46.343275][ T1142] ? clear_bhb_loop+0x35/0x90 [ 46.348192][ T1142] ? clear_bhb_loop+0x35/0x90 [ 46.353148][ T1142] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.359084][ T1142] RIP: 0033:0x7fb342dda969 [ 46.363540][ T1142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.383351][ T1142] RSP: 002b:00007fb341443038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 46.391804][ T1142] RAX: ffffffffffffffda RBX: 00007fb343001fa0 RCX: 00007fb342dda969 [ 46.399886][ T1142] RDX: 0000000000000048 RSI: 00002000000008c0 RDI: 0000000000000000 [ 46.408324][ T1142] RBP: 00007fb341443090 R08: 0000000000000000 R09: 0000000000000000 [ 46.416325][ T1142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 46.424508][ T1142] R13: 0000000000000001 R14: 00007fb343001fa0 R15: 00007ffdc49d17c8 [ 46.432870][ T1142] [ 47.430790][ T1183] device syzkaller0 entered promiscuous mode [ 47.850223][ T1187] device sit0 entered promiscuous mode [ 48.605264][ T1234] FAULT_INJECTION: forcing a failure. [ 48.605264][ T1234] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 48.640819][ T1234] CPU: 1 PID: 1234 Comm: syz.1.263 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 48.650961][ T1234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 48.661040][ T1234] Call Trace: [ 48.664337][ T1234] [ 48.667486][ T1234] __dump_stack+0x21/0x30 [ 48.671847][ T1234] dump_stack_lvl+0xee/0x150 [ 48.676589][ T1234] ? show_regs_print_info+0x20/0x20 [ 48.682073][ T1234] ? __kasan_kmalloc+0xec/0x110 [ 48.686970][ T1234] ? bpf_map_area_alloc+0x49/0xe0 [ 48.692143][ T1234] ? bpf_ringbuf_alloc+0x37/0x470 [ 48.697644][ T1234] dump_stack+0x15/0x20 [ 48.701835][ T1234] should_fail+0x3c1/0x510 [ 48.706380][ T1234] should_fail_alloc_page+0x55/0x80 [ 48.711790][ T1234] prepare_alloc_pages+0x156/0x600 [ 48.716909][ T1234] ? __alloc_pages_bulk+0xab0/0xab0 [ 48.722234][ T1234] __alloc_pages+0x10a/0x440 [ 48.726829][ T1234] ? prep_new_page+0x110/0x110 [ 48.731595][ T1234] ? bpf_map_area_alloc+0x49/0xe0 [ 48.736654][ T1234] bpf_ringbuf_alloc+0x1b5/0x470 [ 48.741686][ T1234] ringbuf_map_alloc+0x1f6/0x320 [ 48.746635][ T1234] map_create+0x455/0x21b0 [ 48.751068][ T1234] __sys_bpf+0x2cf/0x730 [ 48.755309][ T1234] ? bpf_link_show_fdinfo+0x310/0x310 [ 48.760778][ T1234] ? debug_smp_processor_id+0x17/0x20 [ 48.766337][ T1234] __x64_sys_bpf+0x7c/0x90 [ 48.770756][ T1234] x64_sys_call+0x4b9/0x9a0 [ 48.775539][ T1234] do_syscall_64+0x4c/0xa0 [ 48.780068][ T1234] ? clear_bhb_loop+0x35/0x90 [ 48.784882][ T1234] ? clear_bhb_loop+0x35/0x90 [ 48.789563][ T1234] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.795464][ T1234] RIP: 0033:0x7fb342dda969 [ 48.799880][ T1234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.820131][ T1234] RSP: 002b:00007fb341443038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 48.828653][ T1234] RAX: ffffffffffffffda RBX: 00007fb343001fa0 RCX: 00007fb342dda969 [ 48.836778][ T1234] RDX: 0000000000000048 RSI: 00002000000008c0 RDI: 0000000000000000 [ 48.844941][ T1234] RBP: 00007fb341443090 R08: 0000000000000000 R09: 0000000000000000 [ 48.853043][ T1234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 48.861052][ T1234] R13: 0000000000000001 R14: 00007fb343001fa0 R15: 00007ffdc49d17c8 [ 48.869031][ T1234] [ 49.089590][ T30] audit: type=1400 audit(1746862706.531:133): avc: denied { create } for pid=1239 comm="syz.4.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 49.527189][ T1248] device veth0_vlan left promiscuous mode [ 49.589535][ T1248] device veth0_vlan entered promiscuous mode [ 49.775704][ T1262] device wg2 entered promiscuous mode [ 50.919769][ T1317] device pim6reg1 entered promiscuous mode [ 51.191971][ T1341] device sit0 entered promiscuous mode [ 51.297984][ T1348] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 51.333955][ T1348] device syzkaller0 entered promiscuous mode [ 52.756399][ T1377] device sit0 left promiscuous mode [ 52.781668][ T1377] device sit0 entered promiscuous mode [ 52.872508][ T1386] bond_slave_1: mtu less than device minimum [ 53.321655][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.891897][ T1414] device sit0 left promiscuous mode [ 53.921828][ T30] audit: type=1400 audit(1746862711.361:134): avc: denied { create } for pid=1415 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 53.977744][ T1414] device sit0 entered promiscuous mode [ 54.021617][ T1413] device sit0 left promiscuous mode [ 54.036779][ T1416] device sit0 entered promiscuous mode [ 55.921446][ T1520] ªªªªªª: renamed from vlan0 [ 55.965233][ T1524] device sit0 entered promiscuous mode [ 56.193489][ T1536] device syzkaller0 entered promiscuous mode [ 56.267988][ T1548] device syzkaller0 entered promiscuous mode [ 56.279925][ T1548] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 56.287188][ T1548] syzkaller0: Linktype set failed because interface is up [ 56.297854][ T1548] device pim6reg1 entered promiscuous mode [ 56.410181][ T30] audit: type=1400 audit(1746862713.851:135): avc: denied { create } for pid=1556 comm="syz.3.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 57.534261][ C0] sched: RT throttling activated [ 60.583922][ T1574] device sit0 left promiscuous mode [ 60.591990][ T1573] device veth0_vlan left promiscuous mode [ 60.598470][ T1573] device veth0_vlan entered promiscuous mode [ 60.615684][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.624135][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 60.646277][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.747859][ T1612] device syzkaller0 entered promiscuous mode [ 62.760590][ T1622] device veth0_vlan left promiscuous mode [ 62.768691][ T1622] device veth0_vlan entered promiscuous mode [ 62.795045][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.803882][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.811817][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 62.931605][ T1616] device syzkaller0 entered promiscuous mode [ 62.947249][ T30] audit: type=1400 audit(1746862720.391:136): avc: denied { create } for pid=1632 comm="syz.4.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 63.052771][ T1636] device syzkaller0 entered promiscuous mode [ 63.740205][ T1641] device sit0 left promiscuous mode [ 65.220806][ T1694] device sit0 left promiscuous mode [ 65.338674][ T1703] device sit0 entered promiscuous mode [ 66.423936][ T1741] device pim6reg1 entered promiscuous mode [ 66.477600][ T1739] device wg2 entered promiscuous mode [ 66.493157][ T1744] device sit0 entered promiscuous mode [ 66.857155][ T1753] device syzkaller0 entered promiscuous mode [ 67.700850][ T30] audit: type=1400 audit(1746862725.141:137): avc: denied { create } for pid=1767 comm="syz.1.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 68.410071][ T1799] device pim6reg1 entered promiscuous mode [ 69.066750][ T30] audit: type=1400 audit(1746862726.511:138): avc: denied { create } for pid=1835 comm="syz.2.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 69.151485][ T30] audit: type=1400 audit(1746862726.511:139): avc: denied { create } for pid=1835 comm="syz.2.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 69.236305][ T1845] device syzkaller0 entered promiscuous mode [ 70.023142][ T1880] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.030519][ T1880] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.341183][ T1894] device pim6reg1 entered promiscuous mode [ 72.845688][ T1948] syz.0.470[1948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.845799][ T1948] syz.0.470[1948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.458957][ T1961] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 74.368739][ T1977] device syzkaller0 entered promiscuous mode [ 74.781122][ T1986] device veth0_vlan left promiscuous mode [ 74.808410][ T1986] device veth0_vlan entered promiscuous mode [ 74.857927][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 74.871554][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 74.893368][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.994137][ T1994] pim6reg1: mtu less than device minimum [ 78.171364][ T2085] device veth0_vlan left promiscuous mode [ 78.180882][ T2085] device veth0_vlan entered promiscuous mode [ 78.203670][ T2085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.241736][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.270033][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.293938][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 78.855840][ T2108] device syzkaller0 entered promiscuous mode [ 80.012625][ T2159] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.019888][ T2159] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.503394][ T2154] device syzkaller0 entered promiscuous mode [ 80.683397][ T30] audit: type=1400 audit(1746862738.101:140): avc: denied { create } for pid=2199 comm="syz.0.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 82.026402][ T2237] device syzkaller0 entered promiscuous mode [ 82.887169][ T2260] ref_ctr_offset mismatch. inode: 0x215 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 82.986481][ T2258] device pim6reg1 entered promiscuous mode [ 83.844985][ T2290] device syzkaller0 entered promiscuous mode [ 84.069458][ T2304] ref_ctr_offset mismatch. inode: 0x2c0 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 84.442549][ T2309] device pim6reg1 entered promiscuous mode [ 84.523936][ T2319] device sit0 left promiscuous mode [ 85.180025][ T2333] device syzkaller0 entered promiscuous mode [ 85.392604][ T2364] ref_ctr_offset mismatch. inode: 0x240 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 85.997218][ T2377] device syzkaller0 entered promiscuous mode [ 86.473685][ T2403] device syzkaller0 entered promiscuous mode [ 86.960698][ T2422] ref_ctr_offset mismatch. inode: 0x24b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 87.433241][ T2442] device pim6reg1 entered promiscuous mode [ 87.869377][ T2461] device syzkaller0 entered promiscuous mode [ 89.105743][ T2518] device syzkaller0 entered promiscuous mode [ 89.589410][ T2541] device pim6reg1 entered promiscuous mode [ 89.990252][ T2544] device syzkaller0 entered promiscuous mode [ 90.084240][ T2549] syz.2.642 (2549) used greatest stack depth: 22192 bytes left [ 92.092763][ T2606] device syzkaller0 entered promiscuous mode [ 92.293800][ T2619] bond_slave_1: mtu less than device minimum [ 92.634863][ T2636] device syzkaller0 entered promiscuous mode [ 92.712579][ T2659] syz.3.676[2659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.712661][ T2659] syz.3.676[2659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.758418][ T2659] device wg2 left promiscuous mode [ 92.780011][ T2659] syz.3.676[2659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.780091][ T2659] syz.3.676[2659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.800809][ T2659] device wg2 entered promiscuous mode [ 92.841963][ T2659] device sit0 left promiscuous mode [ 92.892723][ T2665] device sit0 entered promiscuous mode [ 93.075168][ T2676] device sit0 entered promiscuous mode [ 94.285878][ T2733] device pim6reg1 entered promiscuous mode [ 94.422903][ T2742] ------------[ cut here ]------------ [ 94.443641][ T2742] trace type BPF program uses run-time allocation [ 94.463537][ T2742] WARNING: CPU: 0 PID: 2742 at kernel/bpf/verifier.c:11701 check_map_prog_compatibility+0x6cd/0x870 [ 94.483849][ T2742] Modules linked in: [ 94.496825][ T2742] CPU: 0 PID: 2742 Comm: syz.1.701 Not tainted 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 94.523580][ T2742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 94.550506][ T2742] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 94.586153][ T2742] Code: ee ff 48 c7 c6 60 de 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 26 4c ee ff c6 05 53 71 6b 05 01 48 c7 c7 c0 da 47 85 e8 a3 b9 21 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 94.673722][ T2742] RSP: 0018:ffffc900010d7428 EFLAGS: 00010246 [ 94.710197][ T2742] RAX: 0f9f114eda972a00 RBX: 0000000000000001 RCX: 0000000000080000 [ 94.745148][ T2742] RDX: ffffc9000137b000 RSI: 0000000000002e00 RDI: 0000000000002e01 [ 94.770836][ T2742] RBP: ffffc900010d7470 R08: dffffc0000000000 R09: ffffed103ee065e8 [ 94.810380][ T2742] R10: ffffed103ee065e8 R11: 1ffff1103ee065e7 R12: ffff88811aa90000 [ 94.862587][ T2742] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811036f000 [ 94.884373][ T2742] FS: 00007fb3414436c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 94.894640][ T2742] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 94.906858][ T2742] CR2: 000000110c2e0a95 CR3: 000000010d111000 CR4: 00000000003506a0 [ 94.917518][ T2742] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 94.926458][ T2742] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 94.935578][ T2742] Call Trace: [ 94.939033][ T2742] [ 94.942097][ T2742] resolve_pseudo_ldimm64+0x685/0x11d0 [ 94.955942][ T2742] ? check_attach_btf_id+0xde0/0xde0 [ 94.964617][ T2742] ? __mark_reg_known+0x1b0/0x1b0 [ 94.980068][ T2742] ? security_capable+0x87/0xb0 [ 94.988530][ T2742] bpf_check+0x2c44/0xf330 [ 95.002507][ T2742] ? 0xffffffffa0010d38 [ 95.011367][ T2742] ? is_bpf_text_address+0x177/0x190 [ 95.021335][ T2742] ? bpf_get_btf_vmlinux+0x60/0x60 [ 95.031064][ T2742] ? unwind_get_return_address+0x4d/0x90 [ 95.037073][ T2742] ? stack_trace_save+0xe0/0xe0 [ 95.043925][ T2742] ? arch_stack_walk+0xee/0x140 [ 95.049852][ T2742] ? stack_trace_save+0x98/0xe0 [ 95.055183][ T2742] ? __stack_depot_save+0x34/0x480 [ 95.060540][ T2742] ? __kasan_slab_alloc+0x69/0xf0 [ 95.084689][ T2742] ? __kasan_kmalloc+0xec/0x110 [ 95.094452][ T2742] ? __kasan_kmalloc+0xda/0x110 [ 95.104963][ T2742] ? kmem_cache_alloc_trace+0x119/0x270 [ 95.124334][ T2742] ? selinux_bpf_prog_alloc+0x51/0x140 [ 95.134491][ T2742] ? security_bpf_prog_alloc+0x62/0x90 [ 95.149881][ T2742] ? bpf_prog_load+0x97c/0x1550 [ 95.176499][ T2742] ? __sys_bpf+0x4c3/0x730 [ 95.180987][ T2742] ? __x64_sys_bpf+0x7c/0x90 [ 95.209146][ T2742] ? x64_sys_call+0x4b9/0x9a0 [ 95.214030][ T2742] ? do_syscall_64+0x4c/0xa0 [ 95.235398][ T2742] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 95.241655][ T2742] ? check_stack_object+0x81/0x140 [ 95.279015][ T2742] ? memset+0x35/0x40 [ 95.294868][ T2742] ? bpf_obj_name_cpy+0x193/0x1e0 [ 95.300106][ T2742] bpf_prog_load+0x1042/0x1550 [ 95.324314][ T2742] ? map_freeze+0x360/0x360 [ 95.328895][ T2742] ? selinux_bpf+0xc7/0xf0 [ 95.333425][ T2742] ? security_bpf+0x82/0xa0 [ 95.427927][ T2742] __sys_bpf+0x4c3/0x730 [ 95.454391][ T2742] ? bpf_link_show_fdinfo+0x310/0x310 [ 95.459851][ T2742] ? __kasan_check_write+0x14/0x20 [ 95.493894][ T2742] ? switch_fpu_return+0x15d/0x2c0 [ 95.568699][ T2742] __x64_sys_bpf+0x7c/0x90 [ 95.573178][ T2742] x64_sys_call+0x4b9/0x9a0 [ 95.614354][ T2742] do_syscall_64+0x4c/0xa0 [ 95.618901][ T2742] ? clear_bhb_loop+0x35/0x90 [ 95.623807][ T2742] ? clear_bhb_loop+0x35/0x90 [ 95.664468][ T2742] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 95.685800][ T2742] RIP: 0033:0x7fb342dda969 [ 95.690277][ T2742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.837236][ T2769] device syzkaller0 entered promiscuous mode [ 95.874375][ T2742] RSP: 002b:00007fb341443038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 95.907861][ T2742] RAX: ffffffffffffffda RBX: 00007fb343001fa0 RCX: 00007fb342dda969 [ 95.954401][ T2742] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 95.976280][ T2742] RBP: 00007fb342e5cab1 R08: 0000000000000000 R09: 0000000000000000 [ 96.031273][ T2742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 96.040948][ T2742] R13: 0000000000000000 R14: 00007fb343001fa0 R15: 00007ffdc49d17c8 [ 96.070893][ T2742] [ 96.073974][ T2742] ---[ end trace e79856f6d7df483d ]--- [ 96.519325][ T30] audit: type=1400 audit(1746862753.961:141): avc: denied { create } for pid=2806 comm="syz.0.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 97.012294][ T2823] device syzkaller0 entered promiscuous mode [ 97.315691][ T2838] device syzkaller0 entered promiscuous mode [ 97.393718][ T2839] device syzkaller0 entered promiscuous mode [ 98.327607][ T2893] device syzkaller0 entered promiscuous mode [ 98.586686][ T2896] device syzkaller0 entered promiscuous mode [ 98.645177][ T2903] device wg2 left promiscuous mode [ 98.888230][ T2927] device veth0_vlan left promiscuous mode [ 98.904904][ T2927] device veth0_vlan entered promiscuous mode [ 100.335190][ T30] audit: type=1400 audit(1746862757.781:142): avc: denied { create } for pid=2969 comm="syz.4.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 100.398369][ T2973] device syzkaller0 entered promiscuous mode [ 100.526025][ T2992] Â: renamed from pim6reg1 [ 100.783119][ T3003] Â: renamed from pim6reg1 [ 102.125369][ T3036] syzkaller0: refused to change device tx_queue_len [ 102.164736][ T3041] syzkaller0: refused to change device tx_queue_len [ 104.777369][ T3131] tap0: tun_chr_ioctl cmd 1074025681 [ 106.021942][ T3199] device veth1_macvtap left promiscuous mode [ 106.028415][ T3199] device macsec0 entered promiscuous mode [ 106.085790][ T3199] device veth1_macvtap entered promiscuous mode [ 106.374546][ T3208] device pim6reg1 entered promiscuous mode [ 106.760096][ T3219] syz.0.837[3219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.760205][ T3219] syz.0.837[3219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.239077][ T3254] bond_slave_1: mtu less than device minimum [ 107.454148][ T3257] bond_slave_1: mtu less than device minimum [ 107.550671][ T3264] device syzkaller0 entered promiscuous mode [ 108.270805][ T3301] cgroup: fork rejected by pids controller in /syz2 [ 108.298986][ T3290] device pim6reg1 entered promiscuous mode [ 108.853733][ T3329] syz.1.866[3329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.853808][ T3329] syz.1.866[3329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.946366][ T285] syz-executor (285) used greatest stack depth: 21504 bytes left [ 109.125649][ T30] audit: type=1400 audit(1746862766.571:143): avc: denied { create } for pid=3325 comm="syz.1.866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 109.689691][ T3346] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.704388][ T3346] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.739320][ T3346] device bridge_slave_0 entered promiscuous mode [ 109.760578][ T3346] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.774424][ T3346] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.782099][ T3346] device bridge_slave_1 entered promiscuous mode [ 109.917808][ T30] audit: type=1400 audit(1746862767.361:144): avc: denied { create } for pid=3346 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 109.924729][ T3346] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.944667][ T30] audit: type=1400 audit(1746862767.361:145): avc: denied { write } for pid=3346 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 109.945722][ T3346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.945841][ T3346] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.966830][ T30] audit: type=1400 audit(1746862767.361:146): avc: denied { read } for pid=3346 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 109.973555][ T3346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.030058][ T45] device bridge_slave_1 left promiscuous mode [ 110.043796][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.927809][ T45] device bridge_slave_0 left promiscuous mode [ 110.962564][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.972170][ T3397] syz.3.882[3397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.972240][ T3397] syz.3.882[3397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.990261][ T45] device veth1_macvtap left promiscuous mode [ 111.925328][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.971834][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.033032][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 112.060638][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.090000][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 112.136908][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.145416][ T403] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.152463][ T403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.201799][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.202961][ T30] audit: type=1400 audit(1746862769.641:147): avc: denied { append } for pid=3413 comm="syz.1.887" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 112.245599][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.286593][ T403] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.293670][ T403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.536650][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 112.549500][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.568631][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.590202][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.628429][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 112.654838][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.669080][ T3346] device veth0_vlan entered promiscuous mode [ 112.720450][ T3346] device veth1_macvtap entered promiscuous mode [ 112.765946][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 112.827830][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.842096][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.850580][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.863801][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 112.872285][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.880102][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.930794][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 112.940650][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.999961][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.009300][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.106057][ T3428] device wg2 entered promiscuous mode [ 113.170188][ T3438] : port 1(veth0_to_bridge) entered blocking state [ 113.185213][ T3438] : port 1(veth0_to_bridge) entered disabled state [ 113.198039][ T3438] device veth0_to_bridge entered promiscuous mode [ 114.576760][ T3482] device pim6reg1 entered promiscuous mode [ 115.202398][ T3514] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.209660][ T3514] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.254377][ T3514] device bridge_slave_1 left promiscuous mode [ 115.263104][ T3514] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.273709][ T3514] device bridge_slave_0 left promiscuous mode [ 115.280294][ T3514] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.354892][ T3547] device wg2 left promiscuous mode [ 116.925679][ T30] audit: type=1400 audit(1746862774.371:148): avc: denied { read } for pid=3549 comm="syz.3.921" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 116.984824][ T30] audit: type=1400 audit(1746862774.391:149): avc: denied { open } for pid=3549 comm="syz.3.921" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 117.037334][ T3555] device pim6reg1 entered promiscuous mode [ 118.405352][ T3601] device sit0 entered promiscuous mode [ 119.022735][ T3650] device GPL entered promiscuous mode [ 119.586647][ T3685] device sit0 left promiscuous mode [ 119.618952][ T3685] device sit0 entered promiscuous mode [ 120.097492][ T3705] device syzkaller0 entered promiscuous mode [ 121.231638][ T3765] device pim6reg1 entered promiscuous mode [ 121.289059][ T3761] device veth1_macvtap left promiscuous mode [ 121.416585][ T3767] device veth1_macvtap entered promiscuous mode [ 121.434045][ T3767] device macsec0 entered promiscuous mode [ 121.463084][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 121.582671][ T3777] device dummy0 entered promiscuous mode [ 122.459978][ T30] audit: type=1400 audit(1746862779.901:150): avc: denied { ioctl } for pid=3827 comm="syz.4.993" path="pid:[4026532286]" dev="nsfs" ino=4026532286 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 122.667922][ T3835] ref_ctr_offset mismatch. inode: 0x410 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 122.696590][ T3835] GPL: port 1(erspan0) entered blocking state [ 122.703204][ T3835] GPL: port 1(erspan0) entered disabled state [ 122.723680][ T3835] device erspan0 entered promiscuous mode [ 122.737176][ T3835] GPL: port 1(erspan0) entered blocking state [ 122.744040][ T3835] GPL: port 1(erspan0) entered forwarding state [ 123.057114][ T3844] device syzkaller0 entered promiscuous mode [ 123.077352][ T3849] device pim6reg1 entered promiscuous mode [ 123.094788][ T3853] ip6_vti0: mtu greater than device maximum [ 123.167461][ T3856] device wg2 entered promiscuous mode [ 123.281199][ T3865] device sit0 entered promiscuous mode [ 123.354794][ T3871] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 123.407473][ T3871] device syzkaller0 entered promiscuous mode [ 123.660326][ T3880] device pim6reg1 entered promiscuous mode [ 123.671429][ T3905] syz.1.1015[3905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.671519][ T3905] syz.1.1015[3905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.694886][ T3898] device pim6reg1 entered promiscuous mode [ 124.774715][ T3974] device pim6reg1 entered promiscuous mode [ 126.451798][ T4006] device pim6reg1 entered promiscuous mode [ 126.949197][ T4029] ªªªªªª: renamed from vlan0 [ 127.010812][ T4032] ip6_vti0: mtu greater than device maximum [ 129.696550][ T4071] ref_ctr_offset mismatch. inode: 0x426 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 129.731160][ T4071] GPL: port 1(erspan0) entered blocking state [ 129.738560][ T4071] GPL: port 1(erspan0) entered disabled state [ 129.757632][ T4071] device erspan0 entered promiscuous mode [ 129.793320][ T4071] GPL: port 1(erspan0) entered blocking state [ 129.799754][ T4071] GPL: port 1(erspan0) entered forwarding state [ 130.066227][ T4088] device pim6reg1 entered promiscuous mode [ 130.351728][ T4097] device pim6reg1 entered promiscuous mode [ 130.368743][ T4096] ªªªªªª: renamed from vlan0 [ 131.193020][ T4135] ªªªªªª: renamed from vlan0 [ 132.156559][ T4162] device sit0 left promiscuous mode [ 132.348693][ T4171] device pim6reg1 entered promiscuous mode [ 132.689374][ T4189] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 132.706117][ T4189] syzkaller0: linktype set to 778 [ 132.806027][ T4194] syz.2.1103[4194] is installing a program with bpf_probe_write_user helper that may corrupt user memory!@ÿ: renamed from bond_slave_0 [ 136.699246][ T4206] device dummy0 entered promiscuous mode [ 136.747272][ T30] audit: type=1400 audit(1746862794.191:151): avc: denied { ioctl } for pid=4205 comm="syz.2.1105" path="" dev="cgroup2" ino=291 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 136.836718][ T4219] device syzkaller0 entered promiscuous mode [ 138.699284][ T4240] device sit0 entered promiscuous mode [ 139.415567][ T4263] device pim6reg1 entered promiscuous mode [ 140.076982][ T4282] syz.3.1126[4282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.077113][ T4282] syz.3.1126[4282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.675249][ T4304] device sit0 left promiscuous mode [ 140.907285][ T4304] device sit0 entered promiscuous mode [ 141.408222][ T4333] device sit0 left promiscuous mode [ 141.765549][ T4333] device sit0 entered promiscuous mode [ 142.164581][ T4338] device pim6reg1 entered promiscuous mode [ 142.563338][ T4367] device sit0 entered promiscuous mode [ 143.758732][ T4401] device sit0 left promiscuous mode [ 143.817121][ T4401] device sit0 entered promiscuous mode [ 144.092268][ T4408] device syzkaller0 entered promiscuous mode [ 144.884782][ T30] audit: type=1400 audit(1746862802.321:152): avc: denied { create } for pid=4402 comm="syz.0.1159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 146.033239][ T4443] device sit0 left promiscuous mode [ 146.061776][ T4443] device sit0 entered promiscuous mode [ 146.183200][ T4445] syz.1.1171[4445] is installing a program with bpf_probe_write_user helper that may corrupt user memory!@ÿ: renamed from bond_slave_0 [ 146.409084][ T4455] device sit0 left promiscuous mode [ 146.517002][ T4461] device syzkaller0 entered promiscuous mode [ 146.524466][ T4455] device sit0 entered promiscuous mode [ 149.621438][ T4510] device veth0_vlan left promiscuous mode [ 149.652594][ T4510] device veth0_vlan entered promiscuous mode [ 149.661451][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.672195][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.684432][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.740334][ T4509] device pim6reg1 entered promiscuous mode [ 149.872990][ T4522] device sit0 left promiscuous mode [ 149.922764][ T4524] device sit0 entered promiscuous mode [ 150.357107][ T4533] device veth0_to_batadv entered promiscuous mode [ 154.378369][ T4671] device wg2 left promiscuous mode [ 155.017139][ T4690] device pim6reg1 entered promiscuous mode [ 155.341563][ T4698] device veth0_vlan left promiscuous mode [ 155.373392][ T4698] device veth0_vlan entered promiscuous mode [ 155.452196][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.486075][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 155.493802][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.078661][ T4772] device veth0_vlan left promiscuous mode [ 158.129731][ T4772] device veth0_vlan entered promiscuous mode [ 158.212071][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.221031][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 158.249787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.145924][ T4826] FAULT_INJECTION: forcing a failure. [ 159.145924][ T4826] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 159.160344][ T4821] tun0: tun_chr_ioctl cmd 1074025677 [ 159.188995][ T4821] tun0: linktype set to 776 [ 159.206154][ T4826] CPU: 0 PID: 4826 Comm: syz.2.1287 Tainted: G W 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 159.217475][ T4826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 159.227552][ T4826] Call Trace: [ 159.230845][ T4826] [ 159.233781][ T4826] __dump_stack+0x21/0x30 [ 159.238141][ T4826] dump_stack_lvl+0xee/0x150 [ 159.242745][ T4826] ? show_regs_print_info+0x20/0x20 [ 159.247960][ T4826] dump_stack+0x15/0x20 [ 159.252130][ T4826] should_fail+0x3c1/0x510 [ 159.256559][ T4826] should_fail_usercopy+0x1a/0x20 [ 159.261602][ T4826] _copy_from_user+0x20/0xd0 [ 159.266219][ T4826] bpf_test_init+0x13d/0x1c0 [ 159.270835][ T4826] bpf_prog_test_run_skb+0x193/0x1150 [ 159.276249][ T4826] ? __kasan_check_write+0x14/0x20 [ 159.281390][ T4826] ? fput_many+0x15a/0x1a0 [ 159.285822][ T4826] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 159.291834][ T4826] bpf_prog_test_run+0x3d5/0x620 [ 159.296785][ T4826] ? bpf_prog_query+0x230/0x230 [ 159.301646][ T4826] ? selinux_bpf+0xce/0xf0 [ 159.306083][ T4826] ? security_bpf+0x82/0xa0 [ 159.310698][ T4826] __sys_bpf+0x52c/0x730 [ 159.314957][ T4826] ? bpf_link_show_fdinfo+0x310/0x310 [ 159.320343][ T4826] ? debug_smp_processor_id+0x17/0x20 [ 159.325725][ T4826] __x64_sys_bpf+0x7c/0x90 [ 159.330153][ T4826] x64_sys_call+0x4b9/0x9a0 [ 159.334700][ T4826] do_syscall_64+0x4c/0xa0 [ 159.339145][ T4826] ? clear_bhb_loop+0x35/0x90 [ 159.343868][ T4826] ? clear_bhb_loop+0x35/0x90 [ 159.348586][ T4826] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 159.354521][ T4826] RIP: 0033:0x7f1f69ca2969 [ 159.358954][ T4826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.379144][ T4826] RSP: 002b:00007f1f6830b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 159.387578][ T4826] RAX: ffffffffffffffda RBX: 00007f1f69ec9fa0 RCX: 00007f1f69ca2969 [ 159.395660][ T4826] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 159.403666][ T4826] RBP: 00007f1f6830b090 R08: 0000000000000000 R09: 0000000000000000 [ 159.411655][ T4826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.419642][ T4826] R13: 0000000000000000 R14: 00007f1f69ec9fa0 R15: 00007ffdf8f634d8 [ 159.427636][ T4826] [ 160.805238][ T4875] FAULT_INJECTION: forcing a failure. [ 160.805238][ T4875] name failslab, interval 1, probability 0, space 0, times 1 [ 160.824350][ T4875] CPU: 0 PID: 4875 Comm: syz.1.1301 Tainted: G W 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 160.835683][ T4875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 160.845761][ T4875] Call Trace: [ 160.849068][ T4875] [ 160.852009][ T4875] __dump_stack+0x21/0x30 [ 160.856358][ T4875] dump_stack_lvl+0xee/0x150 [ 160.860980][ T4875] ? show_regs_print_info+0x20/0x20 [ 160.866241][ T4875] dump_stack+0x15/0x20 [ 160.870427][ T4875] should_fail+0x3c1/0x510 [ 160.874883][ T4875] __should_failslab+0xa4/0xe0 [ 160.879678][ T4875] should_failslab+0x9/0x20 [ 160.884195][ T4875] slab_pre_alloc_hook+0x3b/0xe0 [ 160.889144][ T4875] __kmalloc+0x6d/0x2c0 [ 160.893319][ T4875] ? sk_prot_alloc+0xed/0x320 [ 160.898018][ T4875] ? check_stack_object+0x81/0x140 [ 160.903141][ T4875] sk_prot_alloc+0xed/0x320 [ 160.907662][ T4875] sk_alloc+0x38/0x430 [ 160.911745][ T4875] bpf_prog_test_run_skb+0x24b/0x1150 [ 160.917400][ T4875] ? __kasan_check_write+0x14/0x20 [ 160.922525][ T4875] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 160.928424][ T4875] bpf_prog_test_run+0x3d5/0x620 [ 160.933380][ T4875] ? bpf_prog_query+0x230/0x230 [ 160.938240][ T4875] ? selinux_bpf+0xce/0xf0 [ 160.942669][ T4875] ? security_bpf+0x82/0xa0 [ 160.947181][ T4875] __sys_bpf+0x52c/0x730 [ 160.951620][ T4875] ? bpf_link_show_fdinfo+0x310/0x310 [ 160.957020][ T4875] ? debug_smp_processor_id+0x17/0x20 [ 160.962422][ T4875] __x64_sys_bpf+0x7c/0x90 [ 160.966849][ T4875] x64_sys_call+0x4b9/0x9a0 [ 160.971359][ T4875] do_syscall_64+0x4c/0xa0 [ 160.975793][ T4875] ? clear_bhb_loop+0x35/0x90 [ 160.980479][ T4875] ? clear_bhb_loop+0x35/0x90 [ 160.985164][ T4875] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 160.991071][ T4875] RIP: 0033:0x7fb342dda969 [ 160.995525][ T4875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.015147][ T4875] RSP: 002b:00007fb341443038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 161.023801][ T4875] RAX: ffffffffffffffda RBX: 00007fb343001fa0 RCX: 00007fb342dda969 [ 161.031793][ T4875] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 161.039781][ T4875] RBP: 00007fb341443090 R08: 0000000000000000 R09: 0000000000000000 [ 161.047765][ T4875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.055744][ T4875] R13: 0000000000000000 R14: 00007fb343001fa0 R15: 00007ffdc49d17c8 [ 161.063733][ T4875] [ 162.167353][ T4945] FAULT_INJECTION: forcing a failure. [ 162.167353][ T4945] name failslab, interval 1, probability 0, space 0, times 0 [ 162.186309][ T4941] device veth0_vlan left promiscuous mode [ 162.193269][ T4941] device veth0_vlan entered promiscuous mode [ 162.193839][ T4945] CPU: 1 PID: 4945 Comm: syz.1.1320 Tainted: G W 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 162.210572][ T4945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 162.220650][ T4945] Call Trace: [ 162.223944][ T4945] [ 162.226880][ T4945] __dump_stack+0x21/0x30 [ 162.231219][ T4945] dump_stack_lvl+0xee/0x150 [ 162.235906][ T4945] ? show_regs_print_info+0x20/0x20 [ 162.241117][ T4945] dump_stack+0x15/0x20 [ 162.245281][ T4945] should_fail+0x3c1/0x510 [ 162.249709][ T4945] __should_failslab+0xa4/0xe0 [ 162.254484][ T4945] should_failslab+0x9/0x20 [ 162.258992][ T4945] slab_pre_alloc_hook+0x3b/0xe0 [ 162.263938][ T4945] kmem_cache_alloc_trace+0x48/0x270 [ 162.269227][ T4945] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 162.274957][ T4945] selinux_sk_alloc_security+0x7e/0x1a0 [ 162.280512][ T4945] security_sk_alloc+0x72/0xa0 [ 162.285286][ T4945] sk_prot_alloc+0x108/0x320 [ 162.289884][ T4945] sk_alloc+0x38/0x430 [ 162.293971][ T4945] bpf_prog_test_run_skb+0x24b/0x1150 [ 162.299422][ T4945] ? __kasan_check_write+0x14/0x20 [ 162.304545][ T4945] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 162.310453][ T4945] bpf_prog_test_run+0x3d5/0x620 [ 162.315395][ T4945] ? bpf_prog_query+0x230/0x230 [ 162.320253][ T4945] ? selinux_bpf+0xce/0xf0 [ 162.324678][ T4945] ? security_bpf+0x82/0xa0 [ 162.329197][ T4945] __sys_bpf+0x52c/0x730 [ 162.333448][ T4945] ? bpf_link_show_fdinfo+0x310/0x310 [ 162.338832][ T4945] ? debug_smp_processor_id+0x17/0x20 [ 162.344298][ T4945] __x64_sys_bpf+0x7c/0x90 [ 162.348738][ T4945] x64_sys_call+0x4b9/0x9a0 [ 162.353252][ T4945] do_syscall_64+0x4c/0xa0 [ 162.357779][ T4945] ? clear_bhb_loop+0x35/0x90 [ 162.362462][ T4945] ? clear_bhb_loop+0x35/0x90 [ 162.367148][ T4945] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 162.373079][ T4945] RIP: 0033:0x7fb342dda969 [ 162.377694][ T4945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.397309][ T4945] RSP: 002b:00007fb341443038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 162.405738][ T4945] RAX: ffffffffffffffda RBX: 00007fb343001fa0 RCX: 00007fb342dda969 [ 162.413715][ T4945] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 162.421691][ T4945] RBP: 00007fb341443090 R08: 0000000000000000 R09: 0000000000000000 [ 162.429665][ T4945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 162.437652][ T4945] R13: 0000000000000000 R14: 00007fb343001fa0 R15: 00007ffdc49d17c8 [ 162.445635][ T4945] [ 162.520804][ T4947] device syzkaller0 entered promiscuous mode [ 163.746638][ T4981] FAULT_INJECTION: forcing a failure. [ 163.746638][ T4981] name failslab, interval 1, probability 0, space 0, times 0 [ 163.770672][ T4967] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 163.883986][ T4981] CPU: 1 PID: 4981 Comm: syz.0.1334 Tainted: G W 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 163.895416][ T4981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 163.905518][ T4981] Call Trace: [ 163.908793][ T4981] [ 163.911717][ T4981] __dump_stack+0x21/0x30 [ 163.916052][ T4981] dump_stack_lvl+0xee/0x150 [ 163.920633][ T4981] ? show_regs_print_info+0x20/0x20 [ 163.925845][ T4981] dump_stack+0x15/0x20 [ 163.929995][ T4981] should_fail+0x3c1/0x510 [ 163.934599][ T4981] __should_failslab+0xa4/0xe0 [ 163.939360][ T4981] should_failslab+0x9/0x20 [ 163.943854][ T4981] slab_pre_alloc_hook+0x3b/0xe0 [ 163.948798][ T4981] ? __build_skb+0x2d/0x310 [ 163.953408][ T4981] kmem_cache_alloc+0x44/0x260 [ 163.958317][ T4981] __build_skb+0x2d/0x310 [ 163.962714][ T4981] ? __kasan_check_write+0x14/0x20 [ 163.967863][ T4981] build_skb+0x24/0x200 [ 163.972047][ T4981] bpf_prog_test_run_skb+0x279/0x1150 [ 163.977494][ T4981] ? __kasan_check_write+0x14/0x20 [ 163.982632][ T4981] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 163.988728][ T4981] bpf_prog_test_run+0x3d5/0x620 [ 163.993699][ T4981] ? bpf_prog_query+0x230/0x230 [ 163.998577][ T4981] ? selinux_bpf+0xce/0xf0 [ 164.003009][ T4981] ? security_bpf+0x82/0xa0 [ 164.007530][ T4981] __sys_bpf+0x52c/0x730 [ 164.011786][ T4981] ? bpf_link_show_fdinfo+0x310/0x310 [ 164.017177][ T4981] ? debug_smp_processor_id+0x17/0x20 [ 164.022564][ T4981] __x64_sys_bpf+0x7c/0x90 [ 164.026989][ T4981] x64_sys_call+0x4b9/0x9a0 [ 164.031504][ T4981] do_syscall_64+0x4c/0xa0 [ 164.036022][ T4981] ? clear_bhb_loop+0x35/0x90 [ 164.040737][ T4981] ? clear_bhb_loop+0x35/0x90 [ 164.045425][ T4981] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 164.051334][ T4981] RIP: 0033:0x7fa564bb1969 [ 164.055956][ T4981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 164.075590][ T4981] RSP: 002b:00007fa56321a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 164.084030][ T4981] RAX: ffffffffffffffda RBX: 00007fa564dd8fa0 RCX: 00007fa564bb1969 [ 164.092010][ T4981] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 164.099991][ T4981] RBP: 00007fa56321a090 R08: 0000000000000000 R09: 0000000000000000 [ 164.107975][ T4981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 164.115955][ T4981] R13: 0000000000000000 R14: 00007fa564dd8fa0 R15: 00007ffef8d7bb48 [ 164.123945][ T4981] [ 164.883949][ T5009] device pim6reg1 entered promiscuous mode [ 164.941029][ T5011] device pim6reg1 entered promiscuous mode [ 165.062271][ T5020] FAULT_INJECTION: forcing a failure. [ 165.062271][ T5020] name failslab, interval 1, probability 0, space 0, times 0 [ 165.093719][ T5020] CPU: 1 PID: 5020 Comm: syz.4.1348 Tainted: G W 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 165.105461][ T5020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 165.115547][ T5020] Call Trace: [ 165.118845][ T5020] [ 165.121804][ T5020] __dump_stack+0x21/0x30 [ 165.126288][ T5020] dump_stack_lvl+0xee/0x150 [ 165.130903][ T5020] ? show_regs_print_info+0x20/0x20 [ 165.136129][ T5020] dump_stack+0x15/0x20 [ 165.140309][ T5020] should_fail+0x3c1/0x510 [ 165.144751][ T5020] __should_failslab+0xa4/0xe0 [ 165.149540][ T5020] should_failslab+0x9/0x20 [ 165.154066][ T5020] slab_pre_alloc_hook+0x3b/0xe0 [ 165.159030][ T5020] ? skb_clone+0x1cf/0x360 [ 165.163462][ T5020] kmem_cache_alloc+0x44/0x260 [ 165.168335][ T5020] ? stack_trace_save+0xe0/0xe0 [ 165.173204][ T5020] skb_clone+0x1cf/0x360 [ 165.177462][ T5020] bpf_clone_redirect+0xa7/0x380 [ 165.182416][ T5020] ? stack_trace_save+0x98/0xe0 [ 165.187389][ T5020] bpf_prog_208b094576c80b22+0x56/0xc14 [ 165.192950][ T5020] ? __kasan_slab_alloc+0xcf/0xf0 [ 165.197992][ T5020] ? __kasan_slab_alloc+0xbd/0xf0 [ 165.203026][ T5020] ? slab_post_alloc_hook+0x4f/0x2b0 [ 165.208333][ T5020] ? kmem_cache_alloc+0xf7/0x260 [ 165.213302][ T5020] ? __build_skb+0x2d/0x310 [ 165.217874][ T5020] ? build_skb+0x24/0x200 [ 165.222373][ T5020] ? bpf_prog_test_run_skb+0x279/0x1150 [ 165.227947][ T5020] ? bpf_prog_test_run+0x3d5/0x620 [ 165.233111][ T5020] ? __sys_bpf+0x52c/0x730 [ 165.237544][ T5020] ? __x64_sys_bpf+0x7c/0x90 [ 165.242132][ T5020] ? x64_sys_call+0x4b9/0x9a0 [ 165.246816][ T5020] ? do_syscall_64+0x4c/0xa0 [ 165.251406][ T5020] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 165.257485][ T5020] ? ktime_get+0x12f/0x160 [ 165.261902][ T5020] bpf_test_run+0x33d/0x8d0 [ 165.266413][ T5020] ? convert___skb_to_skb+0x4f0/0x4f0 [ 165.271801][ T5020] ? eth_get_headlen+0x1f0/0x1f0 [ 165.276738][ T5020] ? convert___skb_to_skb+0x41/0x4f0 [ 165.282040][ T5020] bpf_prog_test_run_skb+0x9ec/0x1150 [ 165.287597][ T5020] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 165.293489][ T5020] bpf_prog_test_run+0x3d5/0x620 [ 165.298425][ T5020] ? bpf_prog_query+0x230/0x230 [ 165.303277][ T5020] ? selinux_bpf+0xce/0xf0 [ 165.307778][ T5020] ? security_bpf+0x82/0xa0 [ 165.312282][ T5020] __sys_bpf+0x52c/0x730 [ 165.316526][ T5020] ? bpf_link_show_fdinfo+0x310/0x310 [ 165.321900][ T5020] ? debug_smp_processor_id+0x17/0x20 [ 165.327271][ T5020] __x64_sys_bpf+0x7c/0x90 [ 165.331691][ T5020] x64_sys_call+0x4b9/0x9a0 [ 165.336188][ T5020] do_syscall_64+0x4c/0xa0 [ 165.340599][ T5020] ? clear_bhb_loop+0x35/0x90 [ 165.345292][ T5020] ? clear_bhb_loop+0x35/0x90 [ 165.349969][ T5020] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 165.355865][ T5020] RIP: 0033:0x7faadd88e969 [ 165.360290][ T5020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.379902][ T5020] RSP: 002b:00007faadbef7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 165.388534][ T5020] RAX: ffffffffffffffda RBX: 00007faaddab5fa0 RCX: 00007faadd88e969 [ 165.396631][ T5020] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 165.404610][ T5020] RBP: 00007faadbef7090 R08: 0000000000000000 R09: 0000000000000000 [ 165.412583][ T5020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.420556][ T5020] R13: 0000000000000000 R14: 00007faaddab5fa0 R15: 00007fffad0ec558 [ 165.428808][ T5020] [ 165.657245][ T5028] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 166.230749][ T5053] FAULT_INJECTION: forcing a failure. [ 166.230749][ T5053] name failslab, interval 1, probability 0, space 0, times 0 [ 166.258674][ T5053] CPU: 1 PID: 5053 Comm: syz.4.1360 Tainted: G W 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 166.269999][ T5053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 166.280181][ T5053] Call Trace: [ 166.283463][ T5053] [ 166.286387][ T5053] __dump_stack+0x21/0x30 [ 166.290720][ T5053] dump_stack_lvl+0xee/0x150 [ 166.295306][ T5053] ? show_regs_print_info+0x20/0x20 [ 166.300502][ T5053] dump_stack+0x15/0x20 [ 166.304665][ T5053] should_fail+0x3c1/0x510 [ 166.309076][ T5053] ? skb_ensure_writable+0x2e7/0x460 [ 166.314361][ T5053] __should_failslab+0xa4/0xe0 [ 166.319122][ T5053] should_failslab+0x9/0x20 [ 166.323620][ T5053] slab_pre_alloc_hook+0x3b/0xe0 [ 166.328550][ T5053] ? skb_ensure_writable+0x2e7/0x460 [ 166.333835][ T5053] ? skb_ensure_writable+0x2e7/0x460 [ 166.339121][ T5053] __kmalloc_track_caller+0x6c/0x2c0 [ 166.344487][ T5053] ? skb_ensure_writable+0x2e7/0x460 [ 166.349768][ T5053] ? skb_ensure_writable+0x2e7/0x460 [ 166.355047][ T5053] pskb_expand_head+0x11b/0x11d0 [ 166.359982][ T5053] ? __copy_skb_header+0x437/0x600 [ 166.365093][ T5053] ? __kasan_check_write+0x14/0x20 [ 166.370203][ T5053] ? __skb_clone+0x47a/0x790 [ 166.374803][ T5053] skb_ensure_writable+0x2e7/0x460 [ 166.379910][ T5053] bpf_clone_redirect+0x10b/0x380 [ 166.384939][ T5053] ? stack_trace_save+0x98/0xe0 [ 166.389790][ T5053] bpf_prog_208b094576c80b22+0x56/0xbf0 [ 166.395332][ T5053] ? __kasan_slab_alloc+0xcf/0xf0 [ 166.400352][ T5053] ? __kasan_slab_alloc+0xbd/0xf0 [ 166.405370][ T5053] ? slab_post_alloc_hook+0x4f/0x2b0 [ 166.410650][ T5053] ? kmem_cache_alloc+0xf7/0x260 [ 166.415581][ T5053] ? __build_skb+0x2d/0x310 [ 166.420084][ T5053] ? build_skb+0x24/0x200 [ 166.424410][ T5053] ? bpf_prog_test_run_skb+0x279/0x1150 [ 166.429953][ T5053] ? bpf_prog_test_run+0x3d5/0x620 [ 166.435058][ T5053] ? __sys_bpf+0x52c/0x730 [ 166.439474][ T5053] ? __x64_sys_bpf+0x7c/0x90 [ 166.444056][ T5053] ? x64_sys_call+0x4b9/0x9a0 [ 166.448743][ T5053] ? do_syscall_64+0x4c/0xa0 [ 166.453331][ T5053] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.459404][ T5053] ? ktime_get+0x12f/0x160 [ 166.463826][ T5053] bpf_test_run+0x33d/0x8d0 [ 166.468425][ T5053] ? convert___skb_to_skb+0x4f0/0x4f0 [ 166.473797][ T5053] ? eth_get_headlen+0x1f0/0x1f0 [ 166.478733][ T5053] ? convert___skb_to_skb+0x41/0x4f0 [ 166.484020][ T5053] bpf_prog_test_run_skb+0x9ec/0x1150 [ 166.489597][ T5053] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 166.495514][ T5053] bpf_prog_test_run+0x3d5/0x620 [ 166.500481][ T5053] ? bpf_prog_query+0x230/0x230 [ 166.505350][ T5053] ? selinux_bpf+0xce/0xf0 [ 166.509775][ T5053] ? security_bpf+0x82/0xa0 [ 166.514359][ T5053] __sys_bpf+0x52c/0x730 [ 166.518608][ T5053] ? bpf_link_show_fdinfo+0x310/0x310 [ 166.524087][ T5053] ? debug_smp_processor_id+0x17/0x20 [ 166.529475][ T5053] __x64_sys_bpf+0x7c/0x90 [ 166.533887][ T5053] x64_sys_call+0x4b9/0x9a0 [ 166.538388][ T5053] do_syscall_64+0x4c/0xa0 [ 166.542825][ T5053] ? clear_bhb_loop+0x35/0x90 [ 166.547505][ T5053] ? clear_bhb_loop+0x35/0x90 [ 166.552184][ T5053] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 166.558080][ T5053] RIP: 0033:0x7faadd88e969 [ 166.562497][ T5053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.582111][ T5053] RSP: 002b:00007faadbef7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 166.590526][ T5053] RAX: ffffffffffffffda RBX: 00007faaddab5fa0 RCX: 00007faadd88e969 [ 166.598499][ T5053] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 166.606492][ T5053] RBP: 00007faadbef7090 R08: 0000000000000000 R09: 0000000000000000 [ 166.614566][ T5053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.622534][ T5053] R13: 0000000000000000 R14: 00007faaddab5fa0 R15: 00007fffad0ec558 [ 166.630521][ T5053] [ 166.836731][ T5058] device syzkaller0 entered promiscuous mode [ 169.822985][ T5090] GPL: mtu less than device minimum [ 170.397033][ T5097] FAULT_INJECTION: forcing a failure. [ 170.397033][ T5097] name failslab, interval 1, probability 0, space 0, times 0 [ 170.409710][ T5097] CPU: 0 PID: 5097 Comm: syz.0.1371 Tainted: G W 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 170.421008][ T5097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 170.431064][ T5097] Call Trace: [ 170.434343][ T5097] [ 170.437298][ T5097] __dump_stack+0x21/0x30 [ 170.441735][ T5097] dump_stack_lvl+0xee/0x150 [ 170.446323][ T5097] ? show_regs_print_info+0x20/0x20 [ 170.451525][ T5097] dump_stack+0x15/0x20 [ 170.455688][ T5097] should_fail+0x3c1/0x510 [ 170.460131][ T5097] __should_failslab+0xa4/0xe0 [ 170.464895][ T5097] should_failslab+0x9/0x20 [ 170.469480][ T5097] slab_pre_alloc_hook+0x3b/0xe0 [ 170.474442][ T5097] ? dst_alloc+0x15c/0x1d0 [ 170.478879][ T5097] kmem_cache_alloc+0x44/0x260 [ 170.483644][ T5097] dst_alloc+0x15c/0x1d0 [ 170.487885][ T5097] ip_route_output_key_hash_rcu+0x11db/0x2060 [ 170.493955][ T5097] ip_route_output_flow+0x123/0x2d0 [ 170.499151][ T5097] ? ipv4_sk_update_pmtu+0x1320/0x1320 [ 170.504639][ T5097] ip_tunnel_xmit+0x6c0/0x21c0 [ 170.509496][ T5097] ? ip_tunnel_xmit+0x90/0x21c0 [ 170.514348][ T5097] ? unwind_get_return_address+0x4d/0x90 [ 170.519983][ T5097] ? ip4_dst_hoplimit+0x110/0x110 [ 170.525010][ T5097] ? skb_network_protocol+0x501/0x740 [ 170.530380][ T5097] ? gre_build_header+0x229/0x850 [ 170.535402][ T5097] ipgre_xmit+0x7c0/0xb30 [ 170.539734][ T5097] dev_hard_start_xmit+0x244/0x670 [ 170.544845][ T5097] __dev_queue_xmit+0x17bd/0x2d80 [ 170.549867][ T5097] ? dev_queue_xmit+0x20/0x20 [ 170.554543][ T5097] ? __kasan_check_write+0x14/0x20 [ 170.559656][ T5097] ? skb_release_data+0x1c6/0xa10 [ 170.564716][ T5097] ? __kasan_check_write+0x14/0x20 [ 170.569830][ T5097] ? pskb_expand_head+0xbe6/0x11d0 [ 170.574971][ T5097] dev_queue_xmit+0x17/0x20 [ 170.579563][ T5097] __bpf_redirect+0x68a/0xe60 [ 170.584238][ T5097] bpf_clone_redirect+0x242/0x380 [ 170.589261][ T5097] bpf_prog_208b094576c80b22+0x56/0x6d8 [ 170.594802][ T5097] ? __kasan_slab_alloc+0xcf/0xf0 [ 170.599821][ T5097] ? __kasan_slab_alloc+0xbd/0xf0 [ 170.604839][ T5097] ? slab_post_alloc_hook+0x4f/0x2b0 [ 170.610121][ T5097] ? kmem_cache_alloc+0xf7/0x260 [ 170.615083][ T5097] ? __build_skb+0x2d/0x310 [ 170.619586][ T5097] ? build_skb+0x24/0x200 [ 170.623916][ T5097] ? bpf_prog_test_run_skb+0x279/0x1150 [ 170.629458][ T5097] ? bpf_prog_test_run+0x3d5/0x620 [ 170.634569][ T5097] ? __sys_bpf+0x52c/0x730 [ 170.638980][ T5097] ? __x64_sys_bpf+0x7c/0x90 [ 170.643680][ T5097] ? x64_sys_call+0x4b9/0x9a0 [ 170.648359][ T5097] ? do_syscall_64+0x4c/0xa0 [ 170.652968][ T5097] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 170.659045][ T5097] ? ktime_get+0x12f/0x160 [ 170.663462][ T5097] bpf_test_run+0x33d/0x8d0 [ 170.667969][ T5097] ? convert___skb_to_skb+0x4f0/0x4f0 [ 170.673339][ T5097] ? eth_get_headlen+0x1f0/0x1f0 [ 170.678275][ T5097] ? convert___skb_to_skb+0x41/0x4f0 [ 170.683669][ T5097] bpf_prog_test_run_skb+0x9ec/0x1150 [ 170.689047][ T5097] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 170.694940][ T5097] bpf_prog_test_run+0x3d5/0x620 [ 170.699878][ T5097] ? bpf_prog_query+0x230/0x230 [ 170.704730][ T5097] ? selinux_bpf+0xce/0xf0 [ 170.709147][ T5097] ? security_bpf+0x82/0xa0 [ 170.713652][ T5097] __sys_bpf+0x52c/0x730 [ 170.717987][ T5097] ? bpf_link_show_fdinfo+0x310/0x310 [ 170.723374][ T5097] ? debug_smp_processor_id+0x17/0x20 [ 170.728748][ T5097] __x64_sys_bpf+0x7c/0x90 [ 170.733163][ T5097] x64_sys_call+0x4b9/0x9a0 [ 170.737667][ T5097] do_syscall_64+0x4c/0xa0 [ 170.742087][ T5097] ? clear_bhb_loop+0x35/0x90 [ 170.746759][ T5097] ? clear_bhb_loop+0x35/0x90 [ 170.751431][ T5097] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 170.757325][ T5097] RIP: 0033:0x7fa564bb1969 [ 170.761739][ T5097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 170.781340][ T5097] RSP: 002b:00007fa56321a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 170.789752][ T5097] RAX: ffffffffffffffda RBX: 00007fa564dd8fa0 RCX: 00007fa564bb1969 [ 170.797720][ T5097] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 170.805685][ T5097] RBP: 00007fa56321a090 R08: 0000000000000000 R09: 0000000000000000 [ 170.813672][ T5097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 170.821653][ T5097] R13: 0000000000000000 R14: 00007fa564dd8fa0 R15: 00007ffef8d7bb48 [ 170.829632][ T5097] [ 170.978725][ T5098] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 171.105416][ T5109] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 171.144971][ T5109] device syzkaller0 entered promiscuous mode [ 171.218726][ T5116] device syzkaller0 entered promiscuous mode [ 171.310256][ T5117] device veth0_vlan left promiscuous mode [ 171.335169][ T5117] device veth0_vlan entered promiscuous mode [ 171.933774][ T5151] FAULT_INJECTION: forcing a failure. [ 171.933774][ T5151] name failslab, interval 1, probability 0, space 0, times 0 [ 171.946566][ T5151] CPU: 0 PID: 5151 Comm: syz.4.1387 Tainted: G W 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 171.958031][ T5151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 171.968197][ T5151] Call Trace: [ 171.971498][ T5151] [ 171.974451][ T5151] __dump_stack+0x21/0x30 [ 171.978798][ T5151] dump_stack_lvl+0xee/0x150 [ 171.983402][ T5151] ? show_regs_print_info+0x20/0x20 [ 171.988648][ T5151] ? 0xffffffffa00028b8 [ 171.992820][ T5151] ? is_bpf_text_address+0x177/0x190 [ 171.998122][ T5151] dump_stack+0x15/0x20 [ 172.002296][ T5151] should_fail+0x3c1/0x510 [ 172.006721][ T5151] __should_failslab+0xa4/0xe0 [ 172.011519][ T5151] should_failslab+0x9/0x20 [ 172.016042][ T5151] slab_pre_alloc_hook+0x3b/0xe0 [ 172.021000][ T5151] ? __alloc_skb+0xe0/0x740 [ 172.025514][ T5151] kmem_cache_alloc+0x44/0x260 [ 172.030296][ T5151] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 172.036120][ T5151] __alloc_skb+0xe0/0x740 [ 172.040471][ T5151] ip_frag_next+0xd7/0xab0 [ 172.044913][ T5151] ip_do_fragment+0x811/0x1ca0 [ 172.049703][ T5151] ? ip_fragment+0x250/0x250 [ 172.054318][ T5151] ip_fragment+0x152/0x250 [ 172.058918][ T5151] __ip_finish_output+0x236/0x360 [ 172.063950][ T5151] ip_finish_output+0x31/0x240 [ 172.068713][ T5151] ? ip_output+0x31d/0x360 [ 172.073130][ T5151] ip_output+0x1e1/0x360 [ 172.077375][ T5151] ? ip_finish_output+0x240/0x240 [ 172.082400][ T5151] ? ip_mc_finish_output+0x400/0x400 [ 172.087684][ T5151] ? prandom_u32+0x24d/0x290 [ 172.092275][ T5151] ip_local_out+0x96/0xb0 [ 172.096609][ T5151] iptunnel_xmit+0x4db/0x8f0 [ 172.101288][ T5151] ip_tunnel_xmit+0x1a2b/0x21c0 [ 172.106139][ T5151] ? ip4_dst_hoplimit+0x110/0x110 [ 172.111164][ T5151] ? skb_network_protocol+0x501/0x740 [ 172.116542][ T5151] ? gre_build_header+0x229/0x850 [ 172.121564][ T5151] ipgre_xmit+0x7c0/0xb30 [ 172.125889][ T5151] dev_hard_start_xmit+0x244/0x670 [ 172.131090][ T5151] __dev_queue_xmit+0x17bd/0x2d80 [ 172.136126][ T5151] ? dev_queue_xmit+0x20/0x20 [ 172.140797][ T5151] ? __kasan_check_write+0x14/0x20 [ 172.145935][ T5151] ? skb_release_data+0x1c6/0xa10 [ 172.150965][ T5151] ? __kasan_check_write+0x14/0x20 [ 172.156076][ T5151] ? pskb_expand_head+0xbe6/0x11d0 [ 172.161183][ T5151] dev_queue_xmit+0x17/0x20 [ 172.165710][ T5151] __bpf_redirect+0x68a/0xe60 [ 172.170391][ T5151] bpf_clone_redirect+0x242/0x380 [ 172.175505][ T5151] bpf_prog_208b094576c80b22+0x56/0xc8 [ 172.180974][ T5151] ? __kasan_slab_alloc+0xcf/0xf0 [ 172.185998][ T5151] ? __kasan_slab_alloc+0xbd/0xf0 [ 172.191015][ T5151] ? slab_post_alloc_hook+0x4f/0x2b0 [ 172.196296][ T5151] ? kmem_cache_alloc+0xf7/0x260 [ 172.201229][ T5151] ? __build_skb+0x2d/0x310 [ 172.205745][ T5151] ? build_skb+0x24/0x200 [ 172.210073][ T5151] ? bpf_prog_test_run_skb+0x279/0x1150 [ 172.215618][ T5151] ? bpf_prog_test_run+0x3d5/0x620 [ 172.220726][ T5151] ? __sys_bpf+0x52c/0x730 [ 172.225135][ T5151] ? __x64_sys_bpf+0x7c/0x90 [ 172.229718][ T5151] ? x64_sys_call+0x4b9/0x9a0 [ 172.234563][ T5151] ? do_syscall_64+0x4c/0xa0 [ 172.239241][ T5151] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 172.245320][ T5151] ? ktime_get+0x12f/0x160 [ 172.249736][ T5151] bpf_test_run+0x33d/0x8d0 [ 172.254245][ T5151] ? convert___skb_to_skb+0x4f0/0x4f0 [ 172.259625][ T5151] ? eth_get_headlen+0x1f0/0x1f0 [ 172.264562][ T5151] ? convert___skb_to_skb+0x41/0x4f0 [ 172.269853][ T5151] bpf_prog_test_run_skb+0x9ec/0x1150 [ 172.275244][ T5151] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 172.281168][ T5151] bpf_prog_test_run+0x3d5/0x620 [ 172.286199][ T5151] ? bpf_prog_query+0x230/0x230 [ 172.291055][ T5151] ? selinux_bpf+0xce/0xf0 [ 172.295563][ T5151] ? security_bpf+0x82/0xa0 [ 172.300061][ T5151] __sys_bpf+0x52c/0x730 [ 172.304301][ T5151] ? bpf_link_show_fdinfo+0x310/0x310 [ 172.309734][ T5151] ? debug_smp_processor_id+0x17/0x20 [ 172.315103][ T5151] __x64_sys_bpf+0x7c/0x90 [ 172.319602][ T5151] x64_sys_call+0x4b9/0x9a0 [ 172.324101][ T5151] do_syscall_64+0x4c/0xa0 [ 172.328536][ T5151] ? clear_bhb_loop+0x35/0x90 [ 172.333207][ T5151] ? clear_bhb_loop+0x35/0x90 [ 172.337890][ T5151] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 172.343784][ T5151] RIP: 0033:0x7faadd88e969 [ 172.348197][ T5151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 172.367919][ T5151] RSP: 002b:00007faadbef7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 172.376334][ T5151] RAX: ffffffffffffffda RBX: 00007faaddab5fa0 RCX: 00007faadd88e969 [ 172.384308][ T5151] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 172.392371][ T5151] RBP: 00007faadbef7090 R08: 0000000000000000 R09: 0000000000000000 [ 172.400339][ T5151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 172.408307][ T5151] R13: 0000000000000000 R14: 00007faaddab5fa0 R15: 00007fffad0ec558 [ 172.416281][ T5151] [ 173.182569][ T5201] device veth0_vlan left promiscuous mode [ 173.300561][ T5201] device veth0_vlan entered promiscuous mode [ 173.499081][ T5205] FAULT_INJECTION: forcing a failure. [ 173.499081][ T5205] name failslab, interval 1, probability 0, space 0, times 0 [ 173.511787][ T5205] CPU: 0 PID: 5205 Comm: syz.0.1404 Tainted: G W 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 173.523189][ T5205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 173.533259][ T5205] Call Trace: [ 173.536831][ T5205] [ 173.539768][ T5205] __dump_stack+0x21/0x30 [ 173.544119][ T5205] dump_stack_lvl+0xee/0x150 [ 173.548719][ T5205] ? show_regs_print_info+0x20/0x20 [ 173.553932][ T5205] dump_stack+0x15/0x20 [ 173.558100][ T5205] should_fail+0x3c1/0x510 [ 173.562526][ T5205] ? ip_frag_next+0xd7/0xab0 [ 173.567130][ T5205] __should_failslab+0xa4/0xe0 [ 173.571911][ T5205] should_failslab+0x9/0x20 [ 173.576424][ T5205] slab_pre_alloc_hook+0x3b/0xe0 [ 173.581377][ T5205] ? ip_frag_next+0xd7/0xab0 [ 173.585974][ T5205] ? ip_frag_next+0xd7/0xab0 [ 173.590573][ T5205] __kmalloc_track_caller+0x6c/0x2c0 [ 173.595868][ T5205] ? ip_frag_next+0xd7/0xab0 [ 173.600471][ T5205] ? ip_frag_next+0xd7/0xab0 [ 173.605073][ T5205] __alloc_skb+0x21a/0x740 [ 173.609503][ T5205] ip_frag_next+0xd7/0xab0 [ 173.613928][ T5205] ip_do_fragment+0x811/0x1ca0 [ 173.618706][ T5205] ? ip_fragment+0x250/0x250 [ 173.623317][ T5205] ip_fragment+0x152/0x250 [ 173.627746][ T5205] __ip_finish_output+0x236/0x360 [ 173.632784][ T5205] ip_finish_output+0x31/0x240 [ 173.637567][ T5205] ? ip_output+0x31d/0x360 [ 173.641994][ T5205] ip_output+0x1e1/0x360 [ 173.646249][ T5205] ? ip_finish_output+0x240/0x240 [ 173.651284][ T5205] ? ip_mc_finish_output+0x400/0x400 [ 173.656577][ T5205] ? prandom_u32+0x24d/0x290 [ 173.661175][ T5205] ip_local_out+0x96/0xb0 [ 173.665512][ T5205] iptunnel_xmit+0x4db/0x8f0 [ 173.670115][ T5205] ip_tunnel_xmit+0x1a2b/0x21c0 [ 173.674986][ T5205] ? ip4_dst_hoplimit+0x110/0x110 [ 173.680022][ T5205] ? skb_network_protocol+0x501/0x740 [ 173.685409][ T5205] ? gre_build_header+0x229/0x850 [ 173.690454][ T5205] ipgre_xmit+0x7c0/0xb30 [ 173.694796][ T5205] dev_hard_start_xmit+0x244/0x670 [ 173.699923][ T5205] __dev_queue_xmit+0x17bd/0x2d80 [ 173.704960][ T5205] ? dev_queue_xmit+0x20/0x20 [ 173.709642][ T5205] ? __kasan_check_write+0x14/0x20 [ 173.714764][ T5205] ? skb_release_data+0x1c6/0xa10 [ 173.719799][ T5205] ? __kasan_check_write+0x14/0x20 [ 173.724917][ T5205] ? pskb_expand_head+0xbe6/0x11d0 [ 173.730039][ T5205] dev_queue_xmit+0x17/0x20 [ 173.734571][ T5205] __bpf_redirect+0x68a/0xe60 [ 173.739261][ T5205] bpf_clone_redirect+0x242/0x380 [ 173.744300][ T5205] bpf_prog_208b094576c80b22+0x56/0x5f4 [ 173.750119][ T5205] ? __kasan_slab_alloc+0xcf/0xf0 [ 173.755154][ T5205] ? __kasan_slab_alloc+0xbd/0xf0 [ 173.760188][ T5205] ? slab_post_alloc_hook+0x4f/0x2b0 [ 173.765485][ T5205] ? kmem_cache_alloc+0xf7/0x260 [ 173.770440][ T5205] ? __build_skb+0x2d/0x310 [ 173.774956][ T5205] ? build_skb+0x24/0x200 [ 173.779298][ T5205] ? bpf_prog_test_run_skb+0x279/0x1150 [ 173.784859][ T5205] ? bpf_prog_test_run+0x3d5/0x620 [ 173.789976][ T5205] ? __sys_bpf+0x52c/0x730 [ 173.794402][ T5205] ? __x64_sys_bpf+0x7c/0x90 [ 173.799006][ T5205] ? x64_sys_call+0x4b9/0x9a0 [ 173.803701][ T5205] ? do_syscall_64+0x4c/0xa0 [ 173.808307][ T5205] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 173.814444][ T5205] ? ktime_get+0x12f/0x160 [ 173.818899][ T5205] bpf_test_run+0x33d/0x8d0 [ 173.823418][ T5205] ? convert___skb_to_skb+0x4f0/0x4f0 [ 173.828806][ T5205] ? eth_get_headlen+0x1f0/0x1f0 [ 173.833757][ T5205] ? convert___skb_to_skb+0x41/0x4f0 [ 173.839052][ T5205] bpf_prog_test_run_skb+0x9ec/0x1150 [ 173.844456][ T5205] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 173.850360][ T5205] bpf_prog_test_run+0x3d5/0x620 [ 173.855318][ T5205] ? bpf_prog_query+0x230/0x230 [ 173.860176][ T5205] ? selinux_bpf+0xce/0xf0 [ 173.864603][ T5205] ? security_bpf+0x82/0xa0 [ 173.869119][ T5205] __sys_bpf+0x52c/0x730 [ 173.873371][ T5205] ? bpf_link_show_fdinfo+0x310/0x310 [ 173.878917][ T5205] ? debug_smp_processor_id+0x17/0x20 [ 173.884325][ T5205] __x64_sys_bpf+0x7c/0x90 [ 173.888780][ T5205] x64_sys_call+0x4b9/0x9a0 [ 173.893305][ T5205] do_syscall_64+0x4c/0xa0 [ 173.897843][ T5205] ? clear_bhb_loop+0x35/0x90 [ 173.902534][ T5205] ? clear_bhb_loop+0x35/0x90 [ 173.907221][ T5205] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 173.913132][ T5205] RIP: 0033:0x7fa564bb1969 [ 173.917557][ T5205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.937264][ T5205] RSP: 002b:00007fa56321a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 173.945929][ T5205] RAX: ffffffffffffffda RBX: 00007fa564dd8fa0 RCX: 00007fa564bb1969 [ 173.953920][ T5205] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 173.961908][ T5205] RBP: 00007fa56321a090 R08: 0000000000000000 R09: 0000000000000000 [ 173.969891][ T5205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 173.977892][ T5205] R13: 0000000000000000 R14: 00007fa564dd8fa0 R15: 00007ffef8d7bb48 [ 173.985968][ T5205] [ 174.139324][ T5210] device sit0 left promiscuous mode [ 174.261595][ T5222] device sit0 entered promiscuous mode [ 174.461194][ T5237] bond_slave_1: mtu less than device minimum [ 174.575371][ T5250] device lo entered promiscuous mode [ 175.648610][ T5292] device sit0 left promiscuous mode [ 175.870153][ T5293] device sit0 entered promiscuous mode [ 176.298058][ T5319] bond_slave_1: mtu less than device minimum [ 176.693982][ T5340] device pim6reg1 entered promiscuous mode [ 177.491637][ T5362] FAULT_INJECTION: forcing a failure. [ 177.491637][ T5362] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 177.572758][ T5362] CPU: 1 PID: 5362 Comm: syz.3.1453 Tainted: G W 5.15.181-syzkaller-00405-gf93c8b5a9e60 #0 [ 177.584097][ T5362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 177.594166][ T5362] Call Trace: [ 177.597456][ T5362] [ 177.600421][ T5362] __dump_stack+0x21/0x30 [ 177.604760][ T5362] dump_stack_lvl+0xee/0x150 [ 177.609358][ T5362] ? show_regs_print_info+0x20/0x20 [ 177.614562][ T5362] ? bpf_test_timer_continue+0x155/0x4a0 [ 177.620197][ T5362] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 177.625656][ T5362] dump_stack+0x15/0x20 [ 177.629811][ T5362] should_fail+0x3c1/0x510 [ 177.634228][ T5362] should_fail_usercopy+0x1a/0x20 [ 177.639252][ T5362] _copy_to_user+0x20/0x90 [ 177.643671][ T5362] bpf_test_finish+0x20c/0x3b0 [ 177.648440][ T5362] ? convert_skb_to___skb+0x360/0x360 [ 177.653813][ T5362] ? convert_skb_to___skb+0x203/0x360 [ 177.659190][ T5362] bpf_prog_test_run_skb+0xbba/0x1150 [ 177.664567][ T5362] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 177.670552][ T5362] bpf_prog_test_run+0x3d5/0x620 [ 177.675486][ T5362] ? bpf_prog_query+0x230/0x230 [ 177.680334][ T5362] ? selinux_bpf+0xce/0xf0 [ 177.684748][ T5362] ? security_bpf+0x82/0xa0 [ 177.689246][ T5362] __sys_bpf+0x52c/0x730 [ 177.693484][ T5362] ? bpf_link_show_fdinfo+0x310/0x310 [ 177.698864][ T5362] ? debug_smp_processor_id+0x17/0x20 [ 177.704236][ T5362] __x64_sys_bpf+0x7c/0x90 [ 177.708683][ T5362] x64_sys_call+0x4b9/0x9a0 [ 177.713185][ T5362] do_syscall_64+0x4c/0xa0 [ 177.717604][ T5362] ? clear_bhb_loop+0x35/0x90 [ 177.722299][ T5362] ? clear_bhb_loop+0x35/0x90 [ 177.727009][ T5362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 177.732902][ T5362] RIP: 0033:0x7f623fc0a969 [ 177.737315][ T5362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 177.757119][ T5362] RSP: 002b:00007f623e273038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 177.765710][ T5362] RAX: ffffffffffffffda RBX: 00007f623fe31fa0 RCX: 00007f623fc0a969 [ 177.773746][ T5362] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 177.781760][ T5362] RBP: 00007f623e273090 R08: 0000000000000000 R09: 0000000000000000 [ 177.789748][ T5362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 177.797732][ T5362] R13: 0000000000000000 R14: 00007f623fe31fa0 R15: 00007ffc4a766e38 [ 177.805717][ T5362] [ 178.448912][ T5396] device wg2 entered promiscuous mode [ 178.978214][ T30] audit: type=1400 audit(1746862836.421:153): avc: denied { create } for pid=5424 comm="syz.0.1474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 179.776073][ T5446] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.784496][ T5446] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.261404][ T30] audit: type=1400 audit(1746862837.701:154): avc: denied { create } for pid=5468 comm="syz.1.1491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 192.370525][ T5572] bond_slave_1: mtu less than device minimum [ 193.181728][ T5593] device syzkaller0 entered promiscuous mode [ 195.379047][ T5648] device syzkaller0 entered promiscuous mode [ 197.895302][ T5744] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.902546][ T5744] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.910686][ T5744] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.917886][ T5744] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.973275][ T5744] device bridge0 entered promiscuous mode [ 198.271878][ T5748] device syzkaller0 entered promiscuous mode [ 198.494306][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.106215][ T5810] device sit0 left promiscuous mode [ 199.167442][ T5810] bond_slave_1: mtu less than device minimum [ 199.667484][ T5838] syz.3.1604[5838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.667559][ T5838] syz.3.1604[5838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.038799][ T5851] ªªªªªª: renamed from vlan0 [ 200.149875][ T5856] ip6_vti0: mtu greater than device maximum [ 200.859466][ T5873] device syzkaller0 entered promiscuous mode [ 201.339504][ T5910] device syzkaller0 entered promiscuous mode [ 201.358093][ T5913] device pim6reg1 entered promiscuous mode [ 202.118373][ T5929] device syzkaller0 entered promiscuous mode [ 203.774853][ T6003] ref_ctr_offset mismatch. inode: 0x691 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 203.830571][ T5991] device syzkaller0 entered promiscuous mode [ 203.849762][ T5995] device sit0 left promiscuous mode [ 203.867352][ T6007] device sit0 entered promiscuous mode [ 212.584274][ T6021] sock: sock_set_timeout: `syz.3.1655' (pid 6021) tries to set negative timeout