last executing test programs: 12.042618705s ago: executing program 0 (id=1357): r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x40, 0x10, 0x40, 0x0, 0xff, 0x400, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x100, 0x0, 0x4, 0x9, 0x9, 0x8, 0x6, 0x0, 0x10000, 0x0, 0xa9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_devices(r1, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x3, 0x0}, 0x8) (async) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='blkio.bfq.time\x00', 0x0, 0x0) openat$cgroup_type(r4, &(0x7f0000000180), 0x2, 0x0) (async) r5 = openat$cgroup(r1, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000200)='cpuset.memory_spread_page\x00', 0x2, 0x0) r6 = openat$cgroup_ro(r1, &(0x7f0000000240)='blkio.bfq.time\x00', 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x7, 0xfc, 0x9, 0xe2, 0x0, 0x2, 0x408, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x2, 0x7}, 0x82a48, 0x4, 0xffff, 0x1, 0x7100000, 0x3ff, 0x6, 0x0, 0x1}, r4, 0xb, r4, 0x2) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x7, [@ptr={0x3}, @restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x5, 0x1}, @decl_tag={0x8, 0x0, 0x0, 0x11, 0x3, 0x3}]}, {0x0, [0x5f, 0x30, 0x5f, 0x2e, 0x2e]}}, &(0x7f00000003c0)=""/81, 0x57, 0x51, 0x1, 0x6}, 0x28) (async) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x0, 0x0, r6, 0x0, '\x00', 0x0, r6}, 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r6, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x12, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4d5, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@jmp={0x5, 0x1, 0xd, 0xd15d8285610aa115, 0x8, 0xfffffffffffffff0}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000005c0)='syzkaller\x00', 0xfff, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x40, '\x00', r11, @fallback=0x18, r4, 0x8, &(0x7f0000000740)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3, r6, 0x1, &(0x7f0000000780)=[r6, r6, r6, r4, r4, r4], &(0x7f00000007c0)=[{0x4, 0x4, 0xf, 0x8}], 0x10, 0xb4}, 0x94) (async) ioctl$TUNGETVNETLE(r4, 0x800454dd, &(0x7f00000008c0)) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b00)={r6, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1a, 0xb, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x590}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x46}, @alu={0x0, 0x0, 0xd, 0x5, 0xa, 0xffffffffffffffc0, 0x8}, @ldst={0x0, 0x1, 0x4, 0x8, 0x4, 0x50, 0xfffffffffffffffc}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000980)='GPL\x00', 0x8, 0x84, &(0x7f00000009c0)=""/132, 0x40f00, 0x4, '\x00', r12, @tracing=0x19, r4, 0x8, &(0x7f0000000b40)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000b80)={0x2, 0xc, 0x4, 0x7ff}, 0x10, r3, 0xffffffffffffffff, 0x4, &(0x7f0000000bc0)=[r8, r6, r10, r10, r4], &(0x7f0000000c00)=[{0x0, 0x4, 0x6, 0x7}, {0x1, 0x1, 0x6, 0x7}, {0x0, 0x4, 0xe, 0xb}, {0x2, 0x4, 0x5, 0x5}], 0x10, 0xfff}, 0x94) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000d00), 0x24801, 0x0) write$cgroup_subtree(r6, &(0x7f0000000d40)={[{0x2d, 'rlimit'}, {0x2d, 'hugetlb'}, {0x2d, 'cpuset'}, {0x2d, 'rlimit'}]}, 0x21) (async) ioctl$TUNSETCARRIER(r14, 0x400454e2, &(0x7f0000000d80)=0x1) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r2, 0x0, 0x3, &(0x7f0000000dc0)=':{\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e40)={@ifindex=r11, r6, 0x35, 0xc, r13, @void, @value=r13}, 0x20) (async) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000e80)=0x2) (async) r16 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000ec0)={r15}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001000)={@cgroup=r5, 0x10, 0x0, 0x7, &(0x7f0000000f00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000f80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000fc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001040)={@fallback=r7, r4, 0x8, 0x8, r16, @void, @value=r13, @void, @void, r17}, 0x20) 9.801627758s ago: executing program 0 (id=1357): r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x40, 0x10, 0x40, 0x0, 0xff, 0x400, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x100, 0x0, 0x4, 0x9, 0x9, 0x8, 0x6, 0x0, 0x10000, 0x0, 0xa9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_devices(r1, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x3, 0x0}, 0x8) (async) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='blkio.bfq.time\x00', 0x0, 0x0) openat$cgroup_type(r4, &(0x7f0000000180), 0x2, 0x0) (async) r5 = openat$cgroup(r1, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000200)='cpuset.memory_spread_page\x00', 0x2, 0x0) r6 = openat$cgroup_ro(r1, &(0x7f0000000240)='blkio.bfq.time\x00', 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x7, 0xfc, 0x9, 0xe2, 0x0, 0x2, 0x408, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x2, 0x7}, 0x82a48, 0x4, 0xffff, 0x1, 0x7100000, 0x3ff, 0x6, 0x0, 0x1}, r4, 0xb, r4, 0x2) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x7, [@ptr={0x3}, @restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x5, 0x1}, @decl_tag={0x8, 0x0, 0x0, 0x11, 0x3, 0x3}]}, {0x0, [0x5f, 0x30, 0x5f, 0x2e, 0x2e]}}, &(0x7f00000003c0)=""/81, 0x57, 0x51, 0x1, 0x6}, 0x28) (async) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x0, 0x0, r6, 0x0, '\x00', 0x0, r6}, 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r6, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x12, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4d5, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@jmp={0x5, 0x1, 0xd, 0xd15d8285610aa115, 0x8, 0xfffffffffffffff0}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000005c0)='syzkaller\x00', 0xfff, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x40, '\x00', r11, @fallback=0x18, r4, 0x8, &(0x7f0000000740)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3, r6, 0x1, &(0x7f0000000780)=[r6, r6, r6, r4, r4, r4], &(0x7f00000007c0)=[{0x4, 0x4, 0xf, 0x8}], 0x10, 0xb4}, 0x94) (async) ioctl$TUNGETVNETLE(r4, 0x800454dd, &(0x7f00000008c0)) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b00)={r6, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1a, 0xb, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x590}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x46}, @alu={0x0, 0x0, 0xd, 0x5, 0xa, 0xffffffffffffffc0, 0x8}, @ldst={0x0, 0x1, 0x4, 0x8, 0x4, 0x50, 0xfffffffffffffffc}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000980)='GPL\x00', 0x8, 0x84, &(0x7f00000009c0)=""/132, 0x40f00, 0x4, '\x00', r12, @tracing=0x19, r4, 0x8, &(0x7f0000000b40)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000b80)={0x2, 0xc, 0x4, 0x7ff}, 0x10, r3, 0xffffffffffffffff, 0x4, &(0x7f0000000bc0)=[r8, r6, r10, r10, r4], &(0x7f0000000c00)=[{0x0, 0x4, 0x6, 0x7}, {0x1, 0x1, 0x6, 0x7}, {0x0, 0x4, 0xe, 0xb}, {0x2, 0x4, 0x5, 0x5}], 0x10, 0xfff}, 0x94) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000d00), 0x24801, 0x0) write$cgroup_subtree(r6, &(0x7f0000000d40)={[{0x2d, 'rlimit'}, {0x2d, 'hugetlb'}, {0x2d, 'cpuset'}, {0x2d, 'rlimit'}]}, 0x21) (async) ioctl$TUNSETCARRIER(r14, 0x400454e2, &(0x7f0000000d80)=0x1) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r2, 0x0, 0x3, &(0x7f0000000dc0)=':{\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e40)={@ifindex=r11, r6, 0x35, 0xc, r13, @void, @value=r13}, 0x20) (async) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000e80)=0x2) (async) r16 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000ec0)={r15}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001000)={@cgroup=r5, 0x10, 0x0, 0x7, &(0x7f0000000f00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000f80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000fc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001040)={@fallback=r7, r4, 0x8, 0x8, r16, @void, @value=r13, @void, @void, r17}, 0x20) 7.98349086s ago: executing program 2 (id=1471): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r3, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB, @ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x58, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r6}, 0x10) unlink(0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x12, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x2408, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)}, 0x0) 7.98267786s ago: executing program 4 (id=1473): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x10) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 7.828353821s ago: executing program 1 (id=1474): bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeb0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000700)=0xfffffffffffffff2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r0}, 0x10) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 7.624347541s ago: executing program 0 (id=1357): r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x40, 0x10, 0x40, 0x0, 0xff, 0x400, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x100, 0x0, 0x4, 0x9, 0x9, 0x8, 0x6, 0x0, 0x10000, 0x0, 0xa9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_devices(r1, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x3, 0x0}, 0x8) (async) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='blkio.bfq.time\x00', 0x0, 0x0) openat$cgroup_type(r4, &(0x7f0000000180), 0x2, 0x0) (async) r5 = openat$cgroup(r1, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000200)='cpuset.memory_spread_page\x00', 0x2, 0x0) r6 = openat$cgroup_ro(r1, &(0x7f0000000240)='blkio.bfq.time\x00', 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x7, 0xfc, 0x9, 0xe2, 0x0, 0x2, 0x408, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x2, 0x7}, 0x82a48, 0x4, 0xffff, 0x1, 0x7100000, 0x3ff, 0x6, 0x0, 0x1}, r4, 0xb, r4, 0x2) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x7, [@ptr={0x3}, @restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x5, 0x1}, @decl_tag={0x8, 0x0, 0x0, 0x11, 0x3, 0x3}]}, {0x0, [0x5f, 0x30, 0x5f, 0x2e, 0x2e]}}, &(0x7f00000003c0)=""/81, 0x57, 0x51, 0x1, 0x6}, 0x28) (async) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x0, 0x0, r6, 0x0, '\x00', 0x0, r6}, 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r6, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x12, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4d5, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@jmp={0x5, 0x1, 0xd, 0xd15d8285610aa115, 0x8, 0xfffffffffffffff0}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000005c0)='syzkaller\x00', 0xfff, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x40, '\x00', r11, @fallback=0x18, r4, 0x8, &(0x7f0000000740)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3, r6, 0x1, &(0x7f0000000780)=[r6, r6, r6, r4, r4, r4], &(0x7f00000007c0)=[{0x4, 0x4, 0xf, 0x8}], 0x10, 0xb4}, 0x94) (async) ioctl$TUNGETVNETLE(r4, 0x800454dd, &(0x7f00000008c0)) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b00)={r6, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1a, 0xb, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x590}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x46}, @alu={0x0, 0x0, 0xd, 0x5, 0xa, 0xffffffffffffffc0, 0x8}, @ldst={0x0, 0x1, 0x4, 0x8, 0x4, 0x50, 0xfffffffffffffffc}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000980)='GPL\x00', 0x8, 0x84, &(0x7f00000009c0)=""/132, 0x40f00, 0x4, '\x00', r12, @tracing=0x19, r4, 0x8, &(0x7f0000000b40)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000b80)={0x2, 0xc, 0x4, 0x7ff}, 0x10, r3, 0xffffffffffffffff, 0x4, &(0x7f0000000bc0)=[r8, r6, r10, r10, r4], &(0x7f0000000c00)=[{0x0, 0x4, 0x6, 0x7}, {0x1, 0x1, 0x6, 0x7}, {0x0, 0x4, 0xe, 0xb}, {0x2, 0x4, 0x5, 0x5}], 0x10, 0xfff}, 0x94) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000d00), 0x24801, 0x0) write$cgroup_subtree(r6, &(0x7f0000000d40)={[{0x2d, 'rlimit'}, {0x2d, 'hugetlb'}, {0x2d, 'cpuset'}, {0x2d, 'rlimit'}]}, 0x21) (async) ioctl$TUNSETCARRIER(r14, 0x400454e2, &(0x7f0000000d80)=0x1) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r2, 0x0, 0x3, &(0x7f0000000dc0)=':{\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e40)={@ifindex=r11, r6, 0x35, 0xc, r13, @void, @value=r13}, 0x20) (async) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000e80)=0x2) (async) r16 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000ec0)={r15}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001000)={@cgroup=r5, 0x10, 0x0, 0x7, &(0x7f0000000f00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000f80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000fc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001040)={@fallback=r7, r4, 0x8, 0x8, r16, @void, @value=r13, @void, @void, r17}, 0x20) 7.598890822s ago: executing program 4 (id=1476): r0 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r4}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000580), &(0x7f0000000600)=""/251}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x41e9) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r1}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0), 0xfffffdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xfa4cd3ce536a3efa, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') 5.511373705s ago: executing program 1 (id=1477): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@base={0x11, 0x4, 0x4, 0x1000ff, 0x4}, 0x48) 5.510646005s ago: executing program 2 (id=1478): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000018110000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xd, 0x4, 0x52, 0xe, 0x0, 0xfff, 0x2028, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xad5a, 0x1, @perf_config_ext={0x7, 0x100000000}, 0x102100, 0x8, 0x9, 0x9, 0xffffffff, 0x4, 0x9, 0x0, 0x0, 0x0, 0xa}, r4, 0x0, r3, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x2, 0x41, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc10, 0x2, @perf_bp={0x0, 0xb}, 0x0, 0x100000000002, 0x0, 0x0, 0x0, 0x1002, 0xfffb, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, r3, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r5) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2, 0x0, 0x5}, 0x18) 5.510026285s ago: executing program 3 (id=1479): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000bc0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r3, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{0x1, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000700)=r3}, 0x20) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_tracing={0x1a, 0x17, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @map_val={0x18, 0x2, 0x2, 0x0, r6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}]}, &(0x7f0000000880)='syzkaller\x00', 0x4, 0xa4, &(0x7f00000009c0)=""/164, 0x40f00, 0x4, '\x00', r4, 0x1c, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a80)={0x0, 0x8, 0x3, 0xe}, 0x10, 0x2b329, r3, 0x0, &(0x7f0000000ac0)=[r0, r0, r0, r8], 0x0, 0x10, 0xfffffff8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="002010000018110000ffff0000", @ANYBLOB="83b40587b8a1188b955e9ff12bac41c2f35102127edab587d6764d249c0c7356d075d3636d7963cfff9383cc2a85764af2d41bcdeae87aebd9d39fefa4f923cae893cd1f3584b655674325168177094743c01c4dbbe07bf8ecc2d2bf3ef8bacb10743202e53b1e76ec4637a12057a69c690f9723bb3f1bdcf199d6776202d95b425e6198fc60c24d6952daea46ae32439f5afb59064977d3d0fdd8ccd37a0bb4e9dfb54bc53e5ef4fc16aad1ceb340bb70a7d7802301db73fa1593d7970545cb8a1301c5eaff144e1cf5f262d9b08580b474d1aba8904444d9645ce792b016e79eb638626410b65f76", @ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f0000000500), 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1f, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x4}, 0x10, r5}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 5.509557595s ago: executing program 4 (id=1480): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x50) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x8, r0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, 0x0, &(0x7f00000002c0)=r1}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0xba98575a95aeb70d) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f3, &(0x7f0000000080)) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000020018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 5.447059266s ago: executing program 3 (id=1481): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) close(0xffffffffffffffff) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 5.417308086s ago: executing program 2 (id=1482): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000003c0)={'batadv_slave_0\x00', @local}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@generic={&(0x7f0000000080)='./file0\x00', r1}, 0x18) r2 = syz_clone(0x2000000, &(0x7f0000000180)="3a3a611684db9636333b7a8560d9c9766e89d14689a39a27554d0e638251fb6148eaa5eb2d3eaa03426e69bd5917d97a794bd7abb321f4af55538d0f93f6335425c6a5e382316a7bc36e28178f216ffafbdd5740d0776ddff542b64069567f431ca558a30689a6180cf1dd0d951aad3a4a3904b159400363ad3b5b03da3fcd443e449cc3aeb4e4a8d1dad9b1eaf9d89e04df2bd54aa7670aa8446735cef12b25dde0e6d938134d53fce6c063222a2c1e0d9487d1099f4654d4e90b10713c119ab29a41e8bce9b23558", 0xc9, &(0x7f00000000c0), &(0x7f0000000280), &(0x7f00000002c0)="a100900764aefeeaf1c4f1c3e03475a3f68bfa353b3f63ab998187d6648b6ce0b0d8b21eba8a696de90b2160b07fe00c80fe1d17c523542e5818bd485de7f7d5e272e0f7c7da05cd054e04ce00b52315217a66") perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x800}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000080000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000f88d65384da57d00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x63, 0x11, 0x8}, [@ldst={0x5}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x21) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1fffffff}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380), 0xc) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) 5.010879558s ago: executing program 0 (id=1357): r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x40, 0x10, 0x40, 0x0, 0xff, 0x400, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x100, 0x0, 0x4, 0x9, 0x9, 0x8, 0x6, 0x0, 0x10000, 0x0, 0xa9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_devices(r1, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x3, 0x0}, 0x8) (async) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='blkio.bfq.time\x00', 0x0, 0x0) openat$cgroup_type(r4, &(0x7f0000000180), 0x2, 0x0) (async) r5 = openat$cgroup(r1, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000200)='cpuset.memory_spread_page\x00', 0x2, 0x0) r6 = openat$cgroup_ro(r1, &(0x7f0000000240)='blkio.bfq.time\x00', 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x7, 0xfc, 0x9, 0xe2, 0x0, 0x2, 0x408, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x2, 0x7}, 0x82a48, 0x4, 0xffff, 0x1, 0x7100000, 0x3ff, 0x6, 0x0, 0x1}, r4, 0xb, r4, 0x2) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x7, [@ptr={0x3}, @restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x5, 0x1}, @decl_tag={0x8, 0x0, 0x0, 0x11, 0x3, 0x3}]}, {0x0, [0x5f, 0x30, 0x5f, 0x2e, 0x2e]}}, &(0x7f00000003c0)=""/81, 0x57, 0x51, 0x1, 0x6}, 0x28) (async) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x0, 0x0, r6, 0x0, '\x00', 0x0, r6}, 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r6, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x12, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4d5, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@jmp={0x5, 0x1, 0xd, 0xd15d8285610aa115, 0x8, 0xfffffffffffffff0}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000005c0)='syzkaller\x00', 0xfff, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x40, '\x00', r11, @fallback=0x18, r4, 0x8, &(0x7f0000000740)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3, r6, 0x1, &(0x7f0000000780)=[r6, r6, r6, r4, r4, r4], &(0x7f00000007c0)=[{0x4, 0x4, 0xf, 0x8}], 0x10, 0xb4}, 0x94) (async) ioctl$TUNGETVNETLE(r4, 0x800454dd, &(0x7f00000008c0)) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b00)={r6, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1a, 0xb, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x590}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x46}, @alu={0x0, 0x0, 0xd, 0x5, 0xa, 0xffffffffffffffc0, 0x8}, @ldst={0x0, 0x1, 0x4, 0x8, 0x4, 0x50, 0xfffffffffffffffc}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000980)='GPL\x00', 0x8, 0x84, &(0x7f00000009c0)=""/132, 0x40f00, 0x4, '\x00', r12, @tracing=0x19, r4, 0x8, &(0x7f0000000b40)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000b80)={0x2, 0xc, 0x4, 0x7ff}, 0x10, r3, 0xffffffffffffffff, 0x4, &(0x7f0000000bc0)=[r8, r6, r10, r10, r4], &(0x7f0000000c00)=[{0x0, 0x4, 0x6, 0x7}, {0x1, 0x1, 0x6, 0x7}, {0x0, 0x4, 0xe, 0xb}, {0x2, 0x4, 0x5, 0x5}], 0x10, 0xfff}, 0x94) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000d00), 0x24801, 0x0) write$cgroup_subtree(r6, &(0x7f0000000d40)={[{0x2d, 'rlimit'}, {0x2d, 'hugetlb'}, {0x2d, 'cpuset'}, {0x2d, 'rlimit'}]}, 0x21) (async) ioctl$TUNSETCARRIER(r14, 0x400454e2, &(0x7f0000000d80)=0x1) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r2, 0x0, 0x3, &(0x7f0000000dc0)=':{\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e40)={@ifindex=r11, r6, 0x35, 0xc, r13, @void, @value=r13}, 0x20) (async) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000e80)=0x2) (async) r16 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000ec0)={r15}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001000)={@cgroup=r5, 0x10, 0x0, 0x7, &(0x7f0000000f00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000f80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000fc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001040)={@fallback=r7, r4, 0x8, 0x8, r16, @void, @value=r13, @void, @void, r17}, 0x20) 3.032377631s ago: executing program 1 (id=1483): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x100}, 0x800, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r2, 0x3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000200), &(0x7f00000003c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x102219, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"], 0x48) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000003000), 0x201, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x15, 0xd, 0x0, &(0x7f0000001040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x81, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000001180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000040700000002000000000000080200000000006100002e00"], &(0x7f0000001300)=""/181, 0x2b, 0xb5, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 3.031564051s ago: executing program 2 (id=1484): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r0}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x100}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 3.031059791s ago: executing program 3 (id=1485): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) close(0xffffffffffffffff) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 3.030475011s ago: executing program 4 (id=1486): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@base={0x11, 0x4, 0x4, 0x1000ff, 0x4}, 0x48) 2.921569411s ago: executing program 2 (id=1487): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000070000000100000049"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xb3}}, &(0x7f0000000480)='GPL\x00'}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffde1, 0x10, &(0x7f0000002e00), &(0x7f0000000300), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r6, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, 0x0, 0x0}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={0x0, 0x0, 0x0, r5}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x88182, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000240)=r8, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) 2.916854622s ago: executing program 1 (id=1488): perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x15, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c5}, {}, {}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x9}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000980)='syzkaller\x00', 0x10, 0x86, &(0x7f00000009c0)=""/134, 0x41100, 0xa, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000a80)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000ac0)={0x2, 0x1, 0x2, 0xb}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000b00)=[0xffffffffffffffff], &(0x7f0000000b40)=[{0x1, 0x3, 0x6, 0x3}, {0x2, 0x4, 0x2, 0x3}, {0x4, 0x2, 0xc, 0xb}, {0x3, 0x5, 0xc, 0x14}], 0x10, 0x9}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000c40)=@generic={&(0x7f0000000880)='./cgroup/../file0\x00', r2}, 0x18) bpf$ENABLE_STATS(0x20, &(0x7f0000000840), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x13, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='GPL\x00', 0x1000, 0xad, &(0x7f0000000640)=""/173, 0x41000, 0x11, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000300)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x0, 0x3f4, 0x8000}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000700)=[{0x0, 0x1, 0x7, 0xc}], 0x10, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000180)='netfs_sreq_ref\x00', r3, 0x0, 0xb27}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 2.567144964s ago: executing program 1 (id=1489): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82500, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000008003}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x24, 0x4, 0x9, 0x0, r5}, 0x48) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) r9 = openat$cgroup_ro(r3, &(0x7f00000001c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x16, 0x7, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x520b}, [@map_fd={0x18, 0xa, 0x1, 0x0, r6}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffd}]}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xe0, &(0x7f0000000780)=""/224, 0x41100, 0x20, '\x00', 0x0, @fallback=0x31, r8, 0x8, &(0x7f0000000380)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x3, 0x9, 0x9f9}, 0x10, 0xffffffffffffffff, r4, 0x1, &(0x7f0000000400)=[r2, r2, r5, r6], &(0x7f00000004c0)=[{0x0, 0x5, 0x7, 0xa}], 0x10, 0x9}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) sendmsg$unix(r9, &(0x7f0000000300)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000080)="9c37d6615be08745e0aaa447c574f84b5827889238c6069de092c4ffbe7aac32237fcb4f2c87cec5f992b2e904dd913e3971bcc2a67d7e96bf7a9a6658f07b81d3e8ebb300a7746aad6983b7fd1c2e51eeb0bb461d37f899743aaa583a50aeca3775ceb76f1d33c56d932c75e1aac2b58fbcc7764986", 0x76}, {&(0x7f0000000100)="8301f9e9f8905c1af098cf5734a8231c62ae4ea692ec669d65b327032858ef68605f3361b580ddad11b0ed0e5266990c7388ed82629c1060416d66d7086aba7753e128e2874c79920f593d3d0aa769794098dd1eb2cd63a868a815e6bca8e69907", 0x61}, {&(0x7f0000000200)="c68482697694618e18860df8e9b78b43fc66a2d2d3734c60db2520209650434bf41637630106e44997c78d2d34a35b4f26e41144c6a4ec409e640ef46e45a2420c6892c8d219d4a25e6caa5a040231fbbe6a0dd4b9da70a6a717109a7c100aaacc5d9aa406d5417e0f904591a28bb9b19660711b070d0049d7579f788547", 0x7e}], 0x3, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xffffffffffffffff}}}], 0x38, 0x2}, 0x44) 2.542592684s ago: executing program 0 (id=1357): r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x40, 0x10, 0x40, 0x0, 0xff, 0x400, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x100, 0x0, 0x4, 0x9, 0x9, 0x8, 0x6, 0x0, 0x10000, 0x0, 0xa9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_devices(r1, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x3, 0x0}, 0x8) (async) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='blkio.bfq.time\x00', 0x0, 0x0) openat$cgroup_type(r4, &(0x7f0000000180), 0x2, 0x0) (async) r5 = openat$cgroup(r1, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000200)='cpuset.memory_spread_page\x00', 0x2, 0x0) r6 = openat$cgroup_ro(r1, &(0x7f0000000240)='blkio.bfq.time\x00', 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x7, 0xfc, 0x9, 0xe2, 0x0, 0x2, 0x408, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x2, 0x7}, 0x82a48, 0x4, 0xffff, 0x1, 0x7100000, 0x3ff, 0x6, 0x0, 0x1}, r4, 0xb, r4, 0x2) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x7, [@ptr={0x3}, @restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x5, 0x1}, @decl_tag={0x8, 0x0, 0x0, 0x11, 0x3, 0x3}]}, {0x0, [0x5f, 0x30, 0x5f, 0x2e, 0x2e]}}, &(0x7f00000003c0)=""/81, 0x57, 0x51, 0x1, 0x6}, 0x28) (async) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x0, 0x0, r6, 0x0, '\x00', 0x0, r6}, 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r6, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x12, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4d5, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@jmp={0x5, 0x1, 0xd, 0xd15d8285610aa115, 0x8, 0xfffffffffffffff0}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000005c0)='syzkaller\x00', 0xfff, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x40, '\x00', r11, @fallback=0x18, r4, 0x8, &(0x7f0000000740)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3, r6, 0x1, &(0x7f0000000780)=[r6, r6, r6, r4, r4, r4], &(0x7f00000007c0)=[{0x4, 0x4, 0xf, 0x8}], 0x10, 0xb4}, 0x94) (async) ioctl$TUNGETVNETLE(r4, 0x800454dd, &(0x7f00000008c0)) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b00)={r6, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1a, 0xb, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x590}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x46}, @alu={0x0, 0x0, 0xd, 0x5, 0xa, 0xffffffffffffffc0, 0x8}, @ldst={0x0, 0x1, 0x4, 0x8, 0x4, 0x50, 0xfffffffffffffffc}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000980)='GPL\x00', 0x8, 0x84, &(0x7f00000009c0)=""/132, 0x40f00, 0x4, '\x00', r12, @tracing=0x19, r4, 0x8, &(0x7f0000000b40)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000b80)={0x2, 0xc, 0x4, 0x7ff}, 0x10, r3, 0xffffffffffffffff, 0x4, &(0x7f0000000bc0)=[r8, r6, r10, r10, r4], &(0x7f0000000c00)=[{0x0, 0x4, 0x6, 0x7}, {0x1, 0x1, 0x6, 0x7}, {0x0, 0x4, 0xe, 0xb}, {0x2, 0x4, 0x5, 0x5}], 0x10, 0xfff}, 0x94) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000d00), 0x24801, 0x0) write$cgroup_subtree(r6, &(0x7f0000000d40)={[{0x2d, 'rlimit'}, {0x2d, 'hugetlb'}, {0x2d, 'cpuset'}, {0x2d, 'rlimit'}]}, 0x21) (async) ioctl$TUNSETCARRIER(r14, 0x400454e2, &(0x7f0000000d80)=0x1) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r2, 0x0, 0x3, &(0x7f0000000dc0)=':{\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e40)={@ifindex=r11, r6, 0x35, 0xc, r13, @void, @value=r13}, 0x20) (async) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000e80)=0x2) (async) r16 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000ec0)={r15}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001000)={@cgroup=r5, 0x10, 0x0, 0x7, &(0x7f0000000f00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000f80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000fc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001040)={@fallback=r7, r4, 0x8, 0x8, r16, @void, @value=r13, @void, @void, r17}, 0x20) 328.310327ms ago: executing program 1 (id=1490): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='f2fs_filemap_fault\x00', 0xffffffffffffffff, 0x0, 0x1fffffffffff9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="628a1bf1e9fe3f69080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/17, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, 0x0, 0x0, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000180)=ANY=[@ANYRES8=r3, @ANYRES16=r1, @ANYRESOCT=r2, @ANYRESHEX=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0xfffffffffffffcc1, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffcd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000640)={'dummy0\x00', @local}) sendmsg$tipc(r4, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595"], 0x0, 0x4a}, 0x28) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={0x0, &(0x7f0000001480)=""/167, 0x77, 0xa7}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) syz_open_procfs$namespace(0x0, &(0x7f0000000940)='ns/pid\x00') r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000000000e5acfc8df299328f168188f443776d6ff4c7c000000000000000000", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r9}, 0x10) 327.347358ms ago: executing program 2 (id=1491): ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)) r0 = gettid() r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x80, 0x21, 0x6, 0xa, 0x0, 0x0, 0x1, 0x1440, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000000c0), 0x6}, 0x830, 0x7, 0x7, 0x9, 0x9, 0x4, 0xfffb, 0x0, 0x8, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x1, 0x1, 0xf0, 0x3, 0x0, 0x9, 0x280, 0xa, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffff436, 0x0, @perf_config_ext={0x5, 0x81}, 0x160, 0x6, 0x800, 0x4, 0x8, 0xfffffff9, 0x57a, 0x0, 0x9, 0x0, 0x4}, r0, 0xc, r1, 0x2) r2 = syz_clone(0x4004000, &(0x7f0000000180)="fc7044c1c978ccca5e6b0b458edb70a714fc7cf52d52e677397f0dec89ebf7fef772d617ae81fd093d8fa1fa641d0540dec7df73cbbfbb7511122c9c358a18c5795892c116b115b6", 0x48, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="20cb3026d2a22b23beb0fae00bdb214ae9f19dbcfa7341f4a6bd15da98f8d54cc23f96bdde77f76c2057a15db39834df0efceed54c") r3 = gettid() r4 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x5, 0x6, 0x1, 0x71, 0x0, 0x6, 0x1000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x401, 0x4, @perf_config_ext={0x9142}, 0x20, 0x8, 0x6, 0x0, 0x81, 0xa8, 0x3, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xe, r1, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r2, r4, 0x0, 0x1, &(0x7f0000000340)='\x00'}, 0x30) r5 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000400)=r2, 0x12) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x10000, 0x0}, 0x8) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_clone(0x200, &(0x7f0000000480)="2269224370e323fd097fe78e410c6bd09d11fd5dafad3ff8a5bcd61d06d3c09e6582410209ece93ab511acb43ebe27c06cdeef58be79f6d89e75c2f69b80c9ec31fb199482066f00386d1abcb77636dedeb5a0940c9a1ff8af2dd0fd34e2b53000f5e657ca2ebc40f054d69f7f4a11b9df0ae8a6a9baa7447cf4ba3c17fcef7fe91998ce403e028dae609edc0f77a3122691194236ff8c7fd60d57f8b1da7f0422274bd10fa84706bca1a8ad5878e912f7b6acdc8f395498a7b95089de2930b5662a44aed4d1ea8a698ea65e54c3c3353cec1497633d554e276dfb1b6269cd7726b2cab4dfbbab58234243aded2727cc15", 0xf1, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="22ddea8d32d095efc1be78c96f8a8b78c3b4dbebe9ca0cb1452e7fd8de95282932ac46b83025a7f8395dc6b473ddbb1838d9c6e2ba59ab508ae5dc953400a575dd0a466769775b5e6f07f8a88a28db90fe28ba1e94132b4d2bf511fb06d410a8e82988a0024583255996caa6ba44399f1eabafb91a14bfbdeaf4edaa4d8bd88288f696e9057e81a53b6736f52199e2859432871e839c5d0fe5a0e7469e8f8602f2f57bf4207ccaf2e614f0f125e796d043ad0a4566c806cddff8f54c9f931516188ef0d2") r7 = perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x4, 0x2, 0x7f, 0x7, 0x0, 0xb7, 0x1200, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_config_ext={0xfffffffffffffe00, 0xf469}, 0x200, 0x9, 0x69, 0x6, 0x4, 0x59, 0x0, 0x0, 0xffff8408}, r3, 0x5, r1, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000780)='\x00') bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)='%pB \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000008c0)=@o_path={&(0x7f00000007c0)='./file0\x00', r8, 0x4000, r4}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000900)='./cgroup.cpu/syz0\x00', 0x1ff) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000940), 0x24a000, 0x0) ioctl$TUNSETLINK(r9, 0x400454cd, 0xcfb9a11d3ad8515c) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) ioctl$TUNATTACHFILTER(r9, 0x401054d5, &(0x7f00000009c0)={0x2, &(0x7f0000000980)=[{0x4, 0x4a, 0x8, 0x3}, {0x8f, 0x2, 0x81, 0x7}]}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{0x1, 0xffffffffffffffff}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ac0)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x50) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000cc0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x16, 0x15, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0xc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_fd={0x18, 0xa, 0x1, 0x0, r8}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xe}, @cb_func={0x18, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}, @map_fd={0x18, 0x7, 0x1, 0x0, r11}, @ldst={0x0, 0x1, 0x6, 0x5, 0x2, 0xfffffffffffffff4, 0xffffffffffffffff}]}, &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000c40)={0x4}, 0x8, 0x10, &(0x7f0000000c80)={0x4, 0xd, 0x2, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x5, &(0x7f0000000d40)=[r8, r8, r8, r12], &(0x7f0000000d80)=[{0x0, 0x1, 0x4, 0x4}, {0x0, 0x4, 0x3, 0x7}, {0x5, 0x2, 0x7, 0xb}, {0x3, 0x5, 0x4, 0x2}, {0x1, 0x5, 0xd, 0x5}], 0x10, 0x200}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ec0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000f00)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(r9, 0x400454d0, 0x12) 326.757918ms ago: executing program 3 (id=1492): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async, rerun: 32) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r2}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="000055183ca4", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 32) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 32) r6 = openat$cgroup_int(r5, &(0x7f0000000040)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f00000000c0)=0x100000000, 0x12) (async, rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x18, 0xc, &(0x7f0000000c00)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x1ff) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="18657554b0f92be9466256be0000000000000001d6f33bf5c41d06f3387da5b38f611702d3c16cf1c2a6fcfe11dd72c2adbad9deb720586e67b082657815d7b26af491bba0be108400a08eb1d7dd2a78110bcc85b9896ffdd540c733b4e5937f344cca83f8c59527ec63fdc1a522d8a350ee888ccb26b0b388b48dd70c51401224882eb3c3d15563b9b4937f97eb574298412a63afda96aec8f1622395605b594190b97a1678c4ab760ba30220"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x94) (async) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="020000fd4c5dd52bfdc594b96bcb0204000000083df555ce5efe8de5d7f54fc31520598cfc556838f0674240", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r9, &(0x7f0000000f80)="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", &(0x7f0000000040)=""/61}, 0x20) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x210b, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x407fff, 0xaea}, 0x14905, 0x32, 0xfffffbff, 0x3, 0x2, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xfe, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 32) close(r3) 324.584348ms ago: executing program 4 (id=1493): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'\x00', 0x112}) close(r0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240408c1}, 0x20004800) recvmsg$unix(0xffffffffffffffff, 0x0, 0x10002) mkdir(0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0xfffffff5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) gettid() sendmsg$unix(r5, &(0x7f0000000640)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 247.268279ms ago: executing program 4 (id=1494): r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x4, 0x70800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d070811"], 0xfdef) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f00000002c0)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001280)=ANY=[@ANYBLOB="b702000023000000bfa30000000000000703000000feffff7a0af0ff0000000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010404000001007d60b7030000010000006a0a00fe00000000850000000d000000b700000001000000950000000000000075cdc4b57b0c65752a3ad50000007ddd0000000000639100000000000000000000ff7f00000000cb04fcbb0ba9918d37b056b9bbd11b6b9f6cf7db6d574620260000000000008062d77e84cef4a2ab938f65aac33c4d620de2c9b7dc10d7d313f9f57606b839994fb484510bef2e488fbac2fe6faaf75e5cc4815bd2051ade12f41deff6df6a936b4ec3827c739bb39aad16cc75fe369258673b5d053bdec75dcab772be2c9d2d29db3d36dd01797bd3f15aa6aadbeab2a01685108e61aa000000000000000000000000008b798b4f7458d1863cc67d4c6a06e828e5216f601b19db1af1b5d356d0f015d885b4b8ffc0fa3f880287c862137d866d11be4ba3f0151fdbbd4e97d62ecc645e143a60f1b1b71b5f7fc6edc76600000000826151e2b42bf0ed0c8cef3ba2a730a00c87c493db845b10e9468bda6f82881eb8c9cfa72b08eecc972a3fd2c46f3c1cde71a19d1a2982492abaa96665372831210e00d2bfea3bf97ff8836d000000000000000000000000000000000000000000250d623b48a29e330900b8c552202407804f1ba1817256caf1090b71f2928ed030f3c8194cc3cbf48e2f4c9248c4c00a32d4873da3b7d66b1ce6f72aab16c923b16c4bfdbb24fb17bd198139c21c46065c6922fd705e670d0b5d6d495a773b872e8f88"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000090000000000000001"], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x6, 0x9, 0x0, 0x8, 0x5882a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0}, 0x400, 0xc8, 0x1, 0x3, 0x5, 0x0, 0x0, 0x0, 0x80, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x1f00, 0x18, 0x19, &(0x7f00000007c0)="9f44948721919580684010a40566", 0x0, 0x7ff, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000380)="8c5911c525f5cf4c4ecf207ad2ec", 0x0, 0x0, 0xffffffff}, 0x23) 21.54896ms ago: executing program 3 (id=1495): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c13c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c77aa"], 0xfdef) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=0x0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x6}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1800980000100000040000000000000061123c000000000000001f4b", @ANYRESOCT=0x0], &(0x7f0000000500)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, r3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0, 0x3e, &(0x7f0000000340)=[{}, {}], 0x10, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xf5, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000b6000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r7}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) 21.00439ms ago: executing program 3 (id=1496): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) close(0xffffffffffffffff) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 0s ago: executing program 0 (id=1357): r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x40, 0x10, 0x40, 0x0, 0xff, 0x400, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x100, 0x0, 0x4, 0x9, 0x9, 0x8, 0x6, 0x0, 0x10000, 0x0, 0xa9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_devices(r1, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x3, 0x0}, 0x8) (async) r4 = openat$cgroup_ro(r1, &(0x7f0000000140)='blkio.bfq.time\x00', 0x0, 0x0) openat$cgroup_type(r4, &(0x7f0000000180), 0x2, 0x0) (async) r5 = openat$cgroup(r1, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000200)='cpuset.memory_spread_page\x00', 0x2, 0x0) r6 = openat$cgroup_ro(r1, &(0x7f0000000240)='blkio.bfq.time\x00', 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x7, 0xfc, 0x9, 0xe2, 0x0, 0x2, 0x408, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x2, 0x7}, 0x82a48, 0x4, 0xffff, 0x1, 0x7100000, 0x3ff, 0x6, 0x0, 0x1}, r4, 0xb, r4, 0x2) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x7, [@ptr={0x3}, @restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x5, 0x1}, @decl_tag={0x8, 0x0, 0x0, 0x11, 0x3, 0x3}]}, {0x0, [0x5f, 0x30, 0x5f, 0x2e, 0x2e]}}, &(0x7f00000003c0)=""/81, 0x57, 0x51, 0x1, 0x6}, 0x28) (async) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x0, 0x0, r6, 0x0, '\x00', 0x0, r6}, 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r6, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x12, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4d5, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@jmp={0x5, 0x1, 0xd, 0xd15d8285610aa115, 0x8, 0xfffffffffffffff0}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000005c0)='syzkaller\x00', 0xfff, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x40, '\x00', r11, @fallback=0x18, r4, 0x8, &(0x7f0000000740)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r3, r6, 0x1, &(0x7f0000000780)=[r6, r6, r6, r4, r4, r4], &(0x7f00000007c0)=[{0x4, 0x4, 0xf, 0x8}], 0x10, 0xb4}, 0x94) (async) ioctl$TUNGETVNETLE(r4, 0x800454dd, &(0x7f00000008c0)) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b00)={r6, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x1a, 0xb, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x590}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xc}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x46}, @alu={0x0, 0x0, 0xd, 0x5, 0xa, 0xffffffffffffffc0, 0x8}, @ldst={0x0, 0x1, 0x4, 0x8, 0x4, 0x50, 0xfffffffffffffffc}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000980)='GPL\x00', 0x8, 0x84, &(0x7f00000009c0)=""/132, 0x40f00, 0x4, '\x00', r12, @tracing=0x19, r4, 0x8, &(0x7f0000000b40)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000b80)={0x2, 0xc, 0x4, 0x7ff}, 0x10, r3, 0xffffffffffffffff, 0x4, &(0x7f0000000bc0)=[r8, r6, r10, r10, r4], &(0x7f0000000c00)=[{0x0, 0x4, 0x6, 0x7}, {0x1, 0x1, 0x6, 0x7}, {0x0, 0x4, 0xe, 0xb}, {0x2, 0x4, 0x5, 0x5}], 0x10, 0xfff}, 0x94) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000d00), 0x24801, 0x0) write$cgroup_subtree(r6, &(0x7f0000000d40)={[{0x2d, 'rlimit'}, {0x2d, 'hugetlb'}, {0x2d, 'cpuset'}, {0x2d, 'rlimit'}]}, 0x21) (async) ioctl$TUNSETCARRIER(r14, 0x400454e2, &(0x7f0000000d80)=0x1) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r2, 0x0, 0x3, &(0x7f0000000dc0)=':{\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e40)={@ifindex=r11, r6, 0x35, 0xc, r13, @void, @value=r13}, 0x20) (async) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000e80)=0x2) (async) r16 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000ec0)={r15}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001000)={@cgroup=r5, 0x10, 0x0, 0x7, &(0x7f0000000f00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000f80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000fc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001040)={@fallback=r7, r4, 0x8, 0x8, r16, @void, @value=r13, @void, @void, r17}, 0x20) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.46' (ED25519) to the list of known hosts. [ 21.669694][ T24] audit: type=1400 audit(1762221517.600:64): avc: denied { mounton } for pid=266 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.670969][ T266] cgroup: Unknown subsys name 'net' [ 21.697647][ T24] audit: type=1400 audit(1762221517.600:65): avc: denied { mount } for pid=266 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.719906][ T24] audit: type=1400 audit(1762221517.630:66): avc: denied { unmount } for pid=266 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.719912][ T266] cgroup: Unknown subsys name 'devices' [ 21.865159][ T266] cgroup: Unknown subsys name 'hugetlb' [ 21.870751][ T266] cgroup: Unknown subsys name 'rlimit' [ 22.038655][ T24] audit: type=1400 audit(1762221517.970:67): avc: denied { setattr } for pid=266 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.061867][ T24] audit: type=1400 audit(1762221517.970:68): avc: denied { mounton } for pid=266 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.086642][ T24] audit: type=1400 audit(1762221517.970:69): avc: denied { mount } for pid=266 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.093782][ T268] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.118638][ T24] audit: type=1400 audit(1762221518.050:70): avc: denied { relabelto } for pid=268 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.144105][ T24] audit: type=1400 audit(1762221518.050:71): avc: denied { write } for pid=268 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.170435][ T24] audit: type=1400 audit(1762221518.100:72): avc: denied { read } for pid=266 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.195955][ T24] audit: type=1400 audit(1762221518.100:73): avc: denied { open } for pid=266 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.196148][ T266] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.699292][ T274] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.706431][ T274] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.714019][ T274] device bridge_slave_0 entered promiscuous mode [ 22.720894][ T274] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.727950][ T274] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.735313][ T274] device bridge_slave_1 entered promiscuous mode [ 22.837777][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.844836][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.852414][ T275] device bridge_slave_0 entered promiscuous mode [ 22.860328][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.867495][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.874868][ T275] device bridge_slave_1 entered promiscuous mode [ 22.895373][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.902445][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.909717][ T278] device bridge_slave_0 entered promiscuous mode [ 22.916909][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.923973][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.931293][ T278] device bridge_slave_1 entered promiscuous mode [ 22.961201][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.968271][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.975700][ T282] device bridge_slave_0 entered promiscuous mode [ 22.984868][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.992084][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.999470][ T282] device bridge_slave_1 entered promiscuous mode [ 23.028930][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.036171][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.043711][ T281] device bridge_slave_0 entered promiscuous mode [ 23.050578][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.057665][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.065208][ T281] device bridge_slave_1 entered promiscuous mode [ 23.097770][ T274] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.104825][ T274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.112116][ T274] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.119131][ T274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.147455][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.154521][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.161782][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.168801][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.238880][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.246317][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.254639][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.262289][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.269377][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.293399][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.300861][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.308423][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.316807][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.323844][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.331231][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.339798][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.346835][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.361061][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.369273][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.377446][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.384493][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.405238][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.413070][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.420940][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.437482][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.445656][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.452698][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.460415][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.468960][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.475996][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.483430][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.491508][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.498544][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.505868][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.526838][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.535106][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.542165][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.549864][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.559656][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.566747][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.574084][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.582161][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.590029][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.598166][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.625008][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.634313][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.643074][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.651336][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.659646][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.667547][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.682112][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.689538][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.697035][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.705208][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.713249][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.720597][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.729513][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.737821][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.746659][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.755036][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.763461][ T275] device veth0_vlan entered promiscuous mode [ 23.772298][ T274] device veth0_vlan entered promiscuous mode [ 23.778667][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.786282][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.798025][ T281] device veth0_vlan entered promiscuous mode [ 23.807394][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.815806][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.824097][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.831109][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.838879][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.847353][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.855551][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.862592][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.869932][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.877997][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.886201][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.893970][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.901357][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.915175][ T282] device veth0_vlan entered promiscuous mode [ 23.924499][ T275] device veth1_macvtap entered promiscuous mode [ 23.931470][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.939621][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.948124][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.956312][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.964398][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.972621][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.980447][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.988579][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.996663][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.004976][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.013188][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.020731][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.028256][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.040184][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.048527][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.061539][ T281] device veth1_macvtap entered promiscuous mode [ 24.068952][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.076698][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.085479][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.095838][ T282] device veth1_macvtap entered promiscuous mode [ 24.108704][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.117211][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.125425][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.133228][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.141332][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.149701][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.157857][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.175466][ T274] device veth1_macvtap entered promiscuous mode [ 24.183135][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.190766][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.199271][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.208162][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.216473][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.224906][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.233249][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.242487][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.250700][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.269489][ T281] request_module fs-gadgetfs succeeded, but still no fs? [ 24.282057][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.293267][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.303404][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.317011][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.325964][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.337790][ T278] device veth0_vlan entered promiscuous mode [ 24.365002][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.375223][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.390684][ T278] device veth1_macvtap entered promiscuous mode [ 24.421604][ C1] hrtimer: interrupt took 21277 ns [ 24.447840][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.492178][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.518192][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.535472][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.554524][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.630638][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.656044][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.664814][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.673373][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.812531][ T318] cgroup: syz.3.7 (318) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.829172][ T318] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 26.914056][ T24] kauditd_printk_skb: 44 callbacks suppressed [ 26.914069][ T24] audit: type=1400 audit(1762221522.850:118): avc: denied { ioctl } for pid=384 comm="syz.3.26" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.102156][ T400] device veth0_vlan left promiscuous mode [ 28.115488][ T400] device veth0_vlan entered promiscuous mode [ 28.161372][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.205170][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.289339][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.530556][ T424] device pim6reg1 entered promiscuous mode [ 28.736691][ T432] device sit0 entered promiscuous mode [ 28.952714][ T24] audit: type=1400 audit(1762221524.870:119): avc: denied { ioctl } for pid=437 comm="syz.3.40" path="uts:[4026532363]" dev="nsfs" ino=4026532363 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 29.788395][ T458] device syzkaller0 entered promiscuous mode [ 31.144670][ T24] audit: type=1400 audit(1762221527.080:120): avc: denied { create } for pid=480 comm="syz.4.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.202711][ T488] device pim6reg1 entered promiscuous mode [ 31.892136][ T499] device pim6reg1 entered promiscuous mode [ 31.991438][ T24] audit: type=1400 audit(1762221527.920:121): avc: denied { create } for pid=500 comm="syz.3.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 32.154114][ T24] audit: type=1400 audit(1762221528.090:122): avc: denied { create } for pid=504 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 32.410316][ T527] device pim6reg1 entered promiscuous mode [ 32.535915][ T24] audit: type=1400 audit(1762221528.470:123): avc: denied { relabelfrom } for pid=533 comm="syz.3.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.636447][ T536] device pim6reg1 entered promiscuous mode [ 32.663449][ T24] audit: type=1400 audit(1762221528.490:124): avc: denied { relabelto } for pid=533 comm="syz.3.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.721334][ T24] audit: type=1400 audit(1762221528.500:125): avc: denied { create } for pid=531 comm="syz.4.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 33.081915][ T558] device pim6reg1 entered promiscuous mode [ 33.317149][ T581] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 33.590656][ T592] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.597864][ T592] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.701692][ T592] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.708800][ T592] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.716091][ T592] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.723137][ T592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.751739][ T592] device bridge0 entered promiscuous mode [ 33.757549][ T24] audit: type=1400 audit(1762221529.690:126): avc: denied { tracepoint } for pid=597 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.780786][ T596] device pim6reg1 entered promiscuous mode [ 34.028218][ T611] device pim6reg1 entered promiscuous mode [ 34.078709][ T24] audit: type=1400 audit(1762221530.010:127): avc: denied { append } for pid=621 comm="syz.0.96" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.127144][ T630] device pim6reg1 entered promiscuous mode [ 34.191816][ T24] audit: type=1400 audit(1762221530.120:128): avc: denied { create } for pid=627 comm="syz.4.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 34.298556][ T24] audit: type=1400 audit(1762221530.220:129): avc: denied { create } for pid=631 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 34.674719][ T640] device veth0_vlan left promiscuous mode [ 34.691959][ T640] device veth0_vlan entered promiscuous mode [ 34.777143][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.797002][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.876291][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.095993][ T659] device pim6reg1 entered promiscuous mode [ 35.373501][ T669] device pim6reg1 entered promiscuous mode [ 36.019407][ T692] syz.1.118 (692) used obsolete PPPIOCDETACH ioctl [ 36.486924][ T705] device pim6reg1 entered promiscuous mode [ 36.660655][ T24] audit: type=1400 audit(1762221532.590:130): avc: denied { create } for pid=711 comm="syz.3.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 37.686013][ T753] device veth0_vlan left promiscuous mode [ 37.829160][ T753] device veth0_vlan entered promiscuous mode [ 38.092741][ T754] device pim6reg1 entered promiscuous mode [ 38.978070][ T24] audit: type=1400 audit(1762221534.910:131): avc: denied { create } for pid=792 comm="syz.1.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 40.120536][ T24] audit: type=1400 audit(1762221536.050:132): avc: denied { create } for pid=819 comm="syz.2.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 40.323888][ T822] device syzkaller0 entered promiscuous mode [ 41.480541][ T866] device pim6reg1 entered promiscuous mode [ 42.599882][ T893] device pim6reg1 entered promiscuous mode [ 44.204721][ T957] device pim6reg1 entered promiscuous mode [ 44.299170][ T963] syz.4.198[963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.299261][ T963] syz.4.198[963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.416706][ T971] device pim6reg1 entered promiscuous mode [ 45.008415][ T990] device syzkaller0 entered promiscuous mode [ 45.061557][ T993] device pim6reg1 entered promiscuous mode [ 45.230903][ T996] device sit0 entered promiscuous mode [ 45.492932][ T1009] device wg2 entered promiscuous mode [ 45.657410][ T1027] device pim6reg1 entered promiscuous mode [ 45.724242][ T1033] device pim6reg1 entered promiscuous mode [ 46.534122][ T1056] syz.4.229[1056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.534175][ T1056] syz.4.229[1056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.618987][ T1065] device pim6reg1 entered promiscuous mode [ 46.652149][ T1063] device pim6reg1 entered promiscuous mode [ 46.700246][ T1074] device syzkaller0 entered promiscuous mode [ 47.528451][ T24] audit: type=1400 audit(1762221543.460:133): avc: denied { create } for pid=1106 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 47.760734][ T1112] device pim6reg1 entered promiscuous mode [ 47.946098][ T24] audit: type=1400 audit(1762221543.880:134): avc: denied { create } for pid=1113 comm="syz.1.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 48.234291][ T1139] device veth0_vlan left promiscuous mode [ 48.302529][ T1139] device veth0_vlan entered promiscuous mode [ 48.309916][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.338580][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.390475][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.685777][ T1158] device pim6reg1 entered promiscuous mode [ 48.926975][ T1172] ------------[ cut here ]------------ [ 49.012318][ T1172] trace type BPF program uses run-time allocation [ 49.131758][ T1172] WARNING: CPU: 0 PID: 1172 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 49.267585][ T1172] Modules linked in: [ 49.304025][ T24] audit: type=1400 audit(1762221545.240:135): avc: denied { create } for pid=1176 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 49.312735][ T1172] CPU: 0 PID: 1172 Comm: syz.3.270 Not tainted syzkaller #0 [ 49.404486][ T1172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 49.441651][ T1172] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 49.478803][ T1172] Code: 85 e9 14 fe ff ff e8 99 fa ef ff 31 c0 e9 15 fe ff ff e8 8d fa ef ff c6 05 34 c9 2c 05 01 48 c7 c7 80 7a 05 85 e8 7a a4 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 49.702717][ T1172] RSP: 0018:ffffc90000f37468 EFLAGS: 00010246 [ 49.711688][ T1172] RAX: 3e69be8f0db5f500 RBX: 0000000000000001 RCX: 0000000000080000 [ 49.783787][ T1172] RDX: ffffc90002cc1000 RSI: 0000000000002201 RDI: 0000000000002202 [ 49.873928][ T1172] RBP: ffffc90000f374b0 R08: dffffc0000000000 R09: ffffed103ee0a5f8 [ 49.922137][ T1205] device pim6reg1 entered promiscuous mode [ 49.936249][ T1172] R10: ffffed103ee0a5f8 R11: 1ffff1103ee0a5f7 R12: ffff88813a410000 [ 49.995872][ T1172] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811c1b2000 [ 50.014106][ T1172] FS: 00007f93c06826c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 50.023361][ T1172] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.030041][ T1172] CR2: 00007fe165c81dac CR3: 000000012a2bb000 CR4: 00000000003506b0 [ 50.201722][ T1172] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.209737][ T1172] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 50.299280][ T1172] Call Trace: [ 50.340060][ T1172] ? __fdget+0x1a1/0x230 [ 50.367941][ T1217] device syzkaller0 left promiscuous mode [ 50.377207][ T1172] resolve_pseudo_ldimm64+0x526/0x1020 [ 50.429741][ T1172] ? bpf_check+0xd680/0xd680 [ 50.434550][ T1172] ? kvmalloc_node+0x88/0x130 [ 50.439297][ T1172] bpf_check+0x8d4b/0xd680 [ 50.443788][ T1172] ? bpf_get_btf_vmlinux+0x60/0x60 [ 50.448907][ T1172] ? is_bpf_text_address+0x177/0x190 [ 50.467589][ T1172] ? selinux_bpf_prog_alloc+0x51/0x140 [ 50.473161][ T1172] ? __kernel_text_address+0xa0/0x100 [ 50.479707][ T1172] ? unwind_get_return_address+0x4d/0x90 [ 50.492190][ T1172] ? stack_trace_save+0xe0/0xe0 [ 50.556482][ T1172] ? arch_stack_walk+0xee/0x140 [ 50.612380][ T1172] ? stack_trace_save+0x98/0xe0 [ 50.617292][ T1172] ? stack_trace_snprint+0xf0/0xf0 [ 50.648111][ T1172] ? __kasan_slab_alloc+0x69/0xf0 [ 50.653234][ T1172] ? selinux_bpf_prog_alloc+0x51/0x140 [ 50.658758][ T1172] ? __kasan_kmalloc+0xec/0x110 [ 50.663670][ T1172] ? __kasan_kmalloc+0xda/0x110 [ 50.668906][ T1172] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 50.675068][ T1172] ? selinux_bpf_prog_alloc+0x51/0x140 [ 50.682103][ T1172] ? security_bpf_prog_alloc+0x62/0x90 [ 50.686761][ T1220] device sit0 entered promiscuous mode [ 50.692308][ T1172] ? bpf_prog_load+0x949/0x1420 [ 50.697903][ T1172] ? __se_sys_bpf+0x442/0x680 [ 50.753989][ T1172] ? __x64_sys_bpf+0x7b/0x90 [ 50.758718][ T1172] ? do_syscall_64+0x31/0x40 [ 50.849729][ T1172] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.855893][ T1172] ? memset+0x35/0x40 [ 50.859973][ T1172] ? bpf_obj_name_cpy+0x193/0x1e0 [ 50.865276][ T1172] bpf_prog_load+0xf5a/0x1420 [ 50.870072][ T1172] ? map_freeze+0x320/0x320 [ 50.874619][ T1172] ? dev_ifsioc+0x69b/0xa50 [ 50.879131][ T1172] ? selinux_bpf+0xc7/0xf0 [ 50.884262][ T1172] ? security_bpf+0x82/0xa0 [ 50.888992][ T1172] __se_sys_bpf+0x442/0x680 [ 50.893709][ T1172] ? __x64_sys_bpf+0x90/0x90 [ 50.898415][ T1172] ? __kasan_check_read+0x11/0x20 [ 50.903632][ T1219] device lo entered promiscuous mode [ 50.909811][ T1172] __x64_sys_bpf+0x7b/0x90 [ 50.919424][ T1172] do_syscall_64+0x31/0x40 [ 50.923895][ T1172] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.939994][ T1172] RIP: 0033:0x7f93c1c3b6c9 [ 50.949730][ T1172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.977426][ T1172] RSP: 002b:00007f93c0682038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 50.988769][ T1172] RAX: ffffffffffffffda RBX: 00007f93c1e92090 RCX: 00007f93c1c3b6c9 [ 50.998286][ T1172] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 51.006732][ T1172] RBP: 00007f93c1cbdf91 R08: 0000000000000000 R09: 0000000000000000 [ 51.020974][ T1226] device sit0 entered promiscuous mode [ 51.032939][ T1172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 51.092967][ T1172] R13: 00007f93c1e92128 R14: 00007f93c1e92090 R15: 00007fff43d2b048 [ 51.147153][ T1172] ---[ end trace 95d0c33729fdbba9 ]--- [ 51.253645][ T1227] device pim6reg1 entered promiscuous mode [ 51.494949][ T24] audit: type=1400 audit(1762221547.430:136): avc: denied { create } for pid=1258 comm="syz.3.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 51.706421][ T24] audit: type=1400 audit(1762221547.640:137): avc: denied { create } for pid=1262 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 52.262955][ T1280] syz.2.306[1280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.263075][ T1280] syz.2.306[1280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.347516][ T1284] device pim6reg1 entered promiscuous mode [ 52.392372][ T24] audit: type=1400 audit(1762221548.330:138): avc: denied { create } for pid=1286 comm="syz.3.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 52.430530][ T1291] device wg2 left promiscuous mode [ 52.820976][ T24] audit: type=1400 audit(1762221548.740:139): avc: denied { create } for pid=1310 comm="syz.0.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 53.025863][ T1338] device pim6reg1 entered promiscuous mode [ 53.174441][ T24] audit: type=1400 audit(1762221549.110:140): avc: denied { create } for pid=1341 comm="syz.3.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 53.205182][ T1342] device pim6reg1 entered promiscuous mode [ 55.520339][ T1392] device syzkaller0 entered promiscuous mode [ 56.372628][ T1421] device pim6reg1 entered promiscuous mode [ 56.795553][ T24] audit: type=1400 audit(1762221552.730:141): avc: denied { create } for pid=1434 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 56.901165][ T1439] device sit0 entered promiscuous mode [ 57.053232][ T1448] bridge0: port 3(veth0) entered blocking state [ 57.067727][ T1448] bridge0: port 3(veth0) entered disabled state [ 57.094026][ T1448] device veth0 entered promiscuous mode [ 57.100806][ T1448] bridge0: port 3(veth0) entered blocking state [ 57.107097][ T1448] bridge0: port 3(veth0) entered forwarding state [ 57.126095][ T1451] device veth0 left promiscuous mode [ 57.131533][ T1451] bridge0: port 3(veth0) entered disabled state [ 57.262054][ T1460] device pim6reg1 entered promiscuous mode [ 57.521546][ T1467] device sit0 left promiscuous mode [ 57.644637][ T1468] device sit0 entered promiscuous mode [ 57.940675][ T1481] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.949064][ T1481] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.234637][ T24] audit: type=1400 audit(1762221554.170:142): avc: denied { create } for pid=1485 comm="syz.3.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 58.287775][ T1492] device bridge_slave_1 left promiscuous mode [ 58.443002][ T1492] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.462584][ T1492] device bridge_slave_0 left promiscuous mode [ 58.485512][ T1492] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.670128][ T1493] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.677317][ T1493] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.103744][ T1529] device wg2 entered promiscuous mode [ 59.197338][ T1542] device sit0 left promiscuous mode [ 59.786135][ T1570] device pim6reg1 entered promiscuous mode [ 60.135754][ T1600] device pim6reg1 entered promiscuous mode [ 60.366850][ T1607] FAULT_INJECTION: forcing a failure. [ 60.366850][ T1607] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 60.409650][ T1609] syz.4.405[1609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.409743][ T1609] syz.4.405[1609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.422598][ T1607] CPU: 0 PID: 1607 Comm: syz.0.404 Tainted: G W syzkaller #0 [ 60.442465][ T1607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 60.452519][ T1607] Call Trace: [ 60.455807][ T1607] __dump_stack+0x21/0x24 [ 60.460168][ T1607] dump_stack_lvl+0x169/0x1d8 [ 60.464852][ T1607] ? show_regs_print_info+0x18/0x18 [ 60.470048][ T1607] dump_stack+0x15/0x1c [ 60.474198][ T1607] should_fail+0x3c1/0x510 [ 60.478612][ T1607] should_fail_usercopy+0x1a/0x20 [ 60.483632][ T1607] _copy_from_user+0x20/0xd0 [ 60.488212][ T1607] sock_do_ioctl+0x1b2/0x330 [ 60.492794][ T1607] ? __kasan_slab_free+0x11/0x20 [ 60.497723][ T1607] ? sock_show_fdinfo+0xa0/0xa0 [ 60.502569][ T1607] ? selinux_file_ioctl+0x377/0x480 [ 60.507778][ T1607] ? mutex_trylock+0xa0/0xa0 [ 60.512363][ T1607] ? __fget_files+0x2c4/0x320 [ 60.517038][ T1607] sock_ioctl+0x504/0x710 [ 60.521379][ T1607] ? sock_poll+0x360/0x360 [ 60.525786][ T1607] ? __fget_files+0x2c4/0x320 [ 60.530464][ T1607] ? security_file_ioctl+0x84/0xa0 [ 60.535575][ T1607] ? sock_poll+0x360/0x360 [ 60.539981][ T1607] __se_sys_ioctl+0x121/0x1a0 [ 60.544653][ T1607] __x64_sys_ioctl+0x7b/0x90 [ 60.549241][ T1607] do_syscall_64+0x31/0x40 [ 60.553653][ T1607] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 60.559537][ T1607] RIP: 0033:0x7fa96cdac6c9 [ 60.563950][ T1607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.583546][ T1607] RSP: 002b:00007fa96b814038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 60.591954][ T1607] RAX: ffffffffffffffda RBX: 00007fa96d002fa0 RCX: 00007fa96cdac6c9 [ 60.599919][ T1607] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 000000000000000b [ 60.607885][ T1607] RBP: 00007fa96b814090 R08: 0000000000000000 R09: 0000000000000000 [ 60.615863][ T1607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 60.623825][ T1607] R13: 00007fa96d003038 R14: 00007fa96d002fa0 R15: 00007ffdd29f3f08 [ 60.712288][ T1626] device pim6reg1 entered promiscuous mode [ 60.789537][ T1638] device pim6reg1 entered promiscuous mode [ 60.915427][ T1642] device sit0 left promiscuous mode [ 61.002342][ T1648] device sit0 entered promiscuous mode [ 61.245887][ T1651] device syzkaller0 entered promiscuous mode [ 61.583437][ T24] audit: type=1400 audit(1762221557.520:143): avc: denied { write } for pid=1671 comm="syz.3.423" name="cgroup.subtree_control" dev="cgroup2" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 61.644623][ T24] audit: type=1400 audit(1762221557.520:144): avc: denied { open } for pid=1671 comm="syz.3.423" path="" dev="cgroup2" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 61.685777][ T1675] FAULT_INJECTION: forcing a failure. [ 61.685777][ T1675] name failslab, interval 1, probability 0, space 0, times 1 [ 61.726110][ T1678] device pim6reg1 entered promiscuous mode [ 61.732295][ T1675] CPU: 1 PID: 1675 Comm: syz.3.424 Tainted: G W syzkaller #0 [ 61.740990][ T1675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 61.751055][ T1675] Call Trace: [ 61.754348][ T1675] __dump_stack+0x21/0x24 [ 61.758672][ T1675] dump_stack_lvl+0x169/0x1d8 [ 61.763344][ T1675] ? show_regs_print_info+0x18/0x18 [ 61.768535][ T1675] ? widen_string+0x42/0x360 [ 61.773139][ T1675] dump_stack+0x15/0x1c [ 61.777288][ T1675] should_fail+0x3c1/0x510 [ 61.781705][ T1675] ? __request_module+0x273/0x890 [ 61.786715][ T1675] __should_failslab+0xa4/0xe0 [ 61.791466][ T1675] should_failslab+0x9/0x20 [ 61.795954][ T1675] kmem_cache_alloc_trace+0x3a/0x2e0 [ 61.801225][ T1675] ? dev_load+0x5b/0xb0 [ 61.805369][ T1675] __request_module+0x273/0x890 [ 61.810298][ T1675] ? selinux_capable+0x29c/0x380 [ 61.815225][ T1675] ? copy_regset_to_user+0x200/0x200 [ 61.820594][ T1675] ? cap_capable+0x19c/0x220 [ 61.825170][ T1675] ? cap_capable+0x19c/0x220 [ 61.829778][ T1675] ? security_capable+0x87/0xb0 [ 61.834633][ T1675] dev_load+0x5b/0xb0 [ 61.838601][ T1675] dev_ioctl+0x53d/0xb80 [ 61.842835][ T1675] sock_do_ioctl+0x235/0x330 [ 61.847507][ T1675] ? __kasan_slab_free+0x11/0x20 [ 61.852441][ T1675] ? sock_show_fdinfo+0xa0/0xa0 [ 61.857305][ T1675] ? selinux_file_ioctl+0x377/0x480 [ 61.862512][ T1675] ? mutex_trylock+0xa0/0xa0 [ 61.867102][ T1675] ? __fget_files+0x2c4/0x320 [ 61.871772][ T1675] sock_ioctl+0x504/0x710 [ 61.876115][ T1675] ? sock_poll+0x360/0x360 [ 61.880522][ T1675] ? __fget_files+0x2c4/0x320 [ 61.885203][ T1675] ? security_file_ioctl+0x84/0xa0 [ 61.890316][ T1675] ? sock_poll+0x360/0x360 [ 61.894728][ T1675] __se_sys_ioctl+0x121/0x1a0 [ 61.899397][ T1675] __x64_sys_ioctl+0x7b/0x90 [ 61.903976][ T1675] do_syscall_64+0x31/0x40 [ 61.908389][ T1675] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 61.914269][ T1675] RIP: 0033:0x7f93c1c3b6c9 [ 61.918684][ T1675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.939020][ T1675] RSP: 002b:00007f93c0682038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 61.947431][ T1675] RAX: ffffffffffffffda RBX: 00007f93c1e92090 RCX: 00007f93c1c3b6c9 [ 61.955393][ T1675] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 000000000000000b [ 61.963358][ T1675] RBP: 00007f93c0682090 R08: 0000000000000000 R09: 0000000000000000 [ 61.971320][ T1675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 61.979283][ T1675] R13: 00007f93c1e92128 R14: 00007f93c1e92090 R15: 00007fff43d2b048 [ 61.997610][ T24] audit: type=1400 audit(1762221557.930:145): avc: denied { sys_module } for pid=1673 comm="syz.3.424" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 62.024054][ T1675] device pim6reg1 entered promiscuous mode [ 62.560950][ T1702] device veth0_vlan left promiscuous mode [ 62.587484][ T1702] device veth0_vlan entered promiscuous mode [ 62.624546][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.633002][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.640663][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 63.540031][ T1730] device veth0_to_team entered promiscuous mode [ 63.970135][ T1744] device pim6reg1 entered promiscuous mode [ 63.994887][ T1747] device syzkaller0 entered promiscuous mode [ 64.126183][ T24] audit: type=1400 audit(1762221560.060:146): avc: denied { ioctl } for pid=1750 comm="syz.1.449" path="socket:[20696]" dev="sockfs" ino=20696 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 64.795223][ T1779] device syzkaller0 entered promiscuous mode [ 65.173512][ T1795] device pim6reg1 entered promiscuous mode [ 65.602641][ T1806] device sit0 left promiscuous mode [ 65.771861][ T1808] device sit0 entered promiscuous mode [ 66.301689][ T1833] device sit0 left promiscuous mode [ 66.398896][ T1842] device sit0 entered promiscuous mode [ 66.943993][ T1861] device pim6reg1 entered promiscuous mode [ 67.213978][ T1873] device pim6reg1 entered promiscuous mode [ 68.689371][ T1943] device syzkaller0 entered promiscuous mode [ 69.542939][ T1972] device pim6reg1 entered promiscuous mode [ 69.867924][ T1991] device pim6reg1 entered promiscuous mode [ 69.931910][ T2000] Q±6ã`Ò˜: renamed from lo [ 69.950837][ T2001] device wg2 entered promiscuous mode [ 70.056821][ T2012] device syzkaller0 entered promiscuous mode [ 70.116269][ T2013] syzkaller0: refused to change device tx_queue_len [ 70.149931][ T2017] device pim6reg1 entered promiscuous mode [ 70.856991][ T2045] device syzkaller0 entered promiscuous mode [ 71.107351][ T2063] device pim6reg1 entered promiscuous mode [ 72.232787][ T2078] device syzkaller0 entered promiscuous mode [ 72.350354][ T24] audit: type=1400 audit(1762221568.280:147): avc: denied { create } for pid=2100 comm="syz.3.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 72.578964][ T2109] device pim6reg1 entered promiscuous mode [ 72.796123][ T2114] device veth1_macvtap left promiscuous mode [ 72.872550][ T2115] device veth1_macvtap entered promiscuous mode [ 72.879797][ T2115] device macsec0 entered promiscuous mode [ 73.284731][ T2138] device pim6reg1 entered promiscuous mode [ 73.320100][ T2134] device syzkaller0 entered promiscuous mode [ 73.582460][ T2155] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 77.726276][ T2251] device pim6reg1 entered promiscuous mode [ 77.999837][ T2273] device syzkaller0 left promiscuous mode [ 78.129186][ T24] audit: type=1400 audit(1762221574.060:148): avc: denied { create } for pid=2274 comm="syz.3.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 78.160130][ T2283] FAULT_INJECTION: forcing a failure. [ 78.160130][ T2283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 78.218151][ T2283] CPU: 1 PID: 2283 Comm: syz.4.614 Tainted: G W syzkaller #0 [ 78.226960][ T2283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 78.237046][ T2283] Call Trace: [ 78.240351][ T2283] __dump_stack+0x21/0x24 [ 78.244692][ T2283] dump_stack_lvl+0x169/0x1d8 [ 78.249375][ T2283] ? show_regs_print_info+0x18/0x18 [ 78.254582][ T2283] dump_stack+0x15/0x1c [ 78.258745][ T2283] should_fail+0x3c1/0x510 [ 78.263174][ T2283] should_fail_usercopy+0x1a/0x20 [ 78.268218][ T2283] _copy_from_user+0x20/0xd0 [ 78.272819][ T2283] sock_do_ioctl+0x1b2/0x330 [ 78.277439][ T2283] ? __kasan_slab_free+0x11/0x20 [ 78.282399][ T2283] ? sock_show_fdinfo+0xa0/0xa0 [ 78.287272][ T2283] ? selinux_file_ioctl+0x377/0x480 [ 78.292479][ T2283] ? mutex_trylock+0xa0/0xa0 [ 78.297076][ T2283] ? __fget_files+0x2c4/0x320 [ 78.301763][ T2283] sock_ioctl+0x504/0x710 [ 78.306101][ T2283] ? sock_poll+0x360/0x360 [ 78.310533][ T2283] ? __fget_files+0x2c4/0x320 [ 78.315219][ T2283] ? security_file_ioctl+0x84/0xa0 [ 78.320336][ T2283] ? sock_poll+0x360/0x360 [ 78.324762][ T2283] __se_sys_ioctl+0x121/0x1a0 [ 78.329445][ T2283] __x64_sys_ioctl+0x7b/0x90 [ 78.334047][ T2283] do_syscall_64+0x31/0x40 [ 78.338471][ T2283] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 78.344368][ T2283] RIP: 0033:0x7f0768b5d6c9 [ 78.348795][ T2283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.368405][ T2283] RSP: 002b:00007f07675c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 78.376927][ T2283] RAX: ffffffffffffffda RBX: 00007f0768db3fa0 RCX: 00007f0768b5d6c9 [ 78.384902][ T2283] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 78.392882][ T2283] RBP: 00007f07675c5090 R08: 0000000000000000 R09: 0000000000000000 [ 78.400858][ T2283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.408838][ T2283] R13: 00007f0768db4038 R14: 00007f0768db3fa0 R15: 00007ffd115e8cc8 [ 78.883753][ T2285] device syzkaller0 entered promiscuous mode [ 79.045875][ T2299] device veth0_vlan left promiscuous mode [ 79.062287][ T2299] device veth0_vlan entered promiscuous mode [ 79.079809][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.088248][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.095860][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.493705][ T24] audit: type=1400 audit(1762221575.430:149): avc: denied { create } for pid=2323 comm="syz.4.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 79.865577][ T2332] device pim6reg1 entered promiscuous mode [ 80.248950][ T2342] device pim6reg1 entered promiscuous mode [ 80.378453][ T2346] device sit0 left promiscuous mode [ 80.819612][ T2349] device sit0 entered promiscuous mode [ 81.621277][ T2385] device syzkaller0 entered promiscuous mode [ 82.182277][ T2393] device veth0_vlan left promiscuous mode [ 82.206118][ T2393] device veth0_vlan entered promiscuous mode [ 82.299975][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.313453][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.348508][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 82.369113][ T2399] FAULT_INJECTION: forcing a failure. [ 82.369113][ T2399] name failslab, interval 1, probability 0, space 0, times 0 [ 82.392287][ T2399] CPU: 1 PID: 2399 Comm: syz.4.649 Tainted: G W syzkaller #0 [ 82.400991][ T2399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 82.411063][ T2399] Call Trace: [ 82.414375][ T2399] __dump_stack+0x21/0x24 [ 82.418731][ T2399] dump_stack_lvl+0x169/0x1d8 [ 82.423426][ T2399] ? thaw_kernel_threads+0x220/0x220 [ 82.428737][ T2399] ? show_regs_print_info+0x18/0x18 [ 82.433957][ T2399] dump_stack+0x15/0x1c [ 82.438134][ T2399] should_fail+0x3c1/0x510 [ 82.442653][ T2399] ? kvmalloc_node+0x88/0x130 [ 82.447343][ T2399] __should_failslab+0xa4/0xe0 [ 82.452126][ T2399] should_failslab+0x9/0x20 [ 82.456746][ T2399] __kmalloc+0x60/0x330 [ 82.460920][ T2399] ? kvmalloc_node+0x88/0x130 [ 82.465616][ T2399] kvmalloc_node+0x88/0x130 [ 82.470130][ T2399] pfifo_fast_init+0x260/0x7a0 [ 82.475004][ T2399] qdisc_create_dflt+0x136/0x3a0 [ 82.479955][ T2399] dev_activate+0x292/0x11c0 [ 82.484559][ T2399] __dev_open+0x3aa/0x4c0 [ 82.488910][ T2399] ? dev_open+0x230/0x230 [ 82.493253][ T2399] ? _raw_spin_unlock_bh+0x51/0x60 [ 82.498371][ T2399] ? dev_set_rx_mode+0x212/0x2c0 [ 82.503319][ T2399] ? __kasan_check_read+0x11/0x20 [ 82.508352][ T2399] __dev_change_flags+0x20a/0x6a0 [ 82.513391][ T2399] ? dev_get_flags+0x1e0/0x1e0 [ 82.518167][ T2399] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 82.524937][ T2399] dev_change_flags+0x88/0x1a0 [ 82.529730][ T2399] dev_ifsioc+0x113/0xa50 [ 82.534158][ T2399] ? dev_ioctl+0xb80/0xb80 [ 82.538585][ T2399] dev_ioctl+0x550/0xb80 [ 82.542842][ T2399] sock_do_ioctl+0x235/0x330 [ 82.547441][ T2399] ? __kasan_slab_free+0x11/0x20 [ 82.552385][ T2399] ? sock_show_fdinfo+0xa0/0xa0 [ 82.557245][ T2399] ? selinux_file_ioctl+0x377/0x480 [ 82.562455][ T2399] ? mutex_trylock+0xa0/0xa0 [ 82.567051][ T2399] ? __fget_files+0x2c4/0x320 [ 82.571735][ T2399] sock_ioctl+0x504/0x710 [ 82.576065][ T2399] ? sock_poll+0x360/0x360 [ 82.580480][ T2399] ? __fget_files+0x2c4/0x320 [ 82.585157][ T2399] ? security_file_ioctl+0x84/0xa0 [ 82.590264][ T2399] ? sock_poll+0x360/0x360 [ 82.594679][ T2399] __se_sys_ioctl+0x121/0x1a0 [ 82.599349][ T2399] __x64_sys_ioctl+0x7b/0x90 [ 82.603934][ T2399] do_syscall_64+0x31/0x40 [ 82.608348][ T2399] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 82.614235][ T2399] RIP: 0033:0x7f0768b5d6c9 [ 82.618646][ T2399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.638240][ T2399] RSP: 002b:00007f07675a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 82.646662][ T2399] RAX: ffffffffffffffda RBX: 00007f0768db4090 RCX: 00007f0768b5d6c9 [ 82.654647][ T2399] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 000000000000000b [ 82.662611][ T2399] RBP: 00007f07675a4090 R08: 0000000000000000 R09: 0000000000000000 [ 82.670574][ T2399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.678550][ T2399] R13: 00007f0768db4128 R14: 00007f0768db4090 R15: 00007ffd115e8cc8 [ 82.687026][ T2399] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 82.703829][ T2399] device pim6reg1 entered promiscuous mode [ 82.819826][ T2410] device wg2 left promiscuous mode [ 83.069184][ T2416] device pim6reg1 entered promiscuous mode [ 83.457977][ T2441] device syzkaller0 entered promiscuous mode [ 83.772351][ T2460] device pim6reg1 entered promiscuous mode [ 83.783027][ T2460] FAULT_INJECTION: forcing a failure. [ 83.783027][ T2460] name failslab, interval 1, probability 0, space 0, times 0 [ 83.795890][ T2460] CPU: 1 PID: 2460 Comm: syz.3.668 Tainted: G W syzkaller #0 [ 83.804571][ T2460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 83.814649][ T2460] Call Trace: [ 83.817943][ T2460] __dump_stack+0x21/0x24 [ 83.822306][ T2460] dump_stack_lvl+0x169/0x1d8 [ 83.827073][ T2460] ? thaw_kernel_threads+0x220/0x220 [ 83.832356][ T2460] ? skb_put+0x10e/0x1f0 [ 83.836598][ T2460] ? show_regs_print_info+0x18/0x18 [ 83.841795][ T2460] ? nla_put+0x142/0x1f0 [ 83.846033][ T2460] ? skb_trim+0x8d/0x1a0 [ 83.850265][ T2460] dump_stack+0x15/0x1c [ 83.854409][ T2460] should_fail+0x3c1/0x510 [ 83.858824][ T2460] ? netlink_trim+0x193/0x230 [ 83.863532][ T2460] __should_failslab+0xa4/0xe0 [ 83.868288][ T2460] should_failslab+0x9/0x20 [ 83.872817][ T2460] __kmalloc_track_caller+0x5f/0x320 [ 83.878097][ T2460] ? netlink_trim+0x193/0x230 [ 83.882768][ T2460] pskb_expand_head+0x123/0x1110 [ 83.887702][ T2460] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 83.893162][ T2460] netlink_trim+0x193/0x230 [ 83.897656][ T2460] netlink_broadcast_filtered+0x78/0x1270 [ 83.903369][ T2460] ? __kmalloc_track_caller+0x181/0x320 [ 83.908934][ T2460] ? kasan_unpoison+0x67/0x90 [ 83.913606][ T2460] ? __kasan_check_write+0x14/0x20 [ 83.918712][ T2460] ? rtmsg_ifinfo_build_skb+0xd8/0x180 [ 83.924160][ T2460] nlmsg_notify+0xed/0x1b0 [ 83.928562][ T2460] rtmsg_ifinfo+0xea/0x130 [ 83.932997][ T2460] __dev_notify_flags+0xdb/0x500 [ 83.937942][ T2460] ? __dev_change_flags+0x6a0/0x6a0 [ 83.943140][ T2460] ? __dev_change_flags+0x513/0x6a0 [ 83.948341][ T2460] ? dev_get_flags+0x1e0/0x1e0 [ 83.953111][ T2460] ? selinux_capable+0x29c/0x380 [ 83.958052][ T2460] ? selinux_capset+0xf0/0xf0 [ 83.962734][ T2460] dev_change_flags+0xe8/0x1a0 [ 83.967530][ T2460] dev_ifsioc+0x113/0xa50 [ 83.971860][ T2460] ? dev_ioctl+0xb80/0xb80 [ 83.976276][ T2460] dev_ioctl+0x550/0xb80 [ 83.980508][ T2460] sock_do_ioctl+0x235/0x330 [ 83.985085][ T2460] ? __kasan_slab_free+0x11/0x20 [ 83.990028][ T2460] ? sock_show_fdinfo+0xa0/0xa0 [ 83.994867][ T2460] ? selinux_file_ioctl+0x377/0x480 [ 84.000139][ T2460] ? mutex_trylock+0xa0/0xa0 [ 84.004723][ T2460] ? __fget_files+0x2c4/0x320 [ 84.009402][ T2460] sock_ioctl+0x504/0x710 [ 84.013724][ T2460] ? sock_poll+0x360/0x360 [ 84.018165][ T2460] ? __fget_files+0x2c4/0x320 [ 84.022835][ T2460] ? security_file_ioctl+0x84/0xa0 [ 84.027934][ T2460] ? sock_poll+0x360/0x360 [ 84.032342][ T2460] __se_sys_ioctl+0x121/0x1a0 [ 84.037008][ T2460] __x64_sys_ioctl+0x7b/0x90 [ 84.041591][ T2460] do_syscall_64+0x31/0x40 [ 84.045997][ T2460] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 84.051885][ T2460] RIP: 0033:0x7f93c1c3b6c9 [ 84.056295][ T2460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 84.075882][ T2460] RSP: 002b:00007f93c06a3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 84.084288][ T2460] RAX: ffffffffffffffda RBX: 00007f93c1e91fa0 RCX: 00007f93c1c3b6c9 [ 84.092279][ T2460] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 000000000000000b [ 84.100245][ T2460] RBP: 00007f93c06a3090 R08: 0000000000000000 R09: 0000000000000000 [ 84.108205][ T2460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.116210][ T2460] R13: 00007f93c1e92038 R14: 00007f93c1e91fa0 R15: 00007fff43d2b048 [ 85.289939][ T2503] device pim6reg1 entered promiscuous mode [ 85.302753][ T2503] FAULT_INJECTION: forcing a failure. [ 85.302753][ T2503] name failslab, interval 1, probability 0, space 0, times 0 [ 85.343719][ T2503] CPU: 1 PID: 2503 Comm: syz.2.681 Tainted: G W syzkaller #0 [ 85.352434][ T2503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 85.362498][ T2503] Call Trace: [ 85.365807][ T2503] __dump_stack+0x21/0x24 [ 85.370164][ T2503] dump_stack_lvl+0x169/0x1d8 [ 85.374854][ T2503] ? thaw_kernel_threads+0x220/0x220 [ 85.380160][ T2503] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 85.385634][ T2503] ? show_regs_print_info+0x18/0x18 [ 85.390852][ T2503] ? ____kasan_slab_free+0x130/0x160 [ 85.396146][ T2503] dump_stack+0x15/0x1c [ 85.400309][ T2503] should_fail+0x3c1/0x510 [ 85.404745][ T2503] ? ____ip_mc_inc_group+0x190/0x820 [ 85.410035][ T2503] __should_failslab+0xa4/0xe0 [ 85.414805][ T2503] should_failslab+0x9/0x20 [ 85.419308][ T2503] kmem_cache_alloc_trace+0x3a/0x2e0 [ 85.424601][ T2503] ____ip_mc_inc_group+0x190/0x820 [ 85.429715][ T2503] ip_mc_up+0x112/0x1f0 [ 85.433872][ T2503] inetdev_event+0xc13/0x1030 [ 85.438556][ T2503] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 85.444364][ T2503] ? devinet_exit_net+0x220/0x220 [ 85.449400][ T2503] ? __kasan_check_write+0x14/0x20 [ 85.454532][ T2503] raw_notifier_call_chain+0x90/0x100 [ 85.459915][ T2503] __dev_notify_flags+0x28f/0x500 [ 85.464939][ T2503] ? __dev_change_flags+0x6a0/0x6a0 [ 85.470140][ T2503] ? __dev_change_flags+0x513/0x6a0 [ 85.475353][ T2503] ? dev_get_flags+0x1e0/0x1e0 [ 85.480122][ T2503] ? selinux_capable+0x29c/0x380 [ 85.485064][ T2503] ? selinux_capset+0xf0/0xf0 [ 85.489749][ T2503] dev_change_flags+0xe8/0x1a0 [ 85.494511][ T2503] dev_ifsioc+0x113/0xa50 [ 85.498844][ T2503] ? dev_ioctl+0xb80/0xb80 [ 85.503271][ T2503] dev_ioctl+0x550/0xb80 [ 85.507533][ T2503] sock_do_ioctl+0x235/0x330 [ 85.512172][ T2503] ? sock_show_fdinfo+0xa0/0xa0 [ 85.517035][ T2503] ? selinux_file_ioctl+0x377/0x480 [ 85.522234][ T2503] ? mutex_trylock+0xa0/0xa0 [ 85.526857][ T2503] ? __fget_files+0x2c4/0x320 [ 85.531538][ T2503] sock_ioctl+0x504/0x710 [ 85.535874][ T2503] ? sock_poll+0x360/0x360 [ 85.540289][ T2503] ? __fget_files+0x2c4/0x320 [ 85.544970][ T2503] ? security_file_ioctl+0x84/0xa0 [ 85.550081][ T2503] ? sock_poll+0x360/0x360 [ 85.554520][ T2503] __se_sys_ioctl+0x121/0x1a0 [ 85.559201][ T2503] __x64_sys_ioctl+0x7b/0x90 [ 85.563789][ T2503] do_syscall_64+0x31/0x40 [ 85.568209][ T2503] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 85.574097][ T2503] RIP: 0033:0x7fe165a296c9 [ 85.578533][ T2503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.598145][ T2503] RSP: 002b:00007fe164491038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 85.606575][ T2503] RAX: ffffffffffffffda RBX: 00007fe165c7ffa0 RCX: 00007fe165a296c9 [ 85.614565][ T2503] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 000000000000000b [ 85.622540][ T2503] RBP: 00007fe164491090 R08: 0000000000000000 R09: 0000000000000000 [ 85.630529][ T2503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.638515][ T2503] R13: 00007fe165c80038 R14: 00007fe165c7ffa0 R15: 00007ffe55acab08 [ 86.517678][ T2528] FAULT_INJECTION: forcing a failure. [ 86.517678][ T2528] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.530751][ T2528] CPU: 0 PID: 2528 Comm: syz.3.689 Tainted: G W syzkaller #0 [ 86.539408][ T2528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 86.549448][ T2528] Call Trace: [ 86.552729][ T2528] __dump_stack+0x21/0x24 [ 86.557043][ T2528] dump_stack_lvl+0x169/0x1d8 [ 86.561702][ T2528] ? thaw_kernel_threads+0x220/0x220 [ 86.566972][ T2528] ? show_regs_print_info+0x18/0x18 [ 86.572158][ T2528] ? __update_load_avg_cfs_rq+0xaf/0x2f0 [ 86.577768][ T2528] dump_stack+0x15/0x1c [ 86.581905][ T2528] should_fail+0x3c1/0x510 [ 86.586317][ T2528] should_fail_usercopy+0x1a/0x20 [ 86.591322][ T2528] strncpy_from_user+0x24/0x2e0 [ 86.596148][ T2528] ? update_load_avg+0x4dc/0x14f0 [ 86.601153][ T2528] strncpy_from_user_nofault+0x73/0x150 [ 86.606680][ T2528] bpf_probe_read_user_str+0x2a/0x70 [ 86.611947][ T2528] bpf_prog_bc7c5c6b9645592f+0x35/0x4f4 [ 86.617486][ T2528] bpf_trace_run3+0xcb/0x230 [ 86.622066][ T2528] ? bpf_trace_run2+0x200/0x200 [ 86.626904][ T2528] ? __this_cpu_preempt_check+0x13/0x20 [ 86.632436][ T2528] ? tracing_record_taskinfo_sched_switch+0x80/0x3a0 [ 86.639095][ T2528] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 86.645417][ T2528] __bpf_trace_sched_switch+0xb/0x10 [ 86.650706][ T2528] __traceiter_sched_switch+0x85/0xc0 [ 86.656059][ T2528] __schedule+0x10a2/0x1310 [ 86.660547][ T2528] ? release_firmware_map_entry+0x190/0x190 [ 86.666422][ T2528] ? __mutex_add_waiter+0xc7/0x270 [ 86.671538][ T2528] ? __kasan_check_write+0x14/0x20 [ 86.676633][ T2528] ? atomic_dec_and_mutex_lock+0x190/0x190 [ 86.682422][ T2528] schedule+0x13c/0x1d0 [ 86.686562][ T2528] schedule_preempt_disabled+0x13/0x20 [ 86.692008][ T2528] __mutex_lock+0x6c0/0xc50 [ 86.696494][ T2528] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 86.703243][ T2528] __mutex_lock_slowpath+0xe/0x10 [ 86.708266][ T2528] mutex_lock+0xcf/0xe0 [ 86.712402][ T2528] ? mutex_trylock+0xa0/0xa0 [ 86.716975][ T2528] rtnl_lock+0x15/0x20 [ 86.721027][ T2528] dev_ioctl+0x542/0xb80 [ 86.725254][ T2528] sock_do_ioctl+0x235/0x330 [ 86.729822][ T2528] ? __kasan_slab_free+0x11/0x20 [ 86.734755][ T2528] ? sock_show_fdinfo+0xa0/0xa0 [ 86.739586][ T2528] ? selinux_file_ioctl+0x377/0x480 [ 86.744763][ T2528] ? mutex_trylock+0xa0/0xa0 [ 86.749534][ T2528] ? __fget_files+0x2c4/0x320 [ 86.754211][ T2528] sock_ioctl+0x504/0x710 [ 86.758529][ T2528] ? sock_poll+0x360/0x360 [ 86.762934][ T2528] ? __fget_files+0x2c4/0x320 [ 86.767604][ T2528] ? security_file_ioctl+0x84/0xa0 [ 86.772703][ T2528] ? sock_poll+0x360/0x360 [ 86.777102][ T2528] __se_sys_ioctl+0x121/0x1a0 [ 86.781762][ T2528] __x64_sys_ioctl+0x7b/0x90 [ 86.786335][ T2528] do_syscall_64+0x31/0x40 [ 86.790734][ T2528] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 86.796643][ T2528] RIP: 0033:0x7f93c1c3b6c9 [ 86.801042][ T2528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.820643][ T2528] RSP: 002b:00007f93c0682038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 86.829035][ T2528] RAX: ffffffffffffffda RBX: 00007f93c1e92090 RCX: 00007f93c1c3b6c9 [ 86.836995][ T2528] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 86.844949][ T2528] RBP: 00007f93c0682090 R08: 0000000000000000 R09: 0000000000000000 [ 86.852903][ T2528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.860860][ T2528] R13: 00007f93c1e92128 R14: 00007f93c1e92090 R15: 00007fff43d2b048 [ 86.926554][ T2528] device pim6reg1 entered promiscuous mode [ 86.964962][ T2530] device syzkaller0 entered promiscuous mode [ 87.262907][ T2537] device pim6reg1 entered promiscuous mode [ 87.626245][ T2556] ÿÿÿÿÿÿ: renamed from vlan1 [ 87.797049][ T2565] device veth0_vlan left promiscuous mode [ 87.827362][ T2565] device veth0_vlan entered promiscuous mode [ 87.883816][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.899293][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.907003][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 88.207102][ T2572] device pim6reg1 entered promiscuous mode [ 88.253523][ T2572] FAULT_INJECTION: forcing a failure. [ 88.253523][ T2572] name failslab, interval 1, probability 0, space 0, times 0 [ 88.311712][ T2572] CPU: 1 PID: 2572 Comm: syz.4.703 Tainted: G W syzkaller #0 [ 88.320418][ T2572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 88.330482][ T2572] Call Trace: [ 88.333793][ T2572] __dump_stack+0x21/0x24 [ 88.338147][ T2572] dump_stack_lvl+0x169/0x1d8 [ 88.342851][ T2572] ? thaw_kernel_threads+0x220/0x220 [ 88.348152][ T2572] ? wake_up_klogd+0xbe/0xf0 [ 88.352750][ T2572] ? show_regs_print_info+0x18/0x18 [ 88.357971][ T2572] ? vprintk_emit+0x26a/0x320 [ 88.362654][ T2572] ? __kmalloc+0x1a7/0x330 [ 88.367100][ T2572] dump_stack+0x15/0x1c [ 88.371276][ T2572] should_fail+0x3c1/0x510 [ 88.375737][ T2572] ? __alloc_skb+0x9e/0x520 [ 88.380245][ T2572] __should_failslab+0xa4/0xe0 [ 88.385017][ T2572] should_failslab+0x9/0x20 [ 88.389529][ T2572] kmem_cache_alloc+0x3d/0x2e0 [ 88.394304][ T2572] __alloc_skb+0x9e/0x520 [ 88.398636][ T2572] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 88.403942][ T2572] rtmsg_ifinfo+0x7a/0x130 [ 88.408366][ T2572] __dev_notify_flags+0xdb/0x500 [ 88.413313][ T2572] ? __dev_change_flags+0x6a0/0x6a0 [ 88.418520][ T2572] ? __dev_change_flags+0x513/0x6a0 [ 88.423720][ T2572] ? dev_get_flags+0x1e0/0x1e0 [ 88.428481][ T2572] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 88.435237][ T2572] dev_change_flags+0xe8/0x1a0 [ 88.439986][ T2572] dev_ifsioc+0x113/0xa50 [ 88.444304][ T2572] ? dev_ioctl+0xb80/0xb80 [ 88.448707][ T2572] dev_ioctl+0x550/0xb80 [ 88.452937][ T2572] sock_do_ioctl+0x235/0x330 [ 88.457522][ T2572] ? sock_show_fdinfo+0xa0/0xa0 [ 88.462365][ T2572] ? selinux_file_ioctl+0x377/0x480 [ 88.467554][ T2572] ? mutex_trylock+0xa0/0xa0 [ 88.472136][ T2572] ? __fget_files+0x2c4/0x320 [ 88.476821][ T2572] sock_ioctl+0x504/0x710 [ 88.481142][ T2572] ? sock_poll+0x360/0x360 [ 88.485550][ T2572] ? __fget_files+0x2c4/0x320 [ 88.490222][ T2572] ? security_file_ioctl+0x84/0xa0 [ 88.495326][ T2572] ? sock_poll+0x360/0x360 [ 88.499835][ T2572] __se_sys_ioctl+0x121/0x1a0 [ 88.504505][ T2572] __x64_sys_ioctl+0x7b/0x90 [ 88.509085][ T2572] do_syscall_64+0x31/0x40 [ 88.513496][ T2572] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 88.519379][ T2572] RIP: 0033:0x7f0768b5d6c9 [ 88.523871][ T2572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 88.543567][ T2572] RSP: 002b:00007f07675c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 88.551980][ T2572] RAX: ffffffffffffffda RBX: 00007f0768db3fa0 RCX: 00007f0768b5d6c9 [ 88.559945][ T2572] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 88.567906][ T2572] RBP: 00007f07675c5090 R08: 0000000000000000 R09: 0000000000000000 [ 88.575889][ T2572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 88.583856][ T2572] R13: 00007f0768db4038 R14: 00007f0768db3fa0 R15: 00007ffd115e8cc8 [ 89.089652][ T24] audit: type=1400 audit(1762221585.020:150): avc: denied { create } for pid=2623 comm="syz.2.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 89.181075][ T2626] device veth0_vlan left promiscuous mode [ 89.237732][ T2626] device veth0_vlan entered promiscuous mode [ 89.311607][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.323720][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.331310][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.047218][ T2667] device sit0 left promiscuous mode [ 90.105831][ T2667] device sit0 entered promiscuous mode [ 90.434812][ T2691] device pim6reg1 entered promiscuous mode [ 90.512276][ T2691] FAULT_INJECTION: forcing a failure. [ 90.512276][ T2691] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 90.525521][ T2691] CPU: 0 PID: 2691 Comm: syz.1.737 Tainted: G W syzkaller #0 [ 90.534201][ T2691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 90.544259][ T2691] Call Trace: [ 90.547563][ T2691] __dump_stack+0x21/0x24 [ 90.551900][ T2691] dump_stack_lvl+0x169/0x1d8 [ 90.556587][ T2691] ? show_regs_print_info+0x18/0x18 [ 90.561797][ T2691] ? stack_trace_save+0x98/0xe0 [ 90.566667][ T2691] ? stack_trace_snprint+0xf0/0xf0 [ 90.571874][ T2691] dump_stack+0x15/0x1c [ 90.576033][ T2691] should_fail+0x3c1/0x510 [ 90.580455][ T2691] should_fail_alloc_page+0x4f/0x60 [ 90.585665][ T2691] __alloc_pages_nodemask+0x109/0x5f0 [ 90.591052][ T2691] ? __dev_notify_flags+0xdb/0x500 [ 90.596182][ T2691] ? dev_change_flags+0xe8/0x1a0 [ 90.601128][ T2691] ? dev_ioctl+0x550/0xb80 [ 90.605550][ T2691] ? sock_do_ioctl+0x235/0x330 [ 90.610316][ T2691] ? sock_ioctl+0x504/0x710 [ 90.614827][ T2691] ? __se_sys_ioctl+0x121/0x1a0 [ 90.619682][ T2691] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 90.625239][ T2691] new_slab+0x84/0x3f0 [ 90.629331][ T2691] ___slab_alloc+0x2a6/0x450 [ 90.634017][ T2691] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 90.639483][ T2691] __slab_alloc+0x63/0xa0 [ 90.643820][ T2691] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 90.649311][ T2691] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 90.654774][ T2691] __kmalloc_track_caller+0x1ef/0x320 [ 90.660153][ T2691] ? kmem_cache_alloc+0x165/0x2e0 [ 90.665180][ T2691] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 90.670637][ T2691] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 90.676084][ T2691] __alloc_skb+0xdc/0x520 [ 90.680440][ T2691] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 90.685714][ T2691] rtmsg_ifinfo+0x7a/0x130 [ 90.690122][ T2691] __dev_notify_flags+0xdb/0x500 [ 90.695047][ T2691] ? __dev_change_flags+0x6a0/0x6a0 [ 90.700252][ T2691] ? __dev_change_flags+0x513/0x6a0 [ 90.705463][ T2691] ? dev_get_flags+0x1e0/0x1e0 [ 90.710235][ T2691] ? selinux_capable+0x29c/0x380 [ 90.715171][ T2691] ? selinux_capset+0xf0/0xf0 [ 90.719844][ T2691] dev_change_flags+0xe8/0x1a0 [ 90.724621][ T2691] dev_ifsioc+0x113/0xa50 [ 90.728944][ T2691] ? dev_ioctl+0xb80/0xb80 [ 90.733357][ T2691] dev_ioctl+0x550/0xb80 [ 90.737614][ T2691] sock_do_ioctl+0x235/0x330 [ 90.742194][ T2691] ? __bpf_trace_kmem_free+0x6f/0x90 [ 90.747467][ T2691] ? sock_show_fdinfo+0xa0/0xa0 [ 90.752339][ T2691] ? selinux_file_ioctl+0x377/0x480 [ 90.757529][ T2691] ? mutex_trylock+0xa0/0xa0 [ 90.762107][ T2691] ? __fget_files+0x2c4/0x320 [ 90.766776][ T2691] sock_ioctl+0x504/0x710 [ 90.771151][ T2691] ? sock_poll+0x360/0x360 [ 90.775557][ T2691] ? __fget_files+0x2c4/0x320 [ 90.780243][ T2691] ? security_file_ioctl+0x84/0xa0 [ 90.785511][ T2691] ? sock_poll+0x360/0x360 [ 90.789931][ T2691] __se_sys_ioctl+0x121/0x1a0 [ 90.794620][ T2691] __x64_sys_ioctl+0x7b/0x90 [ 90.799312][ T2691] do_syscall_64+0x31/0x40 [ 90.803747][ T2691] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 90.809650][ T2691] RIP: 0033:0x7fc0125e46c9 [ 90.814081][ T2691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.833695][ T2691] RSP: 002b:00007fc01104c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 90.842200][ T2691] RAX: ffffffffffffffda RBX: 00007fc01283afa0 RCX: 00007fc0125e46c9 [ 90.850166][ T2691] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 90.858169][ T2691] RBP: 00007fc01104c090 R08: 0000000000000000 R09: 0000000000000000 [ 90.866176][ T2691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.874143][ T2691] R13: 00007fc01283b038 R14: 00007fc01283afa0 R15: 00007ffe59810958 [ 92.336989][ T2736] device syzkaller0 entered promiscuous mode [ 92.354868][ T2743] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.363124][ T2743] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.463768][ T2745] device bridge_slave_1 left promiscuous mode [ 92.470044][ T2745] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.477613][ T2745] device bridge_slave_0 left promiscuous mode [ 92.483977][ T2745] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.544473][ T2746] device veth0_vlan left promiscuous mode [ 92.558862][ T2746] device veth0_vlan entered promiscuous mode [ 92.789533][ T2764] device pim6reg1 entered promiscuous mode [ 93.293214][ T2779] device pim6reg1 entered promiscuous mode [ 93.315747][ T2779] FAULT_INJECTION: forcing a failure. [ 93.315747][ T2779] name failslab, interval 1, probability 0, space 0, times 0 [ 93.420398][ T2779] CPU: 1 PID: 2779 Comm: syz.0.763 Tainted: G W syzkaller #0 [ 93.429101][ T2779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 93.439165][ T2779] Call Trace: [ 93.442490][ T2779] __dump_stack+0x21/0x24 [ 93.446855][ T2779] dump_stack_lvl+0x169/0x1d8 [ 93.451537][ T2779] ? thaw_kernel_threads+0x220/0x220 [ 93.456827][ T2779] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 93.462298][ T2779] ? show_regs_print_info+0x18/0x18 [ 93.467503][ T2779] ? ____kasan_slab_free+0x130/0x160 [ 93.472971][ T2779] dump_stack+0x15/0x1c [ 93.477133][ T2779] should_fail+0x3c1/0x510 [ 93.481560][ T2779] ? ____ip_mc_inc_group+0x190/0x820 [ 93.486865][ T2779] __should_failslab+0xa4/0xe0 [ 93.491631][ T2779] should_failslab+0x9/0x20 [ 93.496142][ T2779] kmem_cache_alloc_trace+0x3a/0x2e0 [ 93.501434][ T2779] ____ip_mc_inc_group+0x190/0x820 [ 93.506562][ T2779] ip_mc_up+0x112/0x1f0 [ 93.510747][ T2779] inetdev_event+0xc13/0x1030 [ 93.515439][ T2779] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 93.521250][ T2779] ? devinet_exit_net+0x220/0x220 [ 93.526285][ T2779] ? __kasan_check_write+0x14/0x20 [ 93.531417][ T2779] raw_notifier_call_chain+0x90/0x100 [ 93.536799][ T2779] __dev_notify_flags+0x28f/0x500 [ 93.541838][ T2779] ? __dev_change_flags+0x6a0/0x6a0 [ 93.547049][ T2779] ? __dev_change_flags+0x513/0x6a0 [ 93.552269][ T2779] ? dev_get_flags+0x1e0/0x1e0 [ 93.557058][ T2779] ? selinux_capable+0x29c/0x380 [ 93.562001][ T2779] ? selinux_capset+0xf0/0xf0 [ 93.566693][ T2779] dev_change_flags+0xe8/0x1a0 [ 93.571465][ T2779] dev_ifsioc+0x113/0xa50 [ 93.575797][ T2779] ? dev_ioctl+0xb80/0xb80 [ 93.580217][ T2779] dev_ioctl+0x550/0xb80 [ 93.584462][ T2779] sock_do_ioctl+0x235/0x330 [ 93.589077][ T2779] ? sock_show_fdinfo+0xa0/0xa0 [ 93.593949][ T2779] ? selinux_file_ioctl+0x377/0x480 [ 93.599150][ T2779] ? mutex_trylock+0xa0/0xa0 [ 93.603737][ T2779] ? __fget_files+0x2c4/0x320 [ 93.608412][ T2779] sock_ioctl+0x504/0x710 [ 93.612742][ T2779] ? sock_poll+0x360/0x360 [ 93.617162][ T2779] ? __fget_files+0x2c4/0x320 [ 93.621850][ T2779] ? security_file_ioctl+0x84/0xa0 [ 93.626969][ T2779] ? sock_poll+0x360/0x360 [ 93.631389][ T2779] __se_sys_ioctl+0x121/0x1a0 [ 93.636067][ T2779] __x64_sys_ioctl+0x7b/0x90 [ 93.640657][ T2779] do_syscall_64+0x31/0x40 [ 93.645092][ T2779] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 93.650980][ T2779] RIP: 0033:0x7fa96cdac6c9 [ 93.655394][ T2779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.675210][ T2779] RSP: 002b:00007fa96b814038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 93.683708][ T2779] RAX: ffffffffffffffda RBX: 00007fa96d002fa0 RCX: 00007fa96cdac6c9 [ 93.691672][ T2779] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 93.699638][ T2779] RBP: 00007fa96b814090 R08: 0000000000000000 R09: 0000000000000000 [ 93.707600][ T2779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.715561][ T2779] R13: 00007fa96d003038 R14: 00007fa96d002fa0 R15: 00007ffdd29f3f08 [ 93.746606][ T2786] device pim6reg1 entered promiscuous mode [ 94.057004][ T2806] device syzkaller0 entered promiscuous mode [ 94.330441][ T2812] syz.2.772[2812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.330532][ T2812] syz.2.772[2812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.884022][ T2826] device syzkaller0 entered promiscuous mode [ 95.470482][ T2851] device pim6reg1 entered promiscuous mode [ 95.517261][ T2851] FAULT_INJECTION: forcing a failure. [ 95.517261][ T2851] name failslab, interval 1, probability 0, space 0, times 0 [ 95.529975][ T2851] CPU: 1 PID: 2851 Comm: syz.0.795 Tainted: G W syzkaller #0 [ 95.538673][ T2851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 95.548766][ T2851] Call Trace: [ 95.552070][ T2851] __dump_stack+0x21/0x24 [ 95.556405][ T2851] dump_stack_lvl+0x169/0x1d8 [ 95.561092][ T2851] ? thaw_kernel_threads+0x220/0x220 [ 95.566401][ T2851] ? show_regs_print_info+0x18/0x18 [ 95.571609][ T2851] ? pcpu_alloc+0xf8a/0x16b0 [ 95.576314][ T2851] dump_stack+0x15/0x1c [ 95.580480][ T2851] should_fail+0x3c1/0x510 [ 95.584909][ T2851] ? __alloc_skb+0x9e/0x520 [ 95.589423][ T2851] __should_failslab+0xa4/0xe0 [ 95.594189][ T2851] should_failslab+0x9/0x20 [ 95.598694][ T2851] kmem_cache_alloc+0x3d/0x2e0 [ 95.603478][ T2851] __alloc_skb+0x9e/0x520 [ 95.607836][ T2851] ? ip6_route_add+0x27/0x130 [ 95.612522][ T2851] ? addrconf_notify+0x9d8/0xe90 [ 95.617465][ T2851] inet6_rt_notify+0x287/0x470 [ 95.622233][ T2851] ? __x64_sys_ioctl+0x7b/0x90 [ 95.627044][ T2851] ? do_syscall_64+0x31/0x40 [ 95.631642][ T2851] ? rt6_nh_dump_exceptions+0x690/0x690 [ 95.637193][ T2851] fib6_add+0x214b/0x3bf0 [ 95.641601][ T2851] ? skb_gro_incr_csum_unnecessary+0x270/0x270 [ 95.647770][ T2851] ? fib6_update_sernum_stub+0x190/0x190 [ 95.653427][ T2851] ? __kasan_check_write+0x14/0x20 [ 95.658557][ T2851] ? _raw_spin_lock_bh+0x8e/0xe0 [ 95.663508][ T2851] ? _raw_spin_lock_irq+0xe0/0xe0 [ 95.668581][ T2851] ip6_route_add+0x89/0x130 [ 95.673103][ T2851] addrconf_add_dev+0x329/0x430 [ 95.677963][ T2851] ? local_bh_enable+0x30/0x30 [ 95.682744][ T2851] ? igmpv3_del_delrec+0x700/0x700 [ 95.687874][ T2851] ? __local_bh_enable_ip+0x53/0x80 [ 95.693081][ T2851] ? __kasan_check_read+0x11/0x20 [ 95.698128][ T2851] addrconf_dev_config+0x1bd/0x510 [ 95.703257][ T2851] ? __kasan_check_write+0x14/0x20 [ 95.708388][ T2851] ? mutex_lock+0x8c/0xe0 [ 95.712720][ T2851] ? init_loopback+0x1c0/0x1c0 [ 95.717479][ T2851] ? macsec_notify+0xff/0x490 [ 95.722399][ T2851] ? addrconf_link_ready+0x134/0x190 [ 95.727681][ T2851] addrconf_notify+0x9d8/0xe90 [ 95.732449][ T2851] raw_notifier_call_chain+0x90/0x100 [ 95.737825][ T2851] __dev_notify_flags+0x28f/0x500 [ 95.742879][ T2851] ? __dev_change_flags+0x6a0/0x6a0 [ 95.748097][ T2851] ? __dev_change_flags+0x513/0x6a0 [ 95.753290][ T2851] ? dev_get_flags+0x1e0/0x1e0 [ 95.758049][ T2851] ? selinux_capable+0x29c/0x380 [ 95.762998][ T2851] ? selinux_capset+0xf0/0xf0 [ 95.767666][ T2851] dev_change_flags+0xe8/0x1a0 [ 95.772441][ T2851] dev_ifsioc+0x113/0xa50 [ 95.776891][ T2851] ? dev_ioctl+0xb80/0xb80 [ 95.781314][ T2851] dev_ioctl+0x550/0xb80 [ 95.785566][ T2851] sock_do_ioctl+0x235/0x330 [ 95.790152][ T2851] ? __kasan_slab_free+0x11/0x20 [ 95.795078][ T2851] ? sock_show_fdinfo+0xa0/0xa0 [ 95.799939][ T2851] ? selinux_file_ioctl+0x377/0x480 [ 95.805124][ T2851] ? mutex_trylock+0xa0/0xa0 [ 95.809707][ T2851] ? __fget_files+0x2c4/0x320 [ 95.814399][ T2851] sock_ioctl+0x504/0x710 [ 95.818716][ T2851] ? sock_poll+0x360/0x360 [ 95.823123][ T2851] ? __fget_files+0x2c4/0x320 [ 95.827792][ T2851] ? security_file_ioctl+0x84/0xa0 [ 95.832895][ T2851] ? sock_poll+0x360/0x360 [ 95.837301][ T2851] __se_sys_ioctl+0x121/0x1a0 [ 95.841967][ T2851] __x64_sys_ioctl+0x7b/0x90 [ 95.846592][ T2851] do_syscall_64+0x31/0x40 [ 95.851009][ T2851] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 95.856888][ T2851] RIP: 0033:0x7fa96cdac6c9 [ 95.861295][ T2851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.880893][ T2851] RSP: 002b:00007fa96b814038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 95.889311][ T2851] RAX: ffffffffffffffda RBX: 00007fa96d002fa0 RCX: 00007fa96cdac6c9 [ 95.897277][ T2851] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 95.905255][ T2851] RBP: 00007fa96b814090 R08: 0000000000000000 R09: 0000000000000000 [ 95.913229][ T2851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 95.921196][ T2851] R13: 00007fa96d003038 R14: 00007fa96d002fa0 R15: 00007ffdd29f3f08 [ 95.997959][ T2860] device syzkaller0 entered promiscuous mode [ 96.021260][ T2860] device pim6reg1 entered promiscuous mode [ 96.130503][ T2864] device veth0_vlan left promiscuous mode [ 96.143110][ T2864] device veth0_vlan entered promiscuous mode [ 96.188172][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.197614][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.205526][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.229416][ T2868] device pim6reg1 entered promiscuous mode [ 96.503728][ T2873] syz.2.790 uses obsolete (PF_INET,SOCK_PACKET) [ 96.568656][ T24] audit: type=1400 audit(1762221592.500:151): avc: denied { create } for pid=2871 comm="syz.2.790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 97.029284][ T2903] device pim6reg1 entered promiscuous mode [ 97.035529][ T2903] FAULT_INJECTION: forcing a failure. [ 97.035529][ T2903] name failslab, interval 1, probability 0, space 0, times 0 [ 97.048236][ T2903] CPU: 1 PID: 2903 Comm: syz.0.798 Tainted: G W syzkaller #0 [ 97.056931][ T2903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 97.067006][ T2903] Call Trace: [ 97.070329][ T2903] __dump_stack+0x21/0x24 [ 97.074670][ T2903] dump_stack_lvl+0x169/0x1d8 [ 97.079359][ T2903] ? thaw_kernel_threads+0x220/0x220 [ 97.084656][ T2903] ? show_regs_print_info+0x18/0x18 [ 97.089889][ T2903] dump_stack+0x15/0x1c [ 97.094063][ T2903] should_fail+0x3c1/0x510 [ 97.098566][ T2903] ? inet6_rt_notify+0x287/0x470 [ 97.103527][ T2903] __should_failslab+0xa4/0xe0 [ 97.108528][ T2903] should_failslab+0x9/0x20 [ 97.113036][ T2903] __kmalloc_track_caller+0x5f/0x320 [ 97.118322][ T2903] ? kmem_cache_alloc+0x165/0x2e0 [ 97.123347][ T2903] ? __alloc_skb+0x9e/0x520 [ 97.127853][ T2903] ? inet6_rt_notify+0x287/0x470 [ 97.132792][ T2903] __alloc_skb+0xdc/0x520 [ 97.137125][ T2903] ? addrconf_notify+0x9d8/0xe90 [ 97.142081][ T2903] inet6_rt_notify+0x287/0x470 [ 97.146842][ T2903] ? __x64_sys_ioctl+0x7b/0x90 [ 97.151604][ T2903] ? do_syscall_64+0x31/0x40 [ 97.156280][ T2903] ? rt6_nh_dump_exceptions+0x690/0x690 [ 97.161827][ T2903] fib6_add+0x214b/0x3bf0 [ 97.166168][ T2903] ? skb_gro_incr_csum_unnecessary+0x270/0x270 [ 97.172332][ T2903] ? fib6_update_sernum_stub+0x190/0x190 [ 97.177965][ T2903] ? __kasan_check_write+0x14/0x20 [ 97.183080][ T2903] ? _raw_spin_lock_bh+0x8e/0xe0 [ 97.188021][ T2903] ? _raw_spin_lock_irq+0xe0/0xe0 [ 97.193055][ T2903] ip6_route_add+0x89/0x130 [ 97.197558][ T2903] addrconf_add_dev+0x329/0x430 [ 97.202412][ T2903] ? local_bh_enable+0x30/0x30 [ 97.207182][ T2903] ? igmpv3_del_delrec+0x700/0x700 [ 97.212328][ T2903] ? __local_bh_enable_ip+0x53/0x80 [ 97.217533][ T2903] ? __kasan_check_read+0x11/0x20 [ 97.222559][ T2903] addrconf_dev_config+0x1bd/0x510 [ 97.227672][ T2903] ? __kasan_check_write+0x14/0x20 [ 97.232790][ T2903] ? mutex_lock+0x8c/0xe0 [ 97.237124][ T2903] ? init_loopback+0x1c0/0x1c0 [ 97.241883][ T2903] ? macsec_notify+0xff/0x490 [ 97.246568][ T2903] ? addrconf_link_ready+0x134/0x190 [ 97.251852][ T2903] addrconf_notify+0x9d8/0xe90 [ 97.256615][ T2903] raw_notifier_call_chain+0x90/0x100 [ 97.261991][ T2903] __dev_notify_flags+0x28f/0x500 [ 97.267016][ T2903] ? __dev_change_flags+0x6a0/0x6a0 [ 97.272212][ T2903] ? __dev_change_flags+0x513/0x6a0 [ 97.277446][ T2903] ? dev_get_flags+0x1e0/0x1e0 [ 97.282220][ T2903] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 97.289016][ T2903] dev_change_flags+0xe8/0x1a0 [ 97.293779][ T2903] dev_ifsioc+0x113/0xa50 [ 97.298124][ T2903] ? dev_ioctl+0xb80/0xb80 [ 97.302563][ T2903] dev_ioctl+0x550/0xb80 [ 97.306811][ T2903] sock_do_ioctl+0x235/0x330 [ 97.311406][ T2903] ? __kasan_slab_free+0x11/0x20 [ 97.316336][ T2903] ? sock_show_fdinfo+0xa0/0xa0 [ 97.321185][ T2903] ? selinux_file_ioctl+0x377/0x480 [ 97.326423][ T2903] ? mutex_trylock+0xa0/0xa0 [ 97.331014][ T2903] ? __fget_files+0x2c4/0x320 [ 97.335688][ T2903] sock_ioctl+0x504/0x710 [ 97.340011][ T2903] ? sock_poll+0x360/0x360 [ 97.344422][ T2903] ? __fget_files+0x2c4/0x320 [ 97.349097][ T2903] ? security_file_ioctl+0x84/0xa0 [ 97.354208][ T2903] ? sock_poll+0x360/0x360 [ 97.358627][ T2903] __se_sys_ioctl+0x121/0x1a0 [ 97.363307][ T2903] __x64_sys_ioctl+0x7b/0x90 [ 97.367900][ T2903] do_syscall_64+0x31/0x40 [ 97.372322][ T2903] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 97.378213][ T2903] RIP: 0033:0x7fa96cdac6c9 [ 97.382630][ T2903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.402239][ T2903] RSP: 002b:00007fa96b814038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 97.410682][ T2903] RAX: ffffffffffffffda RBX: 00007fa96d002fa0 RCX: 00007fa96cdac6c9 [ 97.418653][ T2903] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 97.426625][ T2903] RBP: 00007fa96b814090 R08: 0000000000000000 R09: 0000000000000000 [ 97.434599][ T2903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 97.442570][ T2903] R13: 00007fa96d003038 R14: 00007fa96d002fa0 R15: 00007ffdd29f3f08 [ 98.065378][ T2942] device pim6reg1 entered promiscuous mode [ 98.157853][ T2942] FAULT_INJECTION: forcing a failure. [ 98.157853][ T2942] name failslab, interval 1, probability 0, space 0, times 0 [ 98.170511][ T2942] CPU: 0 PID: 2942 Comm: syz.3.813 Tainted: G W syzkaller #0 [ 98.179200][ T2942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 98.189269][ T2942] Call Trace: [ 98.192576][ T2942] __dump_stack+0x21/0x24 [ 98.196917][ T2942] dump_stack_lvl+0x169/0x1d8 [ 98.201601][ T2942] ? thaw_kernel_threads+0x220/0x220 [ 98.206901][ T2942] ? show_regs_print_info+0x18/0x18 [ 98.212135][ T2942] dump_stack+0x15/0x1c [ 98.216324][ T2942] should_fail+0x3c1/0x510 [ 98.220760][ T2942] ? inet6_rt_notify+0x287/0x470 [ 98.225712][ T2942] __should_failslab+0xa4/0xe0 [ 98.230484][ T2942] should_failslab+0x9/0x20 [ 98.234999][ T2942] __kmalloc_track_caller+0x5f/0x320 [ 98.240299][ T2942] ? kmem_cache_alloc+0x165/0x2e0 [ 98.245334][ T2942] ? __alloc_skb+0x9e/0x520 [ 98.249845][ T2942] ? inet6_rt_notify+0x287/0x470 [ 98.254791][ T2942] __alloc_skb+0xdc/0x520 [ 98.259135][ T2942] ? addrconf_notify+0x9d8/0xe90 [ 98.264080][ T2942] inet6_rt_notify+0x287/0x470 [ 98.268854][ T2942] ? __x64_sys_ioctl+0x7b/0x90 [ 98.273626][ T2942] ? do_syscall_64+0x31/0x40 [ 98.278225][ T2942] ? rt6_nh_dump_exceptions+0x690/0x690 [ 98.283785][ T2942] fib6_add+0x214b/0x3bf0 [ 98.288135][ T2942] ? skb_gro_incr_csum_unnecessary+0x270/0x270 [ 98.294295][ T2942] ? fib6_update_sernum_stub+0x190/0x190 [ 98.299926][ T2942] ? __kasan_check_write+0x14/0x20 [ 98.305051][ T2942] ? _raw_spin_lock_bh+0x8e/0xe0 [ 98.309993][ T2942] ? _raw_spin_lock_irq+0xe0/0xe0 [ 98.315032][ T2942] ip6_route_add+0x89/0x130 [ 98.319542][ T2942] addrconf_add_dev+0x329/0x430 [ 98.324395][ T2942] ? local_bh_enable+0x30/0x30 [ 98.329189][ T2942] ? igmpv3_del_delrec+0x700/0x700 [ 98.334316][ T2942] ? __local_bh_enable_ip+0x53/0x80 [ 98.339546][ T2942] ? __kasan_check_read+0x11/0x20 [ 98.344589][ T2942] addrconf_dev_config+0x1bd/0x510 [ 98.349728][ T2942] ? __kasan_check_write+0x14/0x20 [ 98.354848][ T2942] ? mutex_lock+0x8c/0xe0 [ 98.359191][ T2942] ? init_loopback+0x1c0/0x1c0 [ 98.363971][ T2942] ? macsec_notify+0xff/0x490 [ 98.368654][ T2942] ? addrconf_link_ready+0x134/0x190 [ 98.373943][ T2942] addrconf_notify+0x9d8/0xe90 [ 98.378724][ T2942] raw_notifier_call_chain+0x90/0x100 [ 98.384101][ T2942] __dev_notify_flags+0x28f/0x500 [ 98.389142][ T2942] ? __dev_change_flags+0x6a0/0x6a0 [ 98.394352][ T2942] ? __dev_change_flags+0x513/0x6a0 [ 98.399579][ T2942] ? dev_get_flags+0x1e0/0x1e0 [ 98.404355][ T2942] ? selinux_capable+0x29c/0x380 [ 98.409302][ T2942] ? selinux_capset+0xf0/0xf0 [ 98.413987][ T2942] dev_change_flags+0xe8/0x1a0 [ 98.418765][ T2942] dev_ifsioc+0x113/0xa50 [ 98.423103][ T2942] ? dev_ioctl+0xb80/0xb80 [ 98.427570][ T2942] dev_ioctl+0x550/0xb80 [ 98.431820][ T2942] sock_do_ioctl+0x235/0x330 [ 98.436420][ T2942] ? sock_show_fdinfo+0xa0/0xa0 [ 98.441288][ T2942] ? selinux_file_ioctl+0x377/0x480 [ 98.446495][ T2942] ? mutex_trylock+0xa0/0xa0 [ 98.451086][ T2942] ? __fget_files+0x2c4/0x320 [ 98.455778][ T2942] sock_ioctl+0x504/0x710 [ 98.460122][ T2942] ? sock_poll+0x360/0x360 [ 98.464545][ T2942] ? __fget_files+0x2c4/0x320 [ 98.469232][ T2942] ? security_file_ioctl+0x84/0xa0 [ 98.474346][ T2942] ? sock_poll+0x360/0x360 [ 98.478776][ T2942] __se_sys_ioctl+0x121/0x1a0 [ 98.483475][ T2942] __x64_sys_ioctl+0x7b/0x90 [ 98.488089][ T2942] do_syscall_64+0x31/0x40 [ 98.492554][ T2942] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 98.498450][ T2942] RIP: 0033:0x7f93c1c3b6c9 [ 98.502874][ T2942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.522494][ T2942] RSP: 002b:00007f93c06a3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 98.530925][ T2942] RAX: ffffffffffffffda RBX: 00007f93c1e91fa0 RCX: 00007f93c1c3b6c9 [ 98.538913][ T2942] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 98.546915][ T2942] RBP: 00007f93c06a3090 R08: 0000000000000000 R09: 0000000000000000 [ 98.554895][ T2942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 98.562874][ T2942] R13: 00007f93c1e92038 R14: 00007f93c1e91fa0 R15: 00007fff43d2b048 [ 99.091649][ T24] audit: type=1400 audit(1762221595.010:152): avc: denied { create } for pid=2976 comm="syz.3.824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 99.115630][ T2975] device pim6reg1 entered promiscuous mode [ 99.968649][ T2999] device pim6reg1 entered promiscuous mode [ 100.103815][ T3012] device veth0_vlan left promiscuous mode [ 100.136580][ T3012] device veth0_vlan entered promiscuous mode [ 100.152550][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.281541][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.296012][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.307735][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.205043][ T3037] syz.0.840[3037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.207800][ T3037] syz.0.840[3037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.736159][ T3062] cgroup: fork rejected by pids controller in /syz0 [ 102.396929][ T3070] syz.2.851[3070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.396996][ T3070] syz.2.851[3070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.713820][ T3069] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.911682][ T3069] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.049534][ T3069] device bridge_slave_0 entered promiscuous mode [ 103.074636][ T3069] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.081778][ T3069] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.089302][ T3069] device bridge_slave_1 entered promiscuous mode [ 103.469962][ T24] audit: type=1400 audit(1762221599.400:153): avc: denied { write } for pid=3069 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 103.552189][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 103.564570][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.631286][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 103.646205][ T24] audit: type=1400 audit(1762221599.400:154): avc: denied { read } for pid=3069 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 103.686421][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.694698][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.701743][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.721919][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 103.798233][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.842699][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.849810][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.055050][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 104.062780][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 104.070870][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 104.107579][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 104.117850][ T3121] ÿÿÿÿÿÿ: renamed from vlan1 [ 104.182213][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.190353][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.197866][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.209625][ T3069] device veth0_vlan entered promiscuous mode [ 104.252487][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 104.272730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 104.298582][ T3069] device veth1_macvtap entered promiscuous mode [ 104.344858][ T320] device bridge_slave_1 left promiscuous mode [ 104.351029][ T320] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.412967][ T320] device bridge_slave_0 left promiscuous mode [ 104.435664][ T320] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.444521][ T320] device veth1_macvtap left promiscuous mode [ 104.558600][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 104.566299][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 104.575233][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.583883][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 104.592563][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.095484][ T3162] device pim6reg1 entered promiscuous mode [ 105.210509][ T3167] device sit0 entered promiscuous mode [ 105.309020][ T3180] ªªªªªª: renamed from vlan0 [ 105.726614][ T3195] device wg2 left promiscuous mode [ 105.845886][ T3206] device syzkaller0 entered promiscuous mode [ 106.240696][ T3229] device sit0 entered promiscuous mode [ 108.265802][ T24] audit: type=1400 audit(1762221604.200:155): avc: denied { associate } for pid=3269 comm="syz.3.911" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 111.756735][ T3306] device syzkaller0 entered promiscuous mode [ 114.035096][ T3356] bridge0: port 3(veth1) entered blocking state [ 114.103692][ T3356] bridge0: port 3(veth1) entered disabled state [ 114.208492][ T3356] device veth1 entered promiscuous mode [ 114.222492][ T3356] bridge0: port 3(veth1) entered blocking state [ 114.228943][ T3356] bridge0: port 3(veth1) entered forwarding state [ 114.303016][ T3357] device macsec0 entered promiscuous mode [ 114.727629][ T3364] 7B’ç÷ï: renamed from syzkaller0 [ 115.682647][ T3383] device veth1_macvtap left promiscuous mode [ 115.715928][ T3383] device macsec0 entered promiscuous mode [ 117.426085][ T3441] device sit0 left promiscuous mode [ 117.623997][ T3441] device sit0 entered promiscuous mode [ 119.152322][ T3517] device syzkaller0 left promiscuous mode [ 120.626152][ T3557] device veth0_vlan left promiscuous mode [ 120.675976][ T3557] device veth0_vlan entered promiscuous mode [ 120.720463][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.731908][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.747164][ T320] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 121.002079][ T3575] device sit0 left promiscuous mode [ 121.103267][ T3576] device sit0 entered promiscuous mode [ 121.369752][ T3578] device veth1_macvtap left promiscuous mode [ 121.394070][ T3578] device macsec0 left promiscuous mode [ 122.227308][ T3603] device pim6reg1 entered promiscuous mode [ 124.538569][ T24] audit: type=1400 audit(1762221620.470:156): avc: denied { create } for pid=3711 comm="syz.1.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 125.014277][ T24] audit: type=1400 audit(1762221620.950:157): avc: denied { create } for pid=3737 comm="syz.4.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 125.065873][ T3738] device pim6reg1 entered promiscuous mode [ 126.249829][ T3798] device veth0_vlan left promiscuous mode [ 126.287716][ T3798] device veth0_vlan entered promiscuous mode [ 126.313531][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.332545][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.351943][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.737281][ T3874] device pim6reg1 entered promiscuous mode [ 130.376335][ T3965] device pim6reg1 entered promiscuous mode [ 130.936227][ T3982] device pim6reg1 entered promiscuous mode [ 132.325876][ T4045] device pim6reg1 entered promiscuous mode [ 134.147618][ T4117] device veth0_vlan left promiscuous mode [ 134.182441][ T4117] device veth0_vlan entered promiscuous mode [ 134.240940][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.266370][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 134.308180][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.033949][ T4162] device veth0_vlan left promiscuous mode [ 135.115655][ T4162] device veth0_vlan entered promiscuous mode [ 135.272536][ T4167] device wg2 entered promiscuous mode [ 135.874552][ T4195] device sit0 left promiscuous mode [ 135.953659][ T4196] device sit0 entered promiscuous mode [ 136.354721][ T4210] device wg2 left promiscuous mode [ 136.509821][ T4215] device sit0 left promiscuous mode [ 138.140422][ T4296] bridge0: port 3(veth1) entered disabled state [ 138.146796][ T4296] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.153912][ T4296] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.194554][ T4296] device bridge0 left promiscuous mode [ 138.247598][ T4301] syz.4.1227[4301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.247658][ T4301] syz.4.1227[4301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.203132][ T4347] device sit0 entered promiscuous mode [ 140.538348][ T4435] syz.1.1268[4435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.538407][ T4435] syz.1.1268[4435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.258191][ T4459] device veth0_vlan left promiscuous mode [ 141.276065][ T4459] device veth0_vlan entered promiscuous mode [ 141.285512][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.313688][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.367754][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.530427][ T4476] device syzkaller0 entered promiscuous mode [ 141.731619][ T4491] device pim6reg1 entered promiscuous mode [ 143.152515][ T4525] device sit0 left promiscuous mode [ 143.773543][ T4551] device veth0_vlan left promiscuous mode [ 143.812045][ T4551] device veth0_vlan entered promiscuous mode [ 143.882703][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.908128][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.014141][ T276] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 144.218466][ T4560] device sit0 left promiscuous mode [ 144.319177][ T4564] device sit0 entered promiscuous mode [ 144.345313][ T4568] device syzkaller0 left promiscuous mode [ 144.664670][ T4593] device veth0_vlan left promiscuous mode [ 144.670742][ T4593] device veth0_vlan entered promiscuous mode [ 144.682870][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.692383][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.726820][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.792582][ T4598] device veth0_vlan left promiscuous mode [ 144.799138][ T4598] device veth0_vlan entered promiscuous mode [ 146.522488][ T4688] device sit0 left promiscuous mode [ 146.578284][ T4688] device sit0 entered promiscuous mode [ 146.617743][ T24] audit: type=1400 audit(1762221642.550:158): avc: denied { create } for pid=4699 comm="syz.4.1348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 147.292698][ T24] audit: type=1400 audit(1762221643.230:159): avc: denied { read } for pid=4748 comm="syz-executor" dev="nsfs" ino=4026531999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 147.329169][ T24] audit: type=1400 audit(1762221643.250:160): avc: denied { open } for pid=4748 comm="syz-executor" path="net:[4026531999]" dev="nsfs" ino=4026531999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 148.258333][ T4787] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.267704][ T4787] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.851329][ T24] audit: type=1400 audit(1762221644.780:161): avc: denied { create } for pid=4816 comm="syz.1.1384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 148.954028][ T4840] device wg2 entered promiscuous mode [ 149.373935][ T9] device bridge_slave_1 left promiscuous mode [ 149.381679][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.402670][ T9] device bridge_slave_0 left promiscuous mode [ 149.408928][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.417356][ T9] device veth0_vlan left promiscuous mode [ 154.625035][ T24] audit: type=1400 audit(1762221650.560:162): avc: denied { create } for pid=4965 comm="syz.4.1423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 154.980731][ T4987] device veth0_vlan left promiscuous mode [ 154.986928][ T4987] device veth0_vlan entered promiscuous mode [ 154.998925][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.017090][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.051843][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 156.030056][ T5001] syz.2.1431[5001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.030114][ T5001] syz.2.1431[5001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.394998][ T5060] ÿÿÿÿÿÿ: renamed from vlan1 [ 169.165337][ T5145] device veth0_vlan left promiscuous mode [ 169.195687][ T5145] device veth0_vlan entered promiscuous mode [ 169.288870][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.297487][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.309218][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 172.168442][ T5174] device veth1_macvtap left promiscuous mode [ 172.179966][ T5174] device veth1_macvtap entered promiscuous mode [ 172.232648][ T5174] device macsec0 entered promiscuous mode [ 172.238849][ T5174] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.246618][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=0 req=1357 state=3 status=67 (errno 9: Bad file descriptor) [ 177.233772][ T24] audit: type=1400 audit(1762221673.170:163): avc: denied { write } for pid=266 comm="syz-executor" path="pipe:[14306]" dev="pipefs" ino=14306 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 179.292310][ T296] device bridge_slave_1 left promiscuous mode [ 179.298429][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.305841][ T296] device bridge_slave_0 left promiscuous mode [ 179.311946][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.319552][ T296] device veth1 left promiscuous mode [ 179.324925][ T296] bridge0: port 3(veth1) entered disabled state [ 179.331417][ T296] device bridge_slave_1 left promiscuous mode [ 179.337583][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.344890][ T296] device bridge_slave_0 left promiscuous mode [ 179.350970][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.360184][ T296] device veth1_macvtap left promiscuous mode [ 179.366201][ T296] device veth0_vlan left promiscuous mode [ 179.372092][ T296] device veth1_macvtap left promiscuous mode [ 179.378166][ T296] device veth1_macvtap left promiscuous mode [ 179.384214][ T296] device veth0_vlan left promiscuous mode