last executing test programs: 11.712501461s ago: executing program 3 (id=4213): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) close(r1) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1282, 0x0) (async) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) (async, rerun: 32) write$cgroup_int(r1, &(0x7f00000001c0)=0x2, 0xffffff12) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) write$cgroup_freezer_state(r2, &(0x7f0000000180)='FREEZING\x00', 0x9) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x5, &(0x7f00000000c0)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 11.651613601s ago: executing program 3 (id=4214): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0a000000040000000800"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000f1ffffff00606900000000000000000000000000000000000000940830fd5c248e9f280555813ff8550951a8db022b57d30a838d6579b284206576ab7286c525584905baad048c38f976a15281b35729bed7d4075ab0af2c726ec29d279fdee42fa58c9c60975de3e1aa63d39c969000d8f222c9ac129fca"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES16, @ANYBLOB="d4da84650000000000000000060ac8d100190000000000000000000000b20adb5ce40ec7888ed66793f1c09c6548fa82b077de1df57a6676737ed94616b24c34c0defe0d90cc76bc9d69b1f983e4cca06e5f912851b82a31d261143ed6dc7127c048c53eb4fd6cd5b7a46b3bce232a8f4bd76cd07a548095e7c50e26f829140118214cb7a8153c4a4501c74c782ad3c33924fb087f38869c540b89f8d4b1572f9d0b83f72238de530a807c73097a2adab545b7f9ef0ea1cfee6f71dc4fe39a0ee4dc71bbc0b34a42e3557afa362dd817c385da51a737"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="fcffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001900"/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="c945efd5e67e7d71a6ff4580f725e1fc74136c9444090091", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000140000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b700000000000000950000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000040)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x10, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="9feb010018000000000000008b0000008b00000004000000060000000200000f030000000400000007000000ff7f0000020000000000000006000000c2f013020000000000000205000000010000000000eca012f1f52bceb4b0000b04000000050000000000000c040000000d0000000000000c030000000e00000000000002000000000a00000000000001000000007b007201070000000000000b0400000006000000000000020500000000002e00006159a6df0df95c28670a82de470a1ce915"], 0x0, 0xa8, 0x0, 0x1, 0x7, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x13, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000005000000000000008100000081b203000200000018110000ff42aa06938580c6bff59e807e3b5544ac039d41a191596c6b4704998d86daa28d81c7a263fe463469a993f9803089ebad4317bf0acf322db33f6f48ee74efa36840c84f3f20431a8647ec47cce8e2f8c9ba70528d57b5b90466f06e78478485316315bfe87346e885190a0ba3ea582faacce621e1704e801d28bb49094ddca7f5d99735cd1a20d213329da2c4d8b33397ea46", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x7, 0x86, &(0x7f00000006c0)=""/134, 0x41000, 0x1a, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000900)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x2, 0x10, 0x400, 0x7f}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000e00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext={0x6, 0x7}, 0x0, 0x0, 0xffffffff, 0x4, 0x10000003, 0x4, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x16, 0x8, &(0x7f0000000dc0)=ANY=[@ANYRESHEX=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, r4, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x0, 0x4000000}, 0x1a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000002c0)='dlm_send\x00', r8, 0x0, 0x3bd9}, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11.574062462s ago: executing program 0 (id=4217): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r2) 11.168263484s ago: executing program 0 (id=4219): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xd, 0xa, 0x4, 0x1, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r1, &(0x7f0000001a40), 0x0}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000980)={0x10000}, 0x8) (async) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000180)={'ip6tnl0\x00', @remote}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000006c0)={0x400, 0x0}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r5}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={0xffffffffffffffff}, 0x4) (async) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0xc, 0x0, 0x1, 0xf, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) (async) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f00000007c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x4, 0x5, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x89}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f00000001c0)='GPL\x00', 0x6, 0x6d, &(0x7f0000000640)=""/83, 0x41100, 0x11, '\x00', 0x0, @fallback=0x28, r2, 0x8, &(0x7f0000000200)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0xa, 0x8716, 0x4}, 0x10, r3, r8, 0x0, &(0x7f0000000840)=[r9, r10], &(0x7f0000000880), 0x10, 0x1, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000400000024ad1509e458866a8933228ea32e71c3c8059dd37eb815ef7e8f49cfb7aad8fa3d0ce62fe05c69229a517747450000000054534512df2723e54266a7cdde7f5b18f6e2ebbc07a6e7cc749d8d026b9f855add4b5b5d2a461537878ae339e6bc0e7cafe1503ba62be1b2b1f2e9372ad860e23c6ff6f6f26984ad0514d242d780c0accb435dfe108b853dee3eeee4a574d92ab5ffb885a5f21a7b4af8900977d3b1b2f3d43b195fbcbab1f91b429404170bc717c8a69129b49f27f51481684df6807f43a0908430580177663b5bcf0e33000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r12}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) close(0xffffffffffffffff) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 11.095992905s ago: executing program 3 (id=4220): close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x624, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000c00)=ANY=[@ANYRESDEC=r1, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYBLOB="9e86d2a7f0f88cc2473e5a38cd766ce2e365f20cb1951b07b205ff2a0a1f51a6bda46f83be", @ANYRES32, @ANYRES32], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x13, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000bc1affff0000000006000000882a812578893b4ecb1d9c166c9d1833000003000000000000000000000018200000", @ANYRES32=r6, @ANYBLOB="00000000000000000176070055086c5b18120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000850000007f0000009500000000000000"], &(0x7f00000005c0)='syzkaller\x00', 0x8a37, 0xae, &(0x7f0000000780)=""/174, 0x41000, 0x50, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0x9, 0x3, 0xa91}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000840), &(0x7f0000000880)=[{0x5, 0x3, 0x1, 0x3}, {0x1, 0x5, 0xc, 0xb}], 0x10, 0x8, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r5, 0xffffffffffffffff}, &(0x7f0000000980), &(0x7f0000000a40)=r4}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x4, &(0x7f00000001c0)=@raw=[@cb_func={0x18, 0xb, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}], &(0x7f0000000200)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x26, '\x00', 0x0, 0x1c, r5, 0x8, &(0x7f00000002c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x500000, 0xa, 0xfff, 0x1}, 0x10, 0x127af, r7, 0x2, &(0x7f0000000ac0)=[r2, 0xffffffffffffffff, r6, r8, r2, r3, r6], &(0x7f0000000b00)=[{0x4, 0x1, 0x1, 0x8}, {0x2, 0x5, 0x3}], 0x10, 0x2, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000700)='qdisc_enqueue\x00', r9, 0x0, 0x9}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b000010f3f0e9145b1631f33643feaa18000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400"/28], 0x48) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r11}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x1, 0x0, 0x0) r12 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0), 0x4) r13 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1c, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="18000218410000feffffff00000000000000006408fcff1000000085000040210000002eba00"/52, @ANYRES32=r0, @ANYBLOB="0000000000000000b70800002b0600007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000851000000300000018460000f9ffffff00000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x800, 0x0, 0x0, 0x49562c6f990bc822, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x893d, r11, 0x1, &(0x7f00000003c0)=[r0, r0, r0, r10], &(0x7f0000000400)=[{0x0, 0x4, 0x10, 0x1}], 0x10, 0x5, @void, @value}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000039c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xffffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r14, 0x18000000000002a0, 0x38, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f086dd", 0x0, 0x63, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000600)={r12, r13, 0x0, r14}, 0x10) 10.911821175s ago: executing program 0 (id=4223): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@volatile, @restrict={0x0, 0x0, 0x0, 0xb, 0x1}]}}, &(0x7f0000000540)=""/246, 0x32, 0xf6, 0x1, 0x0, 0x0, @void, @value}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000340)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='tlb_flush\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='tlb_flush\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='tlb_flush\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r1}, &(0x7f0000000300), &(0x7f0000000440)}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNGETVNETLE(r6, 0x800454dd, &(0x7f00000002c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='xen_mmu_alloc_ptpage\x00', r2, 0x0, 0x6}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='xen_mmu_alloc_ptpage\x00', r2, 0x0, 0x6}, 0x18) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) 10.231758518s ago: executing program 3 (id=4227): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x207, 0xfffff38e, 0x83, 0x2099, 0x1, 0x9, '\x00', r0, 0xffffffffffffffff, 0x5, 0x1, 0x3, 0x5, @void, @value, @void, @value}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)=ANY=[@ANYBLOB='1-'], 0x23) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) socketpair(0x5, 0x6, 0x50a9, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r7}, 0x10) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 10.012313519s ago: executing program 0 (id=4229): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r2) 7.140805934s ago: executing program 0 (id=4232): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="000000000000000001000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000009b00594079f300040000080000000000003ac300000000000077d9d3d5dd89d543372c8a2c64909eb4a349e8f91dca9abb83113ac43e92a89d86dc80c02b6d7198fc3363301bacd48ff8e5c80c54aa0fdbf2fa83f810caab45cc55820900000064ca3c34f38562"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b, 0xd000}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0d00000004000000040000000900000000000000", @ANYRES32=r4, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000bcc17ce618f67123ed1d8977174f1b4b8adda9891d6062f7"], 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="660a00438e000000791000000000000018100000", @ANYRES32=r5, @ANYBLOB="0000000000000000181700", @ANYRES32=r4, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x81, 0x2, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x402, r6}, 0x38) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, &(0x7f0000001640)=""/233, &(0x7f00000002c0), &(0x7f0000000440), 0x5, r6}, 0x38) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x6988b500, 0x0, 0x0, 0x0, 0x0, 0x0) 7.140453284s ago: executing program 3 (id=4233): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xffffffffffffff22) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) 7.090204525s ago: executing program 0 (id=4238): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000740), 0x5, r0}, 0x38) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="0100"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000880)=@generic={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x18) 6.883630775s ago: executing program 32 (id=4238): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000740), 0x5, r0}, 0x38) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="0100"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000880)=@generic={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x18) 6.867671636s ago: executing program 3 (id=4241): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r2, &(0x7f0000000040)={'some', 0x20, 0x8c5f, 0x20, 0xfffffffffffffffb}, 0x2f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f0000000b00)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000240)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000007f1408069ed6d4507b303cd2b5900dc66780bd427636ec47c8086119424655e44a0003d18e5630312425149d3639f3b0e5a8f106b203d6d86b9d48bb969b6f1be1b63f74a1406ea5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) (async) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000240)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000007f1408069ed6d4507b303cd2b5900dc66780bd427636ec47c8086119424655e44a0003d18e5630312425149d3639f3b0e5a8f106b203d6d86b9d48bb969b6f1be1b63f74a1406ea5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) 6.867425446s ago: executing program 33 (id=4241): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='cpu.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r2, &(0x7f0000000040)={'some', 0x20, 0x8c5f, 0x20, 0xfffffffffffffffb}, 0x2f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f0000000b00)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000240)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000007f1408069ed6d4507b303cd2b5900dc66780bd427636ec47c8086119424655e44a0003d18e5630312425149d3639f3b0e5a8f106b203d6d86b9d48bb969b6f1be1b63f74a1406ea5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) (async) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000240)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000007f1408069ed6d4507b303cd2b5900dc66780bd427636ec47c8086119424655e44a0003d18e5630312425149d3639f3b0e5a8f106b203d6d86b9d48bb969b6f1be1b63f74a1406ea5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) 1.842864591s ago: executing program 4 (id=4269): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="e26f2ef1d9273b333a00b4e31506f1d1a6e8c0df311add3ed12fa13ebfa339a4f74604b7c19a1bb84554e24c5ef17f97c7a5148a03ccd4cb9cd9e85e0c8210e6010ed3ff8dbfabb9979b96384f482fc1521b4dd27ebc9af89318ea300d2761bda86504b73ccd40374dcdb70ffc1c325f35cfd580e984508cf51688547cfd0627a9feb496f01e3a0d9e77e3fbf3c4def9095c6e449c9ad1cee8d58f08a10f1707bcdcadb9ece63101b59ce5004a99b23e0a45e37db4b3ff1e6236bee2058b7f9a2cd5e9ab539d8177a4305356f07a8212605d0585be2b151d601891f74de7e6bceed5a954d6a840cc0635cacb8408beacf48017a7c8caeae7d5", 0xf9}, {&(0x7f00000004c0)="c13378c50f3ca042ae1ad6e737cd8d30de5f7c73a64b51ef3fc6c871a1139c9334663b2ce8ac1468a37d9135dc9c7a817dcf0495407efcfb447f0a0befe63796eab69f8f90bbea3c1df11a470ece7f10886b2d08948152f94e263922dfbf8c718b934b7739fd069392fb3fda17531d4bcb9968bcdd", 0x75}], 0x2, &(0x7f0000000180)="6bdfcba337423ecffda4e7251c677cf5840250708677719a888e375d52d990dfcd9d31df701e7bba49f978d25ac0c457f3c0214d413f6acc5e31c3b73e2f2b", 0x3f, 0x4000}, 0x4081) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) 1.641628672s ago: executing program 4 (id=4271): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="6ab106e559f7ffffff", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000100010000000040000000181100", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001340)={{r0}, &(0x7f00000012c0), &(0x7f0000001300)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) socketpair(0x28, 0x802, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x3, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="7910400000000000690030000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.639340262s ago: executing program 2 (id=4272): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000780)=ANY=[@ANYRESOCT, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001180)={r1, 0x0, &(0x7f0000001080)=""/89}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000280)}, 0x10) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004004000e27f00000900000008100000", @ANYRES32, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="7657c1d5020000000000000000000000000000000000000000050000"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000380), 0x5, r3}, 0x38) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r4, 0x0, 0x2, 0x0) openat$cgroup_procs(r4, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) socketpair(0x10, 0x3, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_config_ext, 0x105c34}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 1.080096215s ago: executing program 2 (id=4273): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000340), 0x9) (async) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000340), 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r0, 0xe0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x10, &(0x7f00000018c0), &(0x7f0000000540), 0x8, 0xd6, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f00000004c0), 0x75, r5}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f00000004c0), 0x75, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100005, 0x10642, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext={0x2, 0xe68a}, 0x10210, 0x88, 0x100000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x1) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305829, &(0x7f0000000040)=0xfdfd) 1.079532585s ago: executing program 1 (id=4274): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x7, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7910031175f37538e486dd630080fcf5082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa2c200007"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r7, @ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) write$cgroup_subtree(r4, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc000b2c"], 0xfdef) 1.078908265s ago: executing program 6 (id=4247): getpid() bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x3c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r0, 0x20, &(0x7f00000002c0)={&(0x7f0000000500)=""/99, 0x63, 0x0, &(0x7f0000000840)=""/240, 0xf0}}, 0x10) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000020020000", @ANYRES32=0x1, @ANYBLOB="00001400000000000001000000000000000000198f234a00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x2, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="46490b0000010000ed6b276da56568d1f9409ce80d02f8d2c40c8dc729354c6c5295f48f1c75d3b82011f9867c79", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070000000000000000000000010500000180000000000000000100008510"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a3bf27b5228d87862a146cdc6484bf42003a67814ea1b3d5927ced7210efd4dc8bdb4d740e6dea21178f8edc4f2f86d25118144afd8f63d2a5dd31f2d32ba212a35d72db9305f9469aa5bbba9711"], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000060000000000000f030000008f54b7000000000000000f010040004000000000000061002da0b8ce77eec5e07d2aa39354a7b2762ba7a6bd60645ad4df596d35f02a2e7a7a4a27e5acbdc863a44d7a83cefffd3dcaac3cf8dd7c5de564fd91c596c3bdfa2eff1cf477a92704bb0ab955d4dd680d49888050784cfa3b55ff5d9121dc9eb21e4402ad91e8bd489c5319f8b34a79038b6e2f38dea7040574eda429ab82bdcf3fc65d21f0a93f67ef3da5f432f2ac"], 0x0, 0x3c, 0x0, 0x0, 0x1000000, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) 907.698836ms ago: executing program 5 (id=4239): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00007f3300"/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001100000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdffffffffffd, 0x10104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8263e, 0x10000004, 0x0, 0x1, 0xfffffefffff7bbfe, 0xfffffffc, 0x1537, 0x0, 0x4}, 0x0, 0xf, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f00000002c0)=0x100000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) close(r0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 756.375216ms ago: executing program 1 (id=4275): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xffffffffffffff22) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) 755.958636ms ago: executing program 2 (id=4276): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000009568"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f00000300000000000000", @ANYRES32, @ANYBLOB="f23b49b600000000002ca5000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8912, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="050000000100000009000000ae00000000000000c7d2de", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4002, 0x0, r3, 0x1e, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x500, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 755.410727ms ago: executing program 6 (id=4247): getpid() bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x3c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r0, 0x20, &(0x7f00000002c0)={&(0x7f0000000500)=""/99, 0x63, 0x0, &(0x7f0000000840)=""/240, 0xf0}}, 0x10) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000020020000", @ANYRES32=0x1, @ANYBLOB="00001400000000000001000000000000000000198f234a00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x2, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="46490b0000010000ed6b276da56568d1f9409ce80d02f8d2c40c8dc729354c6c5295f48f1c75d3b82011f9867c79", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070000000000000000000000010500000180000000000000000100008510"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a3bf27b5228d87862a146cdc6484bf42003a67814ea1b3d5927ced7210efd4dc8bdb4d740e6dea21178f8edc4f2f86d25118144afd8f63d2a5dd31f2d32ba212a35d72db9305f9469aa5bbba9711"], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000060000000000000f030000008f54b7000000000000000f010040004000000000000061002da0b8ce77eec5e07d2aa39354a7b2762ba7a6bd60645ad4df596d35f02a2e7a7a4a27e5acbdc863a44d7a83cefffd3dcaac3cf8dd7c5de564fd91c596c3bdfa2eff1cf477a92704bb0ab955d4dd680d49888050784cfa3b55ff5d9121dc9eb21e4402ad91e8bd489c5319f8b34a79038b6e2f38dea7040574eda429ab82bdcf3fc65d21f0a93f67ef3da5f432f2ac"], 0x0, 0x3c, 0x0, 0x0, 0x1000000, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) 653.334877ms ago: executing program 4 (id=4277): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x4, 0x8, 0x1040, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x4, 0x8, 0x1040, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) (async) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) 652.316797ms ago: executing program 5 (id=4239): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00007f3300"/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001100000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdffffffffffd, 0x10104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8263e, 0x10000004, 0x0, 0x1, 0xfffffefffff7bbfe, 0xfffffffc, 0x1537, 0x0, 0x4}, 0x0, 0xf, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f00000002c0)=0x100000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) close(r0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 545.773877ms ago: executing program 1 (id=4278): bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001380)={@fallback=r2, 0x1f, 0x0, 0xbad, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001400)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001440)={@map=r6, r3, 0xa, 0x0, r0, @void, @value=r2, @void, @void, r5}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r9, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0xf, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x34}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xd}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @func, @cb_func={0x18, 0x7, 0x4, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}]}, &(0x7f0000000000)='GPL\x00', 0x8000, 0x0, 0x0, 0x40f00, 0x1, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x7, 0x2}, 0x10, 0xa593, r7, 0x1, 0x0, &(0x7f00000004c0)=[{0x0, 0x5, 0x1}], 0x10, 0x10, @void, @value}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001540)={r4, 0x20, &(0x7f0000001500)={&(0x7f0000001480)=""/89, 0x59, 0x0, &(0x7f00000013c0)=""/26, 0x1a}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b700000004000000bca30000000000002403000040feffff720af0ff0000000071a4f0ff000000001f030000000000002e0a0200000000002600000000ff000e61141800000000001d430000000000007a0a00fe00581c1f6114140000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f30002af51efd601b6bf01c8e8b1fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7d06a59ff616236fd9aa58f0177184b6a89adaf17b0a6041bdef728f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566de74e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48b936e6f9e0fcda88fe4413537528fdb6153baae244e7bf573eac34b781337ad5901a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b602396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb1188883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcc536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d648532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2654026c6ea08b83b123145ab5703dad844ceb201efeb6dc5f6a9037d2283c42efc54dd84323afc4c10eff46248843187f1dd48ef0900000000000000ff0f4000000000f00700003c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c1011e32f808890205f0e6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963442aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2869291b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e637d4219ef7ec61261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addbc4b3093c91b8068c5adfcb0d7fd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf699b3746979f99f6a1527f004f37e84fb478199dc1020f4beb98b8074bf7df8b5e783637daf121f175a81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae543d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80aba439772bf60a1db18c472dafc5569adc2c406f39f82928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a4a274000000000000000000000000000000000000000000000009dd14b38f2f5426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4120260ffcd030000006d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10b0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d3b332240d450fdb0a9a69f432e277f3a0386eb2bd1305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07e18b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e8c0a0d213c3ffad44d2a376def42e41e9fc3167a257e040fa7cf32c221aaac6cfdeb33c27500001a0000000000000000000017350000c11ae694b0c69c2c03f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d10522a7a945b93fb705b95b6aae27a8fab1e6984c8bdc12360627137ab6737b68ab08a1a4b94cb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481ffe46a4ce86be0b1f8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0b74903580ac98708007c80d6c7d0de4614195e40d797c0348dd70f36a220e8b3710fb5358c27e90793bcb9ee6319342c4b239ca8cbc6fc83d32e6eb62ad92e43991f2447be9c2a1ae1119eafb901a43d57e885116d19aa152bfb89f8d0b2516f80120a1cddff771657f3d0288ec3899f1e3ba0151c4037148fb479de703fc52b6573349c28d1b107d859b4961324c17756dde99de1924a1d2b7095d34a55060f47f4407d89acf9f1d2156befec432e8e993c79027b7ef285b20c2e6b3d0491d0d3591b0d94713332b6b79c8297117b0d14eff64e0aca8a4b4aa773d8fba1217e9519952419bb9dd998d0ec870ff00b6d556018602738fbc6cec89d6dd13cf55b96f6fe9a137d2d6a56ad78e52c23ed080000000000002bc261a781fd14126c146a0aac4221839a4b9bbf61e4bba695a41e2109eba8e40c370267cc51ffadbd15cafc97a4d3edfdcb9b5729307c6bdaf7b69325fb05fa8a9869de0600ee477d71bf3e36d1d9019edfa27aae24b632f251df210c86a18fae731ecb8b0d48357378caf2b6789509b1bacfd4fa812dc341875cfa5e798bbf59770000000000000000c8a594ea3c3347962d9113b1fecdfad5a8da641053f02e49456f5d21674521e67a5b18ea451eccf69dd6af928d2d68da9304a296c22fdc0500000000000000b1aade386b113045033a6188d56e675564d8cb8d5b40114b0f5bf15dd64c9ece60b8588ee8777d0ea8f4713b258427c7d90f9e93348e17723ba9ab8ae790f74cc41ae5795835f3cec40dff485d2802c08611454d9ea784a205bcc07ec26f906f3cf45bb37014ab6f22af6213618e242b283ea9d3f0677ee598072ec06f7170009d92bb87d9d12c378dfd3e74ec056ee83eef666423d934fc5908c9ff98715218a5964f1e00000000426ac9588e27aefe307f49662990ee823568bbc2f89596ced7c6c52d76b8096f1848410843b93fd404f535be474f456778b5ef85abb8fc2336abd5ea64a6efea8a5aca0015499b88ae780a7bae4df603bd3c72808cf300440b1b638a6640f7de8d0d82f359ca2f779cd48cd8d3603f4f69e47f386988c9b7b5d6dd3d48a1fdca780049d7c87bea42161a4c0d7cf0125b43dc9d8845f3c05a08acda647e7143d0e0aee2949a45e28488b0522c2288072467d2afe269f589fb7e034b92d3ca245b16b71998711bfe206c9690b6d0eebb06a29349229eb45ff15c63aa2c82c56d7420738cd1b04eb16e87cb524315d7361ea3635d3799bb7fcc56aa5e1dbe031a7a12554dee6754b72f43a6fddf427f32ec3df274a88097725679769beebf1aa6eb09d5154e4900000000000d0f7160a05911d969879953d3d4702b2676c07bb0fd14020a66718378825d5ed789711b77d40dc31e0b8fc651b45559da463f0000000000000000000000000052d42124e9c26aba885015e69d42ecd710342ac597ebea576ae15fdf611356f622e831741ab15549e0d7a2bd0324e2b3b48a10551607492c19eaf58485feb4cab19c303b30ba2ddea0d792d77724c9fa4ed58b93668fc20484f141ee2b6a0029e88fdc853189b4dafd36ff23b11967090e508f45e3f10857038a52ef275cf9e3e4b5d30b12d138dfa70930c603b5e3f4b7be67be3dba3cbd8d4d143195af0697d779445d67dcfbd922d12a8b49f93eac7a72faacf80346b3b669615f2710eb8df39fc8c04d2c9c196fa6facfea613569a35cde6451f2edf55ce25c7d72ec7ea85a92458c0559ca3a94727d495bd4671a55a70bc544d71d8e0257707a31936f1adf224077310a86bf447ec92c650acca8c6b0721020894b06178c32f4472d17174d6eb2b067030c5d2c12583f46d2da7fba42d4083259c7cdc8bf1f4299c248865d3c809356c3ed"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r10, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10, r11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r12}, 0x10) socketpair(0x28, 0x80000, 0x0, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 545.489667ms ago: executing program 6 (id=4247): getpid() bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x3c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r0, 0x20, &(0x7f00000002c0)={&(0x7f0000000500)=""/99, 0x63, 0x0, &(0x7f0000000840)=""/240, 0xf0}}, 0x10) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000020020000", @ANYRES32=0x1, @ANYBLOB="00001400000000000001000000000000000000198f234a00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x2, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="46490b0000010000ed6b276da56568d1f9409ce80d02f8d2c40c8dc729354c6c5295f48f1c75d3b82011f9867c79", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070000000000000000000000010500000180000000000000000100008510"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a3bf27b5228d87862a146cdc6484bf42003a67814ea1b3d5927ced7210efd4dc8bdb4d740e6dea21178f8edc4f2f86d25118144afd8f63d2a5dd31f2d32ba212a35d72db9305f9469aa5bbba9711"], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000060000000000000f030000008f54b7000000000000000f010040004000000000000061002da0b8ce77eec5e07d2aa39354a7b2762ba7a6bd60645ad4df596d35f02a2e7a7a4a27e5acbdc863a44d7a83cefffd3dcaac3cf8dd7c5de564fd91c596c3bdfa2eff1cf477a92704bb0ab955d4dd680d49888050784cfa3b55ff5d9121dc9eb21e4402ad91e8bd489c5319f8b34a79038b6e2f38dea7040574eda429ab82bdcf3fc65d21f0a93f67ef3da5f432f2ac"], 0x0, 0x3c, 0x0, 0x0, 0x1000000, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) 427.373618ms ago: executing program 4 (id=4279): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) r4 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) (async, rerun: 64) close(r3) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 64) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64=r4], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000000000400"/20, @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) sendmsg$unix(r9, 0x0, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={0x0}, 0x10) r11 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00'}, 0x10) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xe, 0x4, 0x4, 0x5, 0x14, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0xcf, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x0, 0x0, &(0x7f0000000880), 0x8, 0xac, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000003c0)=r11, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYRES8=r10, @ANYRESDEC=r5, @ANYRESDEC=r7, @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000400)='afs_make_fs_call1\x00', r12}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x448182, 0x0) 426.995118ms ago: executing program 5 (id=4239): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00007f3300"/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001100000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdffffffffffd, 0x10104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8263e, 0x10000004, 0x0, 0x1, 0xfffffefffff7bbfe, 0xfffffffc, 0x1537, 0x0, 0x4}, 0x0, 0xf, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f00000002c0)=0x100000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) close(r0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 411.754938ms ago: executing program 1 (id=4280): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={0xffffffffffffffff, r0}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x7e1c01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x11, 0x3, 0x0, &(0x7f00000001c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x17, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a2163", 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x7101}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) 411.341608ms ago: executing program 2 (id=4281): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a0000002000650e0300000005000000080000000030000000000000000100000001"], 0x88}, 0x0) close(r4) close(r5) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x1, 0x5, 0x7, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1, 0xa, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="61106800000000006113490000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f", @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000004c0)={0x1, 0xffffffffffffff04, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x20e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x400a, 0x0, 0x80000003}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000080000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 410.752378ms ago: executing program 6 (id=4247): getpid() bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x3c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r0, 0x20, &(0x7f00000002c0)={&(0x7f0000000500)=""/99, 0x63, 0x0, &(0x7f0000000840)=""/240, 0xf0}}, 0x10) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000020020000", @ANYRES32=0x1, @ANYBLOB="00001400000000000001000000000000000000198f234a00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x2, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="46490b0000010000ed6b276da56568d1f9409ce80d02f8d2c40c8dc729354c6c5295f48f1c75d3b82011f9867c79", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070000000000000000000000010500000180000000000000000100008510"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001100)=ANY=[@ANYBLOB="95ffffff0000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac85800000000000000024e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0fe8a7d06d7535f7866907dc6751dfb292f7d3acec77f5efad9c11650300000000000000649c1cfd138d5521f9451759c3421eed73d5661cfeecf9c66cf6dd6dcd54c3b3ff02000000d7c983c044c03bf3cc2367a48dfe3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff050011bbecc2f4a37c9af2551ce935b0f327cb3f011a7d069111d5a34ed09baafa9e87110bd5602e2fd5234712596b696418f163d1a13ed38ae89d24e1cebfba2fc7925bfacbb031e7743f541cd0aed4af7588c8e1b44ccb19e810879b70a70000000000000000000000d7900a820b63278f4e9a217b98000000002a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a1420cfd9e1f84d8271ff6606b2a44bc47b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d62ad0a97aec773713a66b207000000000000001d24291c25449f106a99893e"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a3bf27b5228d87862a146cdc6484bf42003a67814ea1b3d5927ced7210efd4dc8bdb4d740e6dea21178f8edc4f2f86d25118144afd8f63d2a5dd31f2d32ba212a35d72db9305f9469aa5bbba9711"], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000060000000000000f030000008f54b7000000000000000f010040004000000000000061002da0b8ce77eec5e07d2aa39354a7b2762ba7a6bd60645ad4df596d35f02a2e7a7a4a27e5acbdc863a44d7a83cefffd3dcaac3cf8dd7c5de564fd91c596c3bdfa2eff1cf477a92704bb0ab955d4dd680d49888050784cfa3b55ff5d9121dc9eb21e4402ad91e8bd489c5319f8b34a79038b6e2f38dea7040574eda429ab82bdcf3fc65d21f0a93f67ef3da5f432f2ac"], 0x0, 0x3c, 0x0, 0x0, 0x1000000, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) 341.374359ms ago: executing program 4 (id=4282): perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51a, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0xa}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f00000002c0), &(0x7f00000002c0)=""/157}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f00000000c0), &(0x7f0000000380)=""/75}, 0x20) 341.205209ms ago: executing program 5 (id=4239): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00007f3300"/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001100000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdffffffffffd, 0x10104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8263e, 0x10000004, 0x0, 0x1, 0xfffffefffff7bbfe, 0xfffffffc, 0x1537, 0x0, 0x4}, 0x0, 0xf, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f00000002c0)=0x100000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) close(r0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 277.488809ms ago: executing program 2 (id=4283): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x14, 0x0, 0x0, &(0x7f0000000000)) syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000004c0), 0x20000000}, 0x20) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='9p_client_req\x00', r2, 0x0, 0x8}, 0x18) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 276.518099ms ago: executing program 1 (id=4284): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r0, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcd, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000004c0), &(0x7f00000007c0), 0x8, 0xc2, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000880)={r0}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=@base={0x3, 0x7, 0x3, 0x1000, 0x4a005, r0, 0x3, '\x00', r1, r0, 0x2, 0x4, 0x5, 0x0, @value=r2, @void, @void, @value}, 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000037c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x50008000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="dc2c98283c20aa7503a2d393c0000000000000f905d6460fe3e6ff6854f23e62f8ee122a4bd09f1088216cfede7dcf103818abd2cd110300000000000000552538d8c10a6c89fee7b5b6437a0a04cd96f38228d350337811779bb2b8c526898d1dbbf5c0d7b3170bfca344c80f5677656bae46fd32521ea559fabb036e89fb6800804de459aad2d48740727445b40b882bc25945f3602e5e6432592ecb7121cc57c621b1c05878264e9f3eb713931a75d89076b709a9f2258cbd992057b3d66451c9fb997072b023bf32bd765c6c976180b8b20f47daaa0f6173c75f42fa0147482d2a91b8e0b4bb68abb6d5e5001cf30e033a00000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x2e, 0x2e]}}, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r9}, &(0x7f00000008c0), &(0x7f0000000900)=r8}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x30036, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2402, 0xc8, 0x0, 0x7, 0x8, 0x8001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r12}, 0x10) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r13, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c13c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c77"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000001f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r14, 0x4030582a, &(0x7f0000000040)) 275.771519ms ago: executing program 6 (id=4247): getpid() bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x3c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r0, 0x20, &(0x7f00000002c0)={&(0x7f0000000500)=""/99, 0x63, 0x0, &(0x7f0000000840)=""/240, 0xf0}}, 0x10) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000020020000", @ANYRES32=0x1, @ANYBLOB="00001400000000000001000000000000000000198f234a00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x2, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="46490b0000010000ed6b276da56568d1f9409ce80d02f8d2c40c8dc729354c6c5295f48f1c75d3b82011f9867c79", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070000000000000000000000010500000180000000000000000100008510"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a3bf27b5228d87862a146cdc6484bf42003a67814ea1b3d5927ced7210efd4dc8bdb4d740e6dea21178f8edc4f2f86d25118144afd8f63d2a5dd31f2d32ba212a35d72db9305f9469aa5bbba9711"], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000060000000000000f030000008f54b7000000000000000f010040004000000000000061002da0b8ce77eec5e07d2aa39354a7b2762ba7a6bd60645ad4df596d35f02a2e7a7a4a27e5acbdc863a44d7a83cefffd3dcaac3cf8dd7c5de564fd91c596c3bdfa2eff1cf477a92704bb0ab955d4dd680d49888050784cfa3b55ff5d9121dc9eb21e4402ad91e8bd489c5319f8b34a79038b6e2f38dea7040574eda429ab82bdcf3fc65d21f0a93f67ef3da5f432f2ac"], 0x0, 0x3c, 0x0, 0x0, 0x1000000, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) 95.42746ms ago: executing program 4 (id=4285): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000000)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) 94.72917ms ago: executing program 5 (id=4239): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00007f3300"/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001100000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdffffffffffd, 0x10104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8263e, 0x10000004, 0x0, 0x1, 0xfffffefffff7bbfe, 0xfffffffc, 0x1537, 0x0, 0x4}, 0x0, 0xf, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f00000002c0)=0x100000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) close(r0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 80.03447ms ago: executing program 1 (id=4286): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9426}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe40) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x18, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='console\x00', r3}, 0x18) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x0, 0x101, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4, 0x0, @void, @value, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x894c, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0x0, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000340), &(0x7f0000000200), 0x8, 0xa, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x3, 0x100ffff, 0x87b, 0x356, r4, 0xffff, '\x00', r5, 0xffffffffffffffff, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000018360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 79.4259ms ago: executing program 6 (id=4247): getpid() bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x3c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r0, 0x20, &(0x7f00000002c0)={&(0x7f0000000500)=""/99, 0x63, 0x0, &(0x7f0000000840)=""/240, 0xf0}}, 0x10) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000020020000", @ANYRES32=0x1, @ANYBLOB="00001400000000000001000000000000000000198f234a00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x2, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="46490b0000010000ed6b276da56568d1f9409ce80d02f8d2c40c8dc729354c6c5295f48f1c75d3b82011f9867c79", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070000000000000000000000010500000180000000000000000100008510"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001100)=ANY=[@ANYBLOB="95ffffff0000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac85800000000000000024e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0fe8a7d06d7535f7866907dc6751dfb292f7d3acec77f5efad9c11650300000000000000649c1cfd138d5521f9451759c3421eed73d5661cfeecf9c66cf6dd6dcd54c3b3ff02000000d7c983c044c03bf3cc2367a48dfe3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff050011bbecc2f4a37c9af2551ce935b0f327cb3f011a7d069111d5a34ed09baafa9e87110bd5602e2fd5234712596b696418f163d1a13ed38ae89d24e1cebfba2fc7925bfacbb031e7743f541cd0aed4af7588c8e1b44ccb19e810879b70a70000000000000000000000d7900a820b63278f4e9a217b98000000002a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a1420cfd9e1f84d8271ff6606b2a44bc47b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d62ad0a97aec773713a66b207000000000000001d24291c25449f106a99893e"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000a3bf27b5228d87862a146cdc6484bf42003a67814ea1b3d5927ced7210efd4dc8bdb4d740e6dea21178f8edc4f2f86d25118144afd8f63d2a5dd31f2d32ba212a35d72db9305f9469aa5bbba9711"], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000008000000060000000000000f030000008f54b7000000000000000f010040004000000000000061002da0b8ce77eec5e07d2aa39354a7b2762ba7a6bd60645ad4df596d35f02a2e7a7a4a27e5acbdc863a44d7a83cefffd3dcaac3cf8dd7c5de564fd91c596c3bdfa2eff1cf477a92704bb0ab955d4dd680d49888050784cfa3b55ff5d9121dc9eb21e4402ad91e8bd489c5319f8b34a79038b6e2f38dea7040574eda429ab82bdcf3fc65d21f0a93f67ef3da5f432f2ac"], 0x0, 0x3c, 0x0, 0x0, 0x1000000, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) 6.23374ms ago: executing program 2 (id=4287): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018c90000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000280)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='workqueue_activate_work\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r4}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) (async) close(r6) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1b, 0x7, 0x0, 0x8000, 0x34010, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @value=r2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r0, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x3, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000fe, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r8}, &(0x7f00000001c0), &(0x7f0000000340)}, 0x20) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) (async) unlink(0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0, r10}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r11], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 0s ago: executing program 5 (id=4239): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00007f3300"/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001100000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdffffffffffd, 0x10104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8263e, 0x10000004, 0x0, 0x1, 0xfffffefffff7bbfe, 0xfffffffc, 0x1537, 0x0, 0x4}, 0x0, 0xf, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f00000002c0)=0x100000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) close(r0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) kernel console output (not intermixed with test programs): ecomes ready [ 22.376979][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.383806][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.391201][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.398922][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.406906][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.413720][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.421058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.428753][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.436605][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.444184][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.453446][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.460696][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.468083][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.475698][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.490477][ T287] device veth0_vlan entered promiscuous mode [ 22.496812][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.504023][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.517505][ T285] device veth0_vlan entered promiscuous mode [ 22.527441][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.535688][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.544044][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.552660][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.560776][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.568419][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.576441][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.584456][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.592684][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.600431][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.608205][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.615382][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.622733][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.629958][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.640813][ T286] device veth0_vlan entered promiscuous mode [ 22.651645][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.659345][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.667564][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.674768][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.683380][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.691587][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.699656][ T284] device veth0_vlan entered promiscuous mode [ 22.708406][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.716430][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.725332][ T288] device veth0_vlan entered promiscuous mode [ 22.733244][ T286] device veth1_macvtap entered promiscuous mode [ 22.741027][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.748384][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.756517][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.767887][ T287] device veth1_macvtap entered promiscuous mode [ 22.777364][ T285] device veth1_macvtap entered promiscuous mode [ 22.789035][ T288] device veth1_macvtap entered promiscuous mode [ 22.796927][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.804321][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.812007][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.819942][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.827978][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.835891][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.844072][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.852243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.860333][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.868317][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.876127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.883467][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.891468][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.899656][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.907692][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.916187][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.924273][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.936751][ T284] device veth1_macvtap entered promiscuous mode [ 22.947180][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.954776][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.963075][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.975269][ T286] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 22.996518][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.004513][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.017350][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.025374][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.033617][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.042447][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.050831][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.058940][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.117571][ T315] cgroup: syz.1.2 (315) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 23.135550][ T319] device syzkaller0 entered promiscuous mode [ 23.141481][ T315] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 23.299913][ C0] hrtimer: interrupt took 26604 ns [ 23.628561][ T357] sock: sock_set_timeout: `syz.2.16' (pid 357) tries to set negative timeout [ 23.774003][ T359] device pim6reg1 entered promiscuous mode [ 23.926460][ C1] Illegal XDP return value 16128, expect packet loss! [ 24.873852][ T383] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.884870][ T383] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.427437][ T391] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.434311][ T391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.441435][ T391] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.448187][ T391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.569630][ T391] device bridge0 entered promiscuous mode [ 26.101520][ T24] kauditd_printk_skb: 44 callbacks suppressed [ 26.101530][ T24] audit: type=1400 audit(1731668835.229:120): avc: denied { create } for pid=416 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 26.697209][ T24] audit: type=1400 audit(1731668835.829:121): avc: denied { write } for pid=428 comm="syz.2.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.188931][ T24] audit: type=1400 audit(1731668836.319:122): avc: denied { create } for pid=435 comm="syz.3.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 27.379108][ T24] audit: type=1400 audit(1731668836.399:123): avc: denied { read } for pid=437 comm="syz.2.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.610159][ T450] џџџџџџ: renamed from vlan1 [ 27.999823][ T24] audit: type=1400 audit(1731668837.129:124): avc: denied { create } for pid=472 comm="syz.4.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 28.066974][ T24] audit: type=1400 audit(1731668837.199:125): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 28.144794][ T24] audit: type=1400 audit(1731668837.269:126): avc: denied { create } for pid=480 comm="syz.4.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.411373][ T24] audit: type=1400 audit(1731668837.539:127): avc: denied { write } for pid=488 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.742112][ T24] audit: type=1400 audit(1731668837.869:128): avc: denied { create } for pid=528 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 29.102243][ T24] audit: type=1400 audit(1731668838.229:129): avc: denied { setopt } for pid=556 comm="syz.2.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.203118][ T557] device veth1_macvtap left promiscuous mode [ 29.396290][ T562] device veth1_macvtap entered promiscuous mode [ 29.403547][ T562] device macsec0 entered promiscuous mode [ 30.311949][ T615] device pim6reg1 entered promiscuous mode [ 31.519988][ T697] device syzkaller0 entered promiscuous mode [ 31.585786][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 31.585797][ T24] audit: type=1400 audit(1731668840.709:134): avc: denied { create } for pid=702 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 31.865894][ T727] device syzkaller0 entered promiscuous mode [ 32.044642][ T734] device syzkaller0 entered promiscuous mode [ 32.064769][ T738] device macsec0 entered promiscuous mode [ 32.175225][ T749] syz.4.126[749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.175273][ T749] syz.4.126[749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.410762][ T24] audit: type=1400 audit(1731668841.529:135): avc: denied { create } for pid=752 comm="syz.2.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 33.229623][ T799] device veth0_vlan left promiscuous mode [ 33.242941][ T799] device veth0_vlan entered promiscuous mode [ 33.355571][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.387586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.468680][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.387586][ T24] audit: type=1400 audit(1731668848.519:136): avc: denied { create } for pid=930 comm="syz.0.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 39.816776][ T927] device syzkaller0 entered promiscuous mode [ 41.847336][ T24] audit: type=1400 audit(1731668850.979:137): avc: denied { create } for pid=1027 comm="syz.2.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 42.137172][ T24] audit: type=1400 audit(1731668851.049:138): avc: denied { create } for pid=1032 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 42.440215][ T24] audit: type=1400 audit(1731668851.569:139): avc: denied { create } for pid=1045 comm="syz.3.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 43.471544][ T1079] syz.4.216[1079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.471592][ T1079] syz.4.216[1079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.645062][ T1081] device pim6reg1 entered promiscuous mode [ 43.906938][ T1082] device veth0_vlan left promiscuous mode [ 43.915803][ T1082] device veth0_vlan entered promiscuous mode [ 43.998772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.027348][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.159110][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 45.458872][ T24] audit: type=1400 audit(1731668854.589:140): avc: denied { create } for pid=1125 comm="syz.2.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 47.016731][ T1174] syz.4.242[1174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.016788][ T1174] syz.4.242[1174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.639402][ T24] audit: type=1400 audit(1731668857.759:141): avc: denied { write } for pid=1210 comm="syz.3.253" name="cgroup.subtree_control" dev="cgroup2" ino=197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 49.236320][ T24] audit: type=1400 audit(1731668857.809:142): avc: denied { open } for pid=1210 comm="syz.3.253" path="" dev="cgroup2" ino=197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 49.936400][ T1256] syz.1.267 uses obsolete (PF_INET,SOCK_PACKET) [ 50.198350][ T1250] device pim6reg1 entered promiscuous mode [ 51.049664][ T1284] device veth0_vlan left promiscuous mode [ 51.055850][ T1284] device veth0_vlan entered promiscuous mode [ 51.139377][ T24] audit: type=1400 audit(1731668860.269:143): avc: denied { create } for pid=1280 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 51.316056][ T1276] device pim6reg1 entered promiscuous mode [ 52.664946][ T1333] device syzkaller0 entered promiscuous mode [ 53.045902][ T24] audit: type=1400 audit(1731668862.159:144): avc: denied { create } for pid=1338 comm="syz.2.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 53.295512][ T24] audit: type=1400 audit(1731668862.419:145): avc: denied { create } for pid=1352 comm="syz.1.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 54.012533][ T1375] syz.4.299[1375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.012586][ T1375] syz.4.299[1375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.324249][ T1392] device veth0_vlan left promiscuous mode [ 54.341302][ T1392] device veth0_vlan entered promiscuous mode [ 54.753766][ T24] audit: type=1400 audit(1731668863.879:146): avc: denied { create } for pid=1401 comm="syz.4.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 54.806083][ T1413] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.816792][ T1413] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.299566][ T1419] device bridge_slave_1 left promiscuous mode [ 55.305535][ T1419] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.471758][ T1419] device bridge_slave_0 left promiscuous mode [ 55.477739][ T1419] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.376119][ T1445] Т: renamed from pim6reg1 [ 57.873979][ T1493] syz.3.333[1493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.874037][ T1493] syz.3.333[1493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.252556][ T1493] syz.3.333[1493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.710512][ T1493] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.734711][ T1493] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.088079][ T1522] device pim6reg1 entered promiscuous mode [ 59.298873][ T1526] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 59.356014][ T1526] device syzkaller0 entered promiscuous mode [ 59.559513][ T1540] device veth0_vlan left promiscuous mode [ 59.615241][ T1540] device veth0_vlan entered promiscuous mode [ 59.642386][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.651750][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.693828][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 60.361586][ T1584] device syzkaller0 entered promiscuous mode [ 60.836268][ T24] audit: type=1400 audit(1731668869.959:147): avc: denied { write } for pid=1602 comm="syz.1.367" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 63.249218][ T1662] device syzkaller0 entered promiscuous mode [ 63.286913][ T1661] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 63.380389][ T24] audit: type=1400 audit(1731668872.509:148): avc: denied { create } for pid=1677 comm="syz.3.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 63.413523][ T1661] device syzkaller0 entered promiscuous mode [ 64.191976][ T1715] syz.4.401[1715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.192027][ T1715] syz.4.401[1715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.390757][ T1727] device pim6reg1 entered promiscuous mode [ 64.421125][ T1732] device syzkaller0 entered promiscuous mode [ 66.074108][ T1796] device syzkaller0 entered promiscuous mode [ 66.664986][ T1822] device veth0_vlan left promiscuous mode [ 66.718203][ T1822] device veth0_vlan entered promiscuous mode [ 66.872971][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.884269][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 66.902030][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.118714][ T1884] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.125653][ T1884] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.175084][ T1884] device bridge0 left promiscuous mode [ 68.507017][ T1882] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.514242][ T1882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.527164][ T1882] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.534563][ T1882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.859509][ T1882] device bridge0 entered promiscuous mode [ 69.256312][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.763903][ T1899] device veth0_to_team entered promiscuous mode [ 72.052477][ T1954] syz.4.464 (1954) used obsolete PPPIOCDETACH ioctl [ 72.468059][ T1974] device syzkaller0 entered promiscuous mode [ 72.492653][ T1984] device pim6reg1 entered promiscuous mode [ 72.503891][ T1976] device sit0 entered promiscuous mode [ 74.009828][ T2009] ------------[ cut here ]------------ [ 74.123271][ T2009] trace type BPF program uses run-time allocation [ 74.278575][ T2020] device sit0 left promiscuous mode [ 74.336887][ T2009] WARNING: CPU: 1 PID: 2009 at kernel/bpf/verifier.c:10493 check_map_prog_compatibility+0x65b/0x7c0 [ 74.427788][ T2009] Modules linked in: [ 74.436495][ T2009] CPU: 1 PID: 2009 Comm: syz.2.481 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 74.447728][ T2009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 74.476505][ T2009] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 74.486464][ T2009] Code: c8 e9 84 fe ff ff e8 34 f4 ee ff 31 db e9 85 fe ff ff e8 28 f4 ee ff c6 05 0e 1d 65 05 01 48 c7 c7 e0 76 45 85 e8 15 7a c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 74.514593][ T2009] RSP: 0018:ffffc90000e5ef90 EFLAGS: 00010246 [ 74.564200][ T2009] RAX: 6861b3cd03595b00 RBX: ffff88812458f000 RCX: 0000000000040000 [ 74.572254][ T2009] RDX: ffffc90002763000 RSI: 0000000000000ea6 RDI: 0000000000000ea7 [ 74.586289][ T2009] RBP: ffffc90000e5efd0 R08: ffffffff81522098 R09: ffffed103ee2a5f8 [ 74.604477][ T2009] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 74.656599][ T2009] R13: 1ffff9200001f204 R14: ffff88811ce7c000 R15: ffffc900000f9020 [ 74.664495][ T2009] FS: 00007febfb3f16c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 74.675080][ T2009] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 74.681968][ T2009] CR2: 000000002100013f CR3: 000000010dcb0000 CR4: 00000000003506a0 [ 74.690123][ T2009] DR0: 0000000020000300 DR1: 0000000020000300 DR2: 0000000000000000 [ 74.699044][ T2009] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 74.708323][ T2009] Call Trace: [ 74.711505][ T2009] ? show_regs+0x58/0x60 [ 74.715533][ T2009] ? __warn+0x160/0x2f0 [ 74.719560][ T2009] ? check_map_prog_compatibility+0x65b/0x7c0 [ 74.725452][ T2009] ? report_bug+0x3d9/0x5b0 [ 74.729833][ T2009] ? check_map_prog_compatibility+0x65b/0x7c0 [ 74.735697][ T2009] ? handle_bug+0x41/0x70 [ 74.739902][ T2009] ? exc_invalid_op+0x1b/0x50 [ 74.744372][ T2009] ? asm_exc_invalid_op+0x12/0x20 [ 74.749273][ T2009] ? wake_up_klogd+0xb8/0xf0 [ 74.753700][ T2009] ? check_map_prog_compatibility+0x65b/0x7c0 [ 74.760263][ T2009] resolve_pseudo_ldimm64+0x586/0x1020 [ 74.766712][ T2033] device wg2 entered promiscuous mode [ 74.773045][ T2022] device macsec0 entered promiscuous mode [ 74.784021][ T2009] ? irq_exit_rcu+0x9/0x10 [ 74.835399][ T2009] ? bpf_check+0xf2b0/0xf2b0 [ 74.850767][ T2009] ? bpf_check+0x3684/0xf2b0 [ 74.855332][ T2009] ? bpf_check+0x58d0/0xf2b0 [ 74.859799][ T2009] bpf_check+0xaf21/0xf2b0 [ 74.884259][ T2009] ? ctx_flexible_sched_in+0x100/0x100 [ 74.906266][ T2009] ? kvm_sched_clock_read+0x18/0x40 [ 74.911306][ T2009] ? bpf_prog_e3071fbae9fcb7cf+0x2e0/0xdbc [ 74.955985][ T2009] ? bpf_get_btf_vmlinux+0x60/0x60 [ 74.975208][ T2009] ? __kernel_text_address+0x9b/0x110 [ 75.002521][ T2009] ? unwind_get_return_address+0x4d/0x90 [ 75.014556][ T2009] ? arch_stack_walk+0xf3/0x140 [ 75.049582][ T2009] ? stack_trace_save+0x113/0x1c0 [ 75.061198][ T2009] ? stack_trace_snprint+0xf0/0xf0 [ 75.066438][ T2009] ? finish_task_switch+0x130/0x5a0 [ 75.071552][ T2009] ? selinux_bpf_prog_alloc+0x51/0x140 [ 75.076951][ T2009] ? selinux_bpf_prog_alloc+0x51/0x140 [ 75.085736][ T2009] ? ____kasan_kmalloc+0xed/0x110 [ 75.118616][ T2009] ? ____kasan_kmalloc+0xdb/0x110 [ 75.125382][ T2009] ? __kasan_kmalloc+0x9/0x10 [ 75.132687][ T24] audit: type=1400 audit(1731668884.259:149): avc: denied { create } for pid=2056 comm="syz.3.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 75.152068][ T2009] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 75.184993][ T2009] ? selinux_bpf_prog_alloc+0x51/0x140 [ 75.197438][ T2009] ? security_bpf_prog_alloc+0x62/0x90 [ 75.204671][ T2009] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 75.212746][ T24] audit: type=1400 audit(1731668884.339:150): avc: denied { create } for pid=2058 comm="syz.1.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 75.245236][ T2009] ? __x64_sys_bpf+0x7b/0x90 [ 75.250265][ T2009] ? do_syscall_64+0x34/0x70 [ 75.257183][ T2009] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 75.284998][ T2009] ? kvm_sched_clock_read+0x18/0x40 [ 75.295078][ T2009] ? sched_clock+0x3a/0x40 [ 75.309250][ T2009] ? sched_clock_cpu+0x1b/0x3b0 [ 75.326438][ T2009] ? sched_clock+0x3a/0x40 [ 75.330743][ T2009] ? __irq_exit_rcu+0x40/0x150 [ 75.340280][ T2069] device syzkaller0 entered promiscuous mode [ 75.356675][ T2009] ? irq_exit_rcu+0x9/0x10 [ 75.360925][ T2009] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 75.400023][ T2009] __se_sys_bpf+0x107a2/0x11cb0 [ 75.404723][ T2009] ? __kasan_check_write+0x14/0x20 [ 75.459742][ T2009] ? __x64_sys_bpf+0x90/0x90 [ 75.464179][ T2009] ? futex_wake+0x630/0x790 [ 75.486819][ T2009] ? kvm_sched_clock_read+0x18/0x40 [ 75.496272][ T2009] ? send_sigqueue+0x610/0x610 [ 75.506668][ T2009] ? __irq_exit_rcu+0x40/0x150 [ 75.511275][ T2009] ? __send_signal+0x8b5/0xb90 [ 75.546253][ T2009] ? send_signal+0x4c1/0x5e0 [ 75.557334][ T2009] ? _raw_spin_unlock_irqrestore+0x51/0x80 [ 75.569078][ T2009] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 75.608005][ T2009] ? do_send_sig_info+0xfb/0x230 [ 75.676408][ T2009] ? group_send_sig_info+0x1b0/0x320 [ 75.681528][ T2009] ? __lock_task_sighand+0x100/0x100 [ 75.757865][ T2009] ? bpf_send_signal_common+0x2d8/0x420 [ 75.787608][ T2009] ? lapic_next_event+0x5f/0x70 [ 75.792294][ T2009] ? bpf_do_trace_printk+0x270/0x270 [ 75.821222][ T2009] ? bpf_send_signal+0x19/0x20 [ 75.835660][ T2009] ? fpu__clear_all+0x20/0x20 [ 75.850435][ T2009] ? __kasan_check_read+0x11/0x20 [ 75.862210][ T2083] device macsec0 entered promiscuous mode [ 75.873098][ T2009] __x64_sys_bpf+0x7b/0x90 [ 75.889547][ T2009] do_syscall_64+0x34/0x70 [ 75.913863][ T2009] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 75.965450][ T2009] RIP: 0033:0x7febfc799719 [ 75.980080][ T2009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.071149][ T2009] RSP: 002b:00007febfb3f1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 76.097050][ T2009] RAX: ffffffffffffffda RBX: 00007febfc951058 RCX: 00007febfc799719 [ 76.122340][ T2009] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 76.153191][ T2009] RBP: 00007febfc80c75e R08: 0000000000000000 R09: 0000000000000000 [ 76.181571][ T2009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 76.205814][ T2009] R13: 0000000000000000 R14: 00007febfc951058 R15: 00007fff04e9dc78 [ 76.228039][ T2009] ---[ end trace 02d4aa10368682b0 ]--- [ 76.417064][ T2085] device syzkaller0 entered promiscuous mode [ 76.742444][ T2108] device wg2 entered promiscuous mode [ 76.959227][ T2128] device pim6reg1 entered promiscuous mode [ 77.982437][ T2195] geneve1: tun_chr_ioctl cmd 1074025681 [ 79.037468][ T2254] device syzkaller0 entered promiscuous mode [ 79.540210][ T2254] device macsec0 entered promiscuous mode [ 79.960311][ T2291] device veth1_macvtap left promiscuous mode [ 79.966151][ T2291] device macsec0 left promiscuous mode [ 80.258315][ T2314] device pim6reg1 entered promiscuous mode [ 80.738687][ T24] audit: type=1400 audit(1731668889.849:151): avc: denied { ioctl } for pid=2332 comm="syz.1.572" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.236906][ T2375] device bridge0 entered promiscuous mode [ 81.909066][ T2411] syz.3.592[2411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.909112][ T2411] syz.3.592[2411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.008920][ T95] udevd[95]: worker [1050] terminated by signal 33 (Unknown signal 33) [ 83.147364][ T95] udevd[95]: worker [1050] failed while handling '/devices/virtual/block/loop1' [ 83.175468][ T2495] device syzkaller0 entered promiscuous mode [ 83.369051][ T2639] device pim6reg1 entered promiscuous mode [ 85.520666][ T24] audit: type=1400 audit(1731668894.649:152): avc: denied { append } for pid=2753 comm="syz.4.669" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 85.789401][ T2759] device wg2 left promiscuous mode [ 88.611593][ T2844] device veth1_macvtap left promiscuous mode [ 88.617775][ T2844] device macsec0 left promiscuous mode [ 88.757707][ T2830] device veth1_macvtap entered promiscuous mode [ 88.766788][ T2830] device macsec0 entered promiscuous mode [ 88.906357][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 89.431068][ T2881] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.438061][ T2881] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.499658][ T2881] device bridge0 left promiscuous mode [ 89.649060][ T2883] device bridge_slave_1 left promiscuous mode [ 89.665011][ T2883] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.737051][ T2883] device bridge_slave_0 left promiscuous mode [ 89.816046][ T2883] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.924198][ T2936] device syzkaller0 entered promiscuous mode [ 92.465153][ T24] audit: type=1400 audit(1731668901.589:153): avc: denied { create } for pid=2963 comm="syz.2.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 92.547932][ T2967] ЊЊЊЊЊЊ: renamed from vlan0 [ 92.646300][ T24] audit: type=1400 audit(1731668901.669:154): avc: denied { create } for pid=2963 comm="syz.2.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 93.097454][ T2984] FAULT_INJECTION: forcing a failure. [ 93.097454][ T2984] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 93.123523][ T2984] CPU: 0 PID: 2984 Comm: syz.0.730 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 93.134546][ T2984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 93.144419][ T2984] Call Trace: [ 93.147562][ T2984] dump_stack_lvl+0x1e2/0x24b [ 93.152154][ T2984] ? bfq_pos_tree_add_move+0x43b/0x43b [ 93.157445][ T2984] ? wake_up_klogd+0xb8/0xf0 [ 93.161915][ T2984] dump_stack+0x15/0x17 [ 93.166046][ T2984] should_fail+0x3c6/0x510 [ 93.170289][ T2984] should_fail_usercopy+0x1a/0x20 [ 93.175149][ T2984] _copy_from_user+0x20/0xd0 [ 93.179577][ T2984] __copy_msghdr_from_user+0xaf/0x7c0 [ 93.184788][ T2984] ? __ia32_sys_shutdown+0x70/0x70 [ 93.189734][ T2984] ___sys_sendmsg+0x166/0x2e0 [ 93.194240][ T2984] ? sched_clock+0x3a/0x40 [ 93.198499][ T2984] ? __sys_sendmsg+0x280/0x280 [ 93.203098][ T2984] ? __irq_exit_rcu+0x40/0x150 [ 93.207700][ T2984] ? __fget_files+0x7b/0x380 [ 93.212135][ T2984] ? __fdget+0x1bc/0x240 [ 93.216209][ T2984] __se_sys_sendmsg+0x1b1/0x280 [ 93.220895][ T2984] ? hrtimer_interrupt+0x6a8/0x8b0 [ 93.225854][ T2984] ? __x64_sys_sendmsg+0x90/0x90 [ 93.230629][ T2984] ? debug_smp_processor_id+0x17/0x20 [ 93.235824][ T2984] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 93.241731][ T2984] __x64_sys_sendmsg+0x7b/0x90 [ 93.246322][ T2984] do_syscall_64+0x34/0x70 [ 93.250573][ T2984] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 93.256400][ T2984] RIP: 0033:0x7f602f5c6719 [ 93.260650][ T2984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.280095][ T2984] RSP: 002b:00007f602e21e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 93.288337][ T2984] RAX: ffffffffffffffda RBX: 00007f602f77e058 RCX: 00007f602f5c6719 [ 93.296148][ T2984] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 93.303962][ T2984] RBP: 00007f602e21e090 R08: 0000000000000000 R09: 0000000000000000 [ 93.311772][ T2984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.319665][ T2984] R13: 0000000000000000 R14: 00007f602f77e058 R15: 00007fff1cdbf2c8 [ 94.801721][ T3049] syz.4.750[3049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.801779][ T3049] syz.4.750[3049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.182882][ T3062] FAULT_INJECTION: forcing a failure. [ 95.182882][ T3062] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.296419][ T3062] CPU: 1 PID: 3062 Comm: syz.4.752 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 95.307443][ T3062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 95.317322][ T3062] Call Trace: [ 95.320463][ T3062] dump_stack_lvl+0x1e2/0x24b [ 95.325066][ T3062] ? bfq_pos_tree_add_move+0x43b/0x43b [ 95.330352][ T3062] ? __irq_exit_rcu+0x40/0x150 [ 95.334950][ T3062] dump_stack+0x15/0x17 [ 95.338949][ T3062] should_fail+0x3c6/0x510 [ 95.343292][ T3062] should_fail_usercopy+0x1a/0x20 [ 95.348156][ T3062] _copy_from_user+0x20/0xd0 [ 95.352587][ T3062] iovec_from_user+0xc7/0x330 [ 95.357090][ T3062] __import_iovec+0x6d/0x3b0 [ 95.361608][ T3062] ? __ia32_sys_shutdown+0x70/0x70 [ 95.366554][ T3062] ? sched_clock+0x3a/0x40 [ 95.370799][ T3062] import_iovec+0xe5/0x120 [ 95.375137][ T3062] ___sys_sendmsg+0x215/0x2e0 [ 95.379744][ T3062] ? __sys_sendmsg+0x280/0x280 [ 95.384348][ T3062] ? __fdget+0x1bc/0x240 [ 95.388430][ T3062] __se_sys_sendmsg+0x1b1/0x280 [ 95.393101][ T3062] ? hrtimer_interrupt+0x6a8/0x8b0 [ 95.398055][ T3062] ? __x64_sys_sendmsg+0x90/0x90 [ 95.402828][ T3062] ? debug_smp_processor_id+0x17/0x20 [ 95.408037][ T3062] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 95.413940][ T3062] __x64_sys_sendmsg+0x7b/0x90 [ 95.418541][ T3062] do_syscall_64+0x34/0x70 [ 95.422794][ T3062] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 95.428680][ T3062] RIP: 0033:0x7ff09d4e8719 [ 95.432932][ T3062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.452381][ T3062] RSP: 002b:00007ff09c11f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 95.460616][ T3062] RAX: ffffffffffffffda RBX: 00007ff09d6a0130 RCX: 00007ff09d4e8719 [ 95.468726][ T3062] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005 [ 95.476505][ T3062] RBP: 00007ff09c11f090 R08: 0000000000000000 R09: 0000000000000000 [ 95.484745][ T3062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.492647][ T3062] R13: 0000000000000000 R14: 00007ff09d6a0130 R15: 00007ffdaff020c8 [ 95.968739][ T3083] device pim6reg1 entered promiscuous mode [ 96.171902][ T3089] syz.1.761[3089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.171957][ T3089] syz.1.761[3089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.879521][ T3112] device syzkaller0 entered promiscuous mode [ 97.387021][ T3129] device veth0_vlan left promiscuous mode [ 97.406630][ T3129] device veth0_vlan entered promiscuous mode [ 97.427692][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.441039][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.483094][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.827370][ T3147] device veth0_vlan left promiscuous mode [ 97.848100][ T3147] device veth0_vlan entered promiscuous mode [ 97.898334][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.907572][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.916715][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 101.990940][ T3287] device syzkaller0 entered promiscuous mode [ 102.018872][ T3291] syz.2.824[3291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.018912][ T3291] syz.2.824[3291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.255513][ T3320] batadv_slave_1: mtu less than device minimum [ 103.058130][ T3367] syzkaller0: refused to change device tx_queue_len [ 103.067237][ T24] audit: type=1400 audit(1731668912.199:155): avc: denied { remove_name } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 103.076652][ T3364] device syzkaller0 entered promiscuous mode [ 103.116269][ T24] audit: type=1400 audit(1731668912.199:156): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 104.839425][ T24] audit: type=1400 audit(1731668913.959:157): avc: denied { create } for pid=3391 comm="syz.3.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 105.518717][ T3438] device veth1_macvtap left promiscuous mode [ 105.526393][ T3438] device macsec0 left promiscuous mode [ 108.462402][ T3522] syz.0.896[3522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.462456][ T3522] syz.0.896[3522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.608997][ T3530] device pim6reg1 entered promiscuous mode [ 108.740271][ T3531] device syzkaller0 entered promiscuous mode [ 109.436773][ T3578] device veth1_macvtap left promiscuous mode [ 109.450500][ T3578] device macsec0 left promiscuous mode [ 109.467363][ T3580] device veth1_macvtap entered promiscuous mode [ 109.476599][ T3580] device macsec0 entered promiscuous mode [ 111.167386][ T3631] device syzkaller0 entered promiscuous mode [ 112.971026][ T3675] device veth1_macvtap left promiscuous mode [ 112.989752][ T3675] device macsec0 left promiscuous mode [ 114.389022][ T3723] device veth1_macvtap entered promiscuous mode [ 114.396284][ T3723] device macsec0 entered promiscuous mode [ 114.412600][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 114.916525][ T3730] device pim6reg1 entered promiscuous mode [ 116.474504][ T24] audit: type=1400 audit(1731668925.599:158): avc: denied { create } for pid=3779 comm="syz.2.969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 117.266575][ T3842] device pim6reg1 entered promiscuous mode [ 119.831472][ T3945] device syzkaller0 entered promiscuous mode [ 120.344626][ T3953] syz.2.1020[3953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.344681][ T3953] syz.2.1020[3953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.762724][ T3959] syz.0.1022[3959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.833415][ T3959] syz.0.1022[3959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.138255][ T3959] device wg2 entered promiscuous mode [ 123.567382][ T4058] device sit0 entered promiscuous mode [ 123.709649][ T4073] device syzkaller0 entered promiscuous mode [ 123.950772][ T4107] device syzkaller0 entered promiscuous mode [ 123.973426][ T4112] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.980387][ T4112] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.007340][ T4112] device bridge0 left promiscuous mode [ 124.016576][ T4112] device bridge_slave_1 left promiscuous mode [ 124.022677][ T4112] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.030424][ T4112] device bridge_slave_0 left promiscuous mode [ 124.036650][ T4112] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.362624][ T4132] device syzkaller0 entered promiscuous mode [ 125.001551][ T4165] device pim6reg1 entered promiscuous mode [ 125.247675][ T4174] device veth0_vlan left promiscuous mode [ 125.269684][ T4174] device veth0_vlan entered promiscuous mode [ 125.285101][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.310979][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 125.336978][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.704810][ T24] audit: type=1400 audit(1731668934.829:159): avc: denied { create } for pid=4208 comm="syz.1.1096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 130.254021][ T4381] device syzkaller0 entered promiscuous mode [ 131.483944][ T4419] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.502358][ T4419] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.990318][ T4530] device wg2 left promiscuous mode [ 135.066691][ T4530] device wg2 entered promiscuous mode [ 135.367009][ T4548] tap0: tun_chr_ioctl cmd 1074025677 [ 135.376253][ T4548] tap0: linktype set to 825 [ 135.999083][ T4551] device pim6reg1 entered promiscuous mode [ 136.170852][ T4557] syz.1.1195[4557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.170913][ T4557] syz.1.1195[4557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.789783][ T4570] pim6reg0: tun_chr_ioctl cmd 1074025680 [ 137.889441][ T4587] device pim6reg1 entered promiscuous mode [ 139.797238][ T4664] device syzkaller0 entered promiscuous mode [ 139.852143][ T24] audit: type=1400 audit(1731668948.979:160): avc: denied { create } for pid=4683 comm="syz.0.1232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 139.886810][ T24] audit: type=1400 audit(1731668949.019:161): avc: denied { append } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.923455][ T24] audit: type=1400 audit(1731668949.019:162): avc: denied { open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 139.946316][ T24] audit: type=1400 audit(1731668949.019:163): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 140.286063][ T95] udevd[95]: worker [2631] terminated by signal 33 (Unknown signal 33) [ 140.346305][ T95] udevd[95]: worker [2631] failed while handling '/devices/virtual/block/loop4' [ 142.073977][ T24] audit: type=1400 audit(1731668951.199:164): avc: denied { create } for pid=4743 comm="syz.3.1249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 146.254036][ T4821] device syzkaller0 entered promiscuous mode [ 147.482971][ T4851] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.489837][ T4851] bridge0: port 2(bridge_slave_1) entered listening state [ 147.496879][ T4851] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.503617][ T4851] bridge0: port 1(bridge_slave_0) entered listening state [ 147.727889][ T4851] device bridge0 entered promiscuous mode [ 147.959013][ T4860] device pim6reg1 entered promiscuous mode [ 148.016341][ T4859] device veth0_vlan left promiscuous mode [ 148.023537][ T4859] device veth0_vlan entered promiscuous mode [ 148.047768][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.066076][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.153810][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 148.496408][ T4876] device syzkaller0 entered promiscuous mode [ 148.510067][ T4873] device pim6reg1 entered promiscuous mode [ 149.218849][ T4894] device veth0_vlan left promiscuous mode [ 149.477123][ T4894] device veth0_vlan entered promiscuous mode [ 149.661225][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.691703][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.707802][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.726753][ T4909] device pim6reg1 entered promiscuous mode [ 149.755725][ T4910] device veth0_vlan left promiscuous mode [ 149.780876][ T4910] device veth0_vlan entered promiscuous mode [ 149.975769][ T4919] Т: renamed from pim6reg1 [ 151.305678][ T24] audit: type=1400 audit(1731668960.429:165): avc: denied { create } for pid=4965 comm="syz.3.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 152.669226][ T5023] device sit0 entered promiscuous mode [ 153.182760][ T5037] device syzkaller0 entered promiscuous mode [ 156.058052][ T5117] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.065181][ T5117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.075699][ T5117] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.082700][ T5117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.295679][ T5117] device bridge0 entered promiscuous mode [ 156.396295][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.673913][ T5147] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 158.011821][ T5147] device syzkaller0 entered promiscuous mode [ 158.020780][ T5157] syz.3.1369[5157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.020835][ T5157] syz.3.1369[5157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.104952][ T5263] device pim6reg1 entered promiscuous mode [ 160.218777][ T5271] device syzkaller0 entered promiscuous mode [ 160.270556][ T5278] syz.4.1402[5278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.270612][ T5278] syz.4.1402[5278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.521312][ T95] udevd[95]: worker [308] terminated by signal 33 (Unknown signal 33) [ 160.632936][ T95] udevd[95]: worker [308] failed while handling '/devices/virtual/block/loop0' [ 160.836554][ T95] udevd[95]: worker [5300] terminated by signal 33 (Unknown signal 33) [ 160.844650][ T95] udevd[95]: worker [5300] failed while handling '/devices/virtual/block/loop3' [ 161.580641][ T5311] device pim6reg1 entered promiscuous mode [ 161.846412][ T5326] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.853327][ T5326] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.006847][ T5326] device bridge0 left promiscuous mode [ 162.140277][ T5326] device veth0_vlan left promiscuous mode [ 162.165404][ T5326] device veth0_vlan entered promiscuous mode [ 162.177977][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.186116][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.210629][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.441955][ T5342] device syzkaller0 entered promiscuous mode [ 163.229078][ T5355] device sit0 entered promiscuous mode [ 167.008967][ T5472] device syzkaller0 entered promiscuous mode [ 169.345928][ T5565] syz.3.1489[5565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.345981][ T5565] syz.3.1489[5565] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.506488][ T5563] syz.3.1489[5563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.047524][ T5619] syz.4.1507[5619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.246576][ T5619] syz.4.1507[5619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.960754][ T5668] device syzkaller0 entered promiscuous mode [ 172.878980][ T5694] device veth1_macvtap entered promiscuous mode [ 172.887279][ T5694] device macsec0 entered promiscuous mode [ 173.001348][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 173.594953][ T5733] FAULT_INJECTION: forcing a failure. [ 173.594953][ T5733] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 173.686246][ T5733] CPU: 1 PID: 5733 Comm: syz.4.1541 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 173.697347][ T5733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 173.707351][ T5733] Call Trace: [ 173.710494][ T5733] dump_stack_lvl+0x1e2/0x24b [ 173.714986][ T5733] ? bfq_pos_tree_add_move+0x43b/0x43b [ 173.720289][ T5733] dump_stack+0x15/0x17 [ 173.724278][ T5733] should_fail+0x3c6/0x510 [ 173.728615][ T5733] should_fail_usercopy+0x1a/0x20 [ 173.733467][ T5733] _copy_from_user+0x20/0xd0 [ 173.737966][ T5733] sock_ioctl+0x648/0x760 [ 173.742069][ T5733] ? sock_poll+0x340/0x340 [ 173.746320][ T5733] ? security_file_ioctl+0x84/0xb0 [ 173.751265][ T5733] ? sock_poll+0x340/0x340 [ 173.755519][ T5733] __se_sys_ioctl+0x114/0x190 [ 173.760035][ T5733] __x64_sys_ioctl+0x7b/0x90 [ 173.764458][ T5733] do_syscall_64+0x34/0x70 [ 173.768707][ T5733] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 173.774433][ T5733] RIP: 0033:0x7ff09d4e8719 [ 173.778698][ T5733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.798125][ T5733] RSP: 002b:00007ff09c161038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 173.806367][ T5733] RAX: ffffffffffffffda RBX: 00007ff09d69ff80 RCX: 00007ff09d4e8719 [ 173.814179][ T5733] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000a [ 173.821993][ T5733] RBP: 00007ff09c161090 R08: 0000000000000000 R09: 0000000000000000 [ 173.829802][ T5733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.837611][ T5733] R13: 0000000000000000 R14: 00007ff09d69ff80 R15: 00007ffdaff020c8 [ 176.108813][ T5784] FAULT_INJECTION: forcing a failure. [ 176.108813][ T5784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 176.143543][ T5784] CPU: 1 PID: 5784 Comm: syz.1.1556 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 176.154641][ T5784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 176.164540][ T5784] Call Trace: [ 176.167671][ T5784] dump_stack_lvl+0x1e2/0x24b [ 176.172184][ T5784] ? bfq_pos_tree_add_move+0x43b/0x43b [ 176.177471][ T5784] ? finish_task_switch+0x252/0x5a0 [ 176.182520][ T5784] dump_stack+0x15/0x17 [ 176.186675][ T5784] should_fail+0x3c6/0x510 [ 176.190923][ T5784] should_fail_usercopy+0x1a/0x20 [ 176.195787][ T5784] _copy_from_user+0x20/0xd0 [ 176.200207][ T5784] vti6_ioctl+0x41b/0x17d0 [ 176.204476][ T5784] ? schedule+0x154/0x1d0 [ 176.208636][ T5784] ? vti6_tnl_xmit+0x1780/0x1780 [ 176.213407][ T5784] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 176.220021][ T5784] ? preempt_count_add+0x92/0x1a0 [ 176.224864][ T5784] ? full_name_hash+0xbd/0xf0 [ 176.229371][ T5784] dev_ifsioc+0x6a1/0xae0 [ 176.233538][ T5784] ? dev_ioctl+0xb40/0xb40 [ 176.237794][ T5784] ? dev_get_by_name_rcu+0xc5/0xf0 [ 176.242734][ T5784] dev_ioctl+0x5cc/0xb40 [ 176.246814][ T5784] sock_ioctl+0x685/0x760 [ 176.250982][ T5784] ? sock_poll+0x340/0x340 [ 176.255237][ T5784] ? security_file_ioctl+0x84/0xb0 [ 176.260195][ T5784] ? sock_poll+0x340/0x340 [ 176.264449][ T5784] __se_sys_ioctl+0x114/0x190 [ 176.268953][ T5784] __x64_sys_ioctl+0x7b/0x90 [ 176.273374][ T5784] do_syscall_64+0x34/0x70 [ 176.277651][ T5784] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 176.283359][ T5784] RIP: 0033:0x7fa5b6bab719 [ 176.287605][ T5784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.307061][ T5784] RSP: 002b:00007fa5b5824038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 176.315295][ T5784] RAX: ffffffffffffffda RBX: 00007fa5b6d62f80 RCX: 00007fa5b6bab719 [ 176.323108][ T5784] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000a [ 176.330914][ T5784] RBP: 00007fa5b5824090 R08: 0000000000000000 R09: 0000000000000000 [ 176.338852][ T5784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.346657][ T5784] R13: 0000000000000000 R14: 00007fa5b6d62f80 R15: 00007ffc51c890f8 [ 177.678244][ T5832] FAULT_INJECTION: forcing a failure. [ 177.678244][ T5832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 177.828812][ T5836] FAULT_INJECTION: forcing a failure. [ 177.828812][ T5836] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 178.026801][ T5832] CPU: 1 PID: 5832 Comm: syz.3.1570 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 178.037893][ T5832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 178.047782][ T5832] Call Trace: [ 178.050921][ T5832] dump_stack_lvl+0x1e2/0x24b [ 178.055424][ T5832] ? bfq_pos_tree_add_move+0x43b/0x43b [ 178.060716][ T5832] ? 0xffffffffa0026000 [ 178.064715][ T5832] ? is_bpf_text_address+0x172/0x190 [ 178.069830][ T5832] dump_stack+0x15/0x17 [ 178.073915][ T5832] should_fail+0x3c6/0x510 [ 178.078169][ T5832] should_fail_usercopy+0x1a/0x20 [ 178.083026][ T5832] _copy_from_user+0x20/0xd0 [ 178.087456][ T5832] __se_sys_bpf+0x232/0x11cb0 [ 178.091963][ T5832] ? stack_trace_save+0x113/0x1c0 [ 178.096823][ T5832] ? terminate_walk+0x407/0x4f0 [ 178.101515][ T5832] ? stack_trace_snprint+0xf0/0xf0 [ 178.106508][ T5832] ? kmem_cache_free+0xa9/0x1e0 [ 178.111145][ T5832] ? kmem_cache_free+0xa9/0x1e0 [ 178.115832][ T5832] ? kasan_set_track+0x5d/0x70 [ 178.120454][ T5832] ? __x64_sys_bpf+0x90/0x90 [ 178.124863][ T5832] ? __kasan_slab_free+0x11/0x20 [ 178.129635][ T5832] ? slab_free_freelist_hook+0xc0/0x190 [ 178.135018][ T5832] ? kmem_cache_free+0xa9/0x1e0 [ 178.139698][ T5832] ? putname+0xe7/0x140 [ 178.143696][ T5832] ? do_sys_openat2+0x1fc/0x710 [ 178.148376][ T5832] ? __x64_sys_openat+0x243/0x290 [ 178.153242][ T5832] ? do_syscall_64+0x34/0x70 [ 178.157666][ T5832] ? _kstrtoull+0x3a0/0x4a0 [ 178.162004][ T5832] ? kstrtouint_from_user+0x20a/0x2a0 [ 178.167211][ T5832] ? kstrtol_from_user+0x310/0x310 [ 178.172165][ T5832] ? memset+0x35/0x40 [ 178.175978][ T5832] ? __fsnotify_parent+0x4b9/0x6c0 [ 178.180934][ T5832] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 178.187346][ T5832] ? proc_fail_nth_write+0x20b/0x290 [ 178.192466][ T5832] ? proc_fail_nth_read+0x210/0x210 [ 178.197503][ T5832] ? security_file_permission+0x86/0xb0 [ 178.202891][ T5832] ? rw_verify_area+0x1c3/0x360 [ 178.207570][ T5832] ? preempt_count_add+0x92/0x1a0 [ 178.212430][ T5832] ? vfs_write+0x852/0xe70 [ 178.216684][ T5832] ? kmem_cache_free+0xa9/0x1e0 [ 178.221371][ T5832] ? kernel_write+0x3d0/0x3d0 [ 178.225971][ T5832] ? __kasan_check_write+0x14/0x20 [ 178.230917][ T5832] ? mutex_lock+0xa5/0x110 [ 178.235170][ T5832] ? mutex_trylock+0xa0/0xa0 [ 178.239595][ T5832] ? __kasan_check_write+0x14/0x20 [ 178.244541][ T5832] ? fput_many+0x160/0x1b0 [ 178.248800][ T5832] ? debug_smp_processor_id+0x17/0x20 [ 178.254001][ T5832] __x64_sys_bpf+0x7b/0x90 [ 178.258255][ T5832] do_syscall_64+0x34/0x70 [ 178.262509][ T5832] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 178.268233][ T5832] RIP: 0033:0x7f4385605719 [ 178.272505][ T5832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.291926][ T5832] RSP: 002b:00007f438427e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 178.300171][ T5832] RAX: ffffffffffffffda RBX: 00007f43857bcf80 RCX: 00007f4385605719 [ 178.307984][ T5832] RDX: 0000000000000010 RSI: 0000000020000d40 RDI: 0000000000000011 [ 178.315795][ T5832] RBP: 00007f438427e090 R08: 0000000000000000 R09: 0000000000000000 [ 178.323606][ T5832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.331456][ T5832] R13: 0000000000000000 R14: 00007f43857bcf80 R15: 00007ffcc4734ca8 [ 178.386234][ T5836] CPU: 1 PID: 5836 Comm: syz.1.1572 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 178.397339][ T5836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 178.407220][ T5836] Call Trace: [ 178.410367][ T5836] dump_stack_lvl+0x1e2/0x24b [ 178.414881][ T5836] ? bfq_pos_tree_add_move+0x43b/0x43b [ 178.420178][ T5836] dump_stack+0x15/0x17 [ 178.424155][ T5836] should_fail+0x3c6/0x510 [ 178.428497][ T5836] should_fail_usercopy+0x1a/0x20 [ 178.433361][ T5836] _copy_to_user+0x20/0x90 [ 178.437607][ T5836] simple_read_from_buffer+0xc7/0x150 [ 178.442821][ T5836] proc_fail_nth_read+0x1a3/0x210 [ 178.447686][ T5836] ? proc_fault_inject_write+0x390/0x390 [ 178.453143][ T5836] ? security_file_permission+0x86/0xb0 [ 178.458530][ T5836] ? rw_verify_area+0x1c3/0x360 [ 178.463219][ T5836] ? full_name_hash+0xbd/0xf0 [ 178.467727][ T5836] ? proc_fault_inject_write+0x390/0x390 [ 178.473191][ T5836] vfs_read+0x200/0xba0 [ 178.477182][ T5836] ? netdev_refcnt_read+0x1e0/0x1e0 [ 178.482212][ T5836] ? kernel_read+0x70/0x70 [ 178.486474][ T5836] ? __kasan_check_write+0x14/0x20 [ 178.491512][ T5836] ? mutex_lock+0xa5/0x110 [ 178.495769][ T5836] ? mutex_trylock+0xa0/0xa0 [ 178.500187][ T5836] ? __fdget_pos+0x2e7/0x3a0 [ 178.504691][ T5836] ? ksys_read+0x77/0x2c0 [ 178.508857][ T5836] ksys_read+0x199/0x2c0 [ 178.513111][ T5836] ? vfs_write+0xe70/0xe70 [ 178.517384][ T5836] ? debug_smp_processor_id+0x17/0x20 [ 178.522572][ T5836] __x64_sys_read+0x7b/0x90 [ 178.526927][ T5836] do_syscall_64+0x34/0x70 [ 178.531170][ T5836] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 178.536943][ T5836] RIP: 0033:0x7fa5b6baa15c [ 178.541146][ T5836] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 178.560590][ T5836] RSP: 002b:00007fa5b5824030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 178.568829][ T5836] RAX: ffffffffffffffda RBX: 00007fa5b6d62f80 RCX: 00007fa5b6baa15c [ 178.576647][ T5836] RDX: 000000000000000f RSI: 00007fa5b58240a0 RDI: 000000000000000b [ 178.584450][ T5836] RBP: 00007fa5b5824090 R08: 0000000000000000 R09: 0000000000000000 [ 178.592259][ T5836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.600082][ T5836] R13: 0000000000000000 R14: 00007fa5b6d62f80 R15: 00007ffc51c890f8 [ 180.469556][ T5880] device macsec0 left promiscuous mode [ 180.663019][ T5880] device macsec0 entered promiscuous mode [ 181.648645][ T5905] device syzkaller0 entered promiscuous mode [ 182.112564][ T5960] device syzkaller0 entered promiscuous mode [ 182.122060][ T24] audit: type=1400 audit(1731668991.249:166): avc: denied { create } for pid=5961 comm="syz.1.1627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 182.208853][ T5971] syz.0.1620[5971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.208909][ T5971] syz.0.1620[5971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.650160][ T5968] device wg2 left promiscuous mode [ 182.667145][ T5971] device wg2 entered promiscuous mode [ 183.921864][ T6021] device syzkaller0 entered promiscuous mode [ 184.184902][ T24] audit: type=1400 audit(1731668993.299:167): avc: denied { create } for pid=6049 comm="syz.0.1646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 185.175020][ T6090] device pim6reg1 entered promiscuous mode [ 186.809085][ T6146] device pim6reg1 entered promiscuous mode [ 189.100545][ T6252] device syzkaller0 entered promiscuous mode [ 190.355677][ T6305] device pim6reg1 entered promiscuous mode [ 190.687811][ T6319] device pim6reg1 entered promiscuous mode [ 191.414373][ T6346] device wg2 left promiscuous mode [ 191.537018][ T6357] device syzkaller0 entered promiscuous mode [ 191.984249][ T6360] device syzkaller0 entered promiscuous mode [ 193.240898][ T6405] device syzkaller0 entered promiscuous mode [ 194.351092][ T6414] device syzkaller0 entered promiscuous mode [ 196.004473][ T6529] syz.3.1789[6529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.004527][ T6529] syz.3.1789[6529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.051560][ T6528] syz.3.1789[6528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.282608][ T6570] device pim6reg1 entered promiscuous mode [ 197.614246][ T6590] device syzkaller0 entered promiscuous mode [ 198.189207][ T6605] ЊЊЊЊЊЊ: renamed from vlan0 [ 204.246260][ T6784] џџџџџџ: renamed from vlan1 [ 204.662185][ T6803] Y­4`в˜: renamed from lo [ 204.754672][ T6807] device sit0 left promiscuous mode [ 204.884446][ T6810] device sit0 entered promiscuous mode [ 204.908966][ T6813] device syzkaller0 entered promiscuous mode [ 205.025645][ T6822] device veth0_vlan left promiscuous mode [ 205.069463][ T6822] device veth0_vlan entered promiscuous mode [ 205.335081][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.346892][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.356579][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 205.369797][ T6835] device pim6reg1 entered promiscuous mode [ 205.572051][ T1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 205.599254][ T6862] device pim6reg1 entered promiscuous mode [ 206.947065][ T6946] device veth1_macvtap left promiscuous mode [ 206.952872][ T6946] device macsec0 left promiscuous mode [ 207.133927][ T6949] device pim6reg1 entered promiscuous mode [ 207.847919][ T6971] syz.3.1908[6971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.848002][ T6971] syz.3.1908[6971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.398011][ T6993] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.419698][ T6993] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.432755][ T6993] device bridge0 left promiscuous mode [ 210.430335][ T24] audit: type=1400 audit(1731669019.559:168): avc: denied { create } for pid=7057 comm="syz.0.1935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 211.661122][ T7124] FAULT_INJECTION: forcing a failure. [ 211.661122][ T7124] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 211.795338][ T7124] CPU: 1 PID: 7124 Comm: syz.1.1956 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 211.806434][ T7124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 211.816496][ T7124] Call Trace: [ 211.819629][ T7124] dump_stack_lvl+0x1e2/0x24b [ 211.824160][ T7124] ? bfq_pos_tree_add_move+0x43b/0x43b [ 211.829425][ T7124] ? debug_smp_processor_id+0x17/0x20 [ 211.834632][ T7124] ? __irq_exit_rcu+0x40/0x150 [ 211.839230][ T7124] dump_stack+0x15/0x17 [ 211.843223][ T7124] should_fail+0x3c6/0x510 [ 211.847476][ T7124] should_fail_usercopy+0x1a/0x20 [ 211.852334][ T7124] _copy_from_user+0x20/0xd0 [ 211.856770][ T7124] __copy_msghdr_from_user+0xaf/0x7c0 [ 211.861970][ T7124] ? __ia32_sys_shutdown+0x70/0x70 [ 211.866919][ T7124] ___sys_sendmsg+0x166/0x2e0 [ 211.871431][ T7124] ? __sys_sendmsg+0x280/0x280 [ 211.876031][ T7124] ? rw_verify_area+0x1c3/0x360 [ 211.880725][ T7124] ? __fdget+0x1bc/0x240 [ 211.884803][ T7124] __se_sys_sendmsg+0x1b1/0x280 [ 211.889486][ T7124] ? __x64_sys_sendmsg+0x90/0x90 [ 211.894253][ T7124] ? ksys_write+0x260/0x2c0 [ 211.898599][ T7124] ? debug_smp_processor_id+0x17/0x20 [ 211.903801][ T7124] __x64_sys_sendmsg+0x7b/0x90 [ 211.908412][ T7124] do_syscall_64+0x34/0x70 [ 211.912672][ T7124] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 211.918384][ T7124] RIP: 0033:0x7fa5b6bab719 [ 211.922635][ T7124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.942163][ T7124] RSP: 002b:00007fa5b5824038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 211.950610][ T7124] RAX: ffffffffffffffda RBX: 00007fa5b6d62f80 RCX: 00007fa5b6bab719 [ 211.958926][ T7124] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000004 [ 211.966734][ T7124] RBP: 00007fa5b5824090 R08: 0000000000000000 R09: 0000000000000000 [ 211.974557][ T7124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.982469][ T7124] R13: 0000000000000000 R14: 00007fa5b6d62f80 R15: 00007ffc51c890f8 [ 212.018745][ T7140] device pim6reg1 entered promiscuous mode [ 212.151063][ T7145] device syzkaller0 entered promiscuous mode [ 212.553247][ T7180] FAULT_INJECTION: forcing a failure. [ 212.553247][ T7180] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 212.598975][ T7180] CPU: 1 PID: 7180 Comm: syz.2.1974 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 212.610082][ T7180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 212.619966][ T7180] Call Trace: [ 212.623112][ T7180] dump_stack_lvl+0x1e2/0x24b [ 212.627614][ T7180] ? bfq_pos_tree_add_move+0x43b/0x43b [ 212.632908][ T7180] ? debug_smp_processor_id+0x17/0x20 [ 212.638118][ T7180] ? __irq_exit_rcu+0x40/0x150 [ 212.642709][ T7180] dump_stack+0x15/0x17 [ 212.646701][ T7180] should_fail+0x3c6/0x510 [ 212.650957][ T7180] should_fail_usercopy+0x1a/0x20 [ 212.655817][ T7180] _copy_from_user+0x20/0xd0 [ 212.660246][ T7180] __copy_msghdr_from_user+0x587/0x7c0 [ 212.665540][ T7180] ? __ia32_sys_shutdown+0x70/0x70 [ 212.670492][ T7180] ___sys_sendmsg+0x166/0x2e0 [ 212.675009][ T7180] ? __sys_sendmsg+0x280/0x280 [ 212.679615][ T7180] ? rw_verify_area+0x1c3/0x360 [ 212.684298][ T7180] ? __fdget+0x1bc/0x240 [ 212.688365][ T7180] __se_sys_sendmsg+0x1b1/0x280 [ 212.693052][ T7180] ? __x64_sys_sendmsg+0x90/0x90 [ 212.697827][ T7180] ? ksys_write+0x260/0x2c0 [ 212.702171][ T7180] ? debug_smp_processor_id+0x17/0x20 [ 212.707374][ T7180] __x64_sys_sendmsg+0x7b/0x90 [ 212.711975][ T7180] do_syscall_64+0x34/0x70 [ 212.716223][ T7180] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 212.721946][ T7180] RIP: 0033:0x7febfc799719 [ 212.726203][ T7180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 212.745724][ T7180] RSP: 002b:00007febfb412038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 212.753977][ T7180] RAX: ffffffffffffffda RBX: 00007febfc950f80 RCX: 00007febfc799719 [ 212.761779][ T7180] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: 0000000000000004 [ 212.769851][ T7180] RBP: 00007febfb412090 R08: 0000000000000000 R09: 0000000000000000 [ 212.777663][ T7180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 212.785474][ T7180] R13: 0000000000000000 R14: 00007febfc950f80 R15: 00007fff04e9dc78 [ 212.936758][ T7203] device veth1_macvtap left promiscuous mode [ 212.951777][ T7203] device macsec0 left promiscuous mode [ 212.981052][ T7203] device veth1_macvtap entered promiscuous mode [ 212.996558][ T7203] device macsec0 entered promiscuous mode [ 213.836689][ T24] audit: type=1400 audit(1731669022.959:169): avc: denied { write } for pid=7241 comm="syz.0.1995" name="net" dev="proc" ino=36080 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 213.870959][ T24] audit: type=1400 audit(1731669022.959:170): avc: denied { add_name } for pid=7241 comm="syz.0.1995" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 213.904594][ T24] audit: type=1400 audit(1731669022.969:171): avc: denied { create } for pid=7241 comm="syz.0.1995" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 213.937040][ T24] audit: type=1400 audit(1731669022.969:172): avc: denied { associate } for pid=7241 comm="syz.0.1995" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 214.174124][ T7225] GPL: port 1(erspan0) entered blocking state [ 214.183075][ T7225] GPL: port 1(erspan0) entered disabled state [ 214.189519][ T7225] device erspan0 entered promiscuous mode [ 214.210910][ T7246] device pim6reg1 entered promiscuous mode [ 214.507302][ T7259] device syzkaller0 entered promiscuous mode [ 215.973192][ T7286] device pim6reg1 entered promiscuous mode [ 217.058502][ T7311] device pim6reg1 entered promiscuous mode [ 217.391304][ T7324] device sit0 left promiscuous mode [ 217.458011][ T7324] device sit0 entered promiscuous mode [ 218.486106][ T7359] device pim6reg1 entered promiscuous mode [ 218.818991][ T7364] syz.2.2036[7364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.819046][ T7364] syz.2.2036[7364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.120669][ T7403] device pim6reg1 entered promiscuous mode [ 221.319097][ T7417] device syzkaller0 entered promiscuous mode [ 223.489608][ T7477] device macsec0 left promiscuous mode [ 224.073183][ T7480] device bridge_slave_1 left promiscuous mode [ 224.094357][ T7480] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.101729][ T7480] device bridge_slave_0 left promiscuous mode [ 224.107726][ T7480] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.157065][ T7475] GPL: port 1(erspan0) entered blocking state [ 224.163355][ T7475] GPL: port 1(erspan0) entered forwarding state [ 224.188925][ T7475] device GPL entered promiscuous mode [ 224.369159][ T7495] device pim6reg1 entered promiscuous mode [ 225.137580][ T7503] device veth0_vlan left promiscuous mode [ 225.147066][ T7503] device veth0_vlan entered promiscuous mode [ 225.162791][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 225.933056][ T7526] device veth0_vlan left promiscuous mode [ 225.957355][ T7526] device veth0_vlan entered promiscuous mode [ 225.976708][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.984793][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 226.264325][ T369] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.905407][ T7554] device pim6reg1 entered promiscuous mode [ 227.623705][ T7582] device sit0 left promiscuous mode [ 227.637754][ T7588] device sit0 entered promiscuous mode [ 230.352124][ T7677] device sit0 left promiscuous mode [ 230.364032][ T7678] device sit0 entered promiscuous mode [ 232.422243][ T7807] device pim6reg1 entered promiscuous mode [ 232.517123][ T7811] device syzkaller0 entered promiscuous mode [ 235.850821][ T7921] device pim6reg1 entered promiscuous mode [ 236.461500][ T7926] device macsec0 entered promiscuous mode [ 238.667743][ T8054] dvmrp1: tun_chr_ioctl cmd 1074812117 [ 239.020073][ T8056] device syzkaller0 entered promiscuous mode [ 240.015914][ T8106] device pim6reg1 entered promiscuous mode [ 240.236305][ T8112] pim6reg0: tun_chr_ioctl cmd 1074025680 [ 242.305704][ T8187] device pim6reg1 entered promiscuous mode [ 242.386596][ T8202] device pim6reg1 entered promiscuous mode [ 242.578385][ T24] audit: type=1400 audit(1731669051.709:173): avc: denied { create } for pid=8210 comm="syz.0.2274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 245.541585][ T8280] device pim6reg1 entered promiscuous mode [ 245.997369][ T8291] device veth0_vlan left promiscuous mode [ 246.003238][ T8291] device veth0_vlan entered promiscuous mode [ 246.028829][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.040677][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 246.123759][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.329142][ T8339] device veth1_macvtap entered promiscuous mode [ 247.398773][ T8339] device macsec0 entered promiscuous mode [ 247.613280][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.891380][ T8360] device pim6reg1 entered promiscuous mode [ 248.078074][ T8374] device pim6reg1 entered promiscuous mode [ 248.123245][ T8373] device syzkaller0 entered promiscuous mode [ 248.368713][ T8390] device syzkaller0 entered promiscuous mode [ 248.894161][ T8413] device pim6reg1 entered promiscuous mode [ 248.905505][ T8415] device pim6reg1 entered promiscuous mode [ 249.206501][ T8449] device veth0_vlan left promiscuous mode [ 249.226614][ T8449] device veth0_vlan entered promiscuous mode [ 249.271549][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 249.283937][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 249.309233][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 249.474154][ T8470] device pim6reg1 entered promiscuous mode [ 249.866973][ T8475] device veth0_vlan left promiscuous mode [ 249.977067][ T8475] device veth0_vlan entered promiscuous mode [ 250.054189][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.063669][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 250.079702][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.793249][ T8516] device pim6reg1 entered promiscuous mode [ 251.025394][ T8521] device wg2 entered promiscuous mode [ 251.244917][ T8548] device pim6reg1 entered promiscuous mode [ 252.315168][ T8598] device pim6reg1 entered promiscuous mode [ 254.942951][ T8674] device syzkaller0 entered promiscuous mode [ 255.664236][ T8709] device pim6reg1 entered promiscuous mode [ 257.121625][ T8759] device wg2 left promiscuous mode [ 260.701332][ T8867] syz.2.2459[8867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.703548][ T8867] syz.2.2459[8867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.089962][ T95] udevd[95]: worker [8865] terminated by signal 33 (Unknown signal 33) [ 261.391504][ T95] udevd[95]: worker [8865] failed while handling '/devices/virtual/block/loop2' [ 263.379759][ T8958] device veth1_macvtap entered promiscuous mode [ 263.387149][ T8958] device macsec0 entered promiscuous mode [ 263.482515][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 264.067946][ T9018] device syzkaller0 entered promiscuous mode [ 264.972773][ T9042] device pim6reg1 entered promiscuous mode [ 266.852818][ T9065] device syzkaller0 entered promiscuous mode [ 268.249488][ T9092] device veth0_vlan left promiscuous mode [ 268.310381][ T9092] device veth0_vlan entered promiscuous mode [ 268.395597][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.403854][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.411622][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџ: link becomes ready [ 269.206973][ T9123] : renamed from ipvlan1 [ 269.794922][ T9145] device pim6reg1 entered promiscuous mode [ 269.849095][ T9161] device pim6reg1 entered promiscuous mode [ 270.185163][ T9172] device vlan0 entered promiscuous mode [ 270.274426][ T9173] device sit0 entered promiscuous mode [ 270.761220][ T9206] device pim6reg1 entered promiscuous mode [ 272.495005][ T9292] device syzkaller0 entered promiscuous mode [ 272.918407][ T9322] device pim6reg1 entered promiscuous mode [ 272.967364][ T9317] device pim6reg1 entered promiscuous mode [ 273.287132][ T9335] device syzkaller0 entered promiscuous mode [ 273.636206][ T9387] device pim6reg1 entered promiscuous mode [ 273.913564][ T9405] device sit0 left promiscuous mode [ 273.936912][ T9420] device sit0 entered promiscuous mode [ 274.008800][ T9430] device pim6reg1 entered promiscuous mode [ 274.279438][ T9437] syz.0.2621[9437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.279498][ T9437] syz.0.2621[9437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.173649][ T9490] device syzkaller0 entered promiscuous mode [ 275.998190][ T9520] device veth0_vlan left promiscuous mode [ 276.067936][ T9520] device veth0_vlan entered promiscuous mode [ 277.263869][ T9541] device pim6reg1 entered promiscuous mode [ 278.840722][ T9568] device veth1_macvtap left promiscuous mode [ 278.917942][ T9568] device macsec0 left promiscuous mode [ 280.061846][ T9595] device pim6reg1 entered promiscuous mode [ 280.847474][ T9608] device syzkaller0 entered promiscuous mode [ 281.632886][ T9628] device veth1_macvtap left promiscuous mode [ 281.682715][ T9628] device macsec0 left promiscuous mode [ 284.906348][ T9708] device veth0_vlan left promiscuous mode [ 285.035257][ T9708] device veth0_vlan entered promiscuous mode [ 285.275200][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.303521][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.362265][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 287.297700][ T9765] tap0: tun_chr_ioctl cmd 1074812118 [ 289.103266][ T9809] device syzkaller0 entered promiscuous mode [ 289.610957][ T9832] device pim6reg1 entered promiscuous mode [ 290.417808][ T9862] device macsec0 left promiscuous mode [ 290.613337][ T9860] device macsec0 entered promiscuous mode [ 290.721055][ T9869] syz.1.2743[9869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.721111][ T9869] syz.1.2743[9869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.810844][ T9879] device pim6reg1 entered promiscuous mode [ 292.020557][ T9939] device pim6reg1 entered promiscuous mode [ 292.171252][ T9936] device macsec0 left promiscuous mode [ 294.149180][ T9997] syz.2.2782[9997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.149239][ T9997] syz.2.2782[9997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.540710][T10026] pim6reg0: tun_chr_ioctl cmd 1074025698 [ 295.183761][T10033] device syzkaller0 entered promiscuous mode [ 296.199792][T10110] Т: renamed from pim6reg1 [ 297.754102][T10157] device pim6reg1 entered promiscuous mode [ 297.926422][T10164] rose0: tun_chr_ioctl cmd 1074025681 [ 298.217407][T10173] syz.3.2833[10173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.217459][T10173] syz.3.2833[10173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.620252][T10184] device syzkaller0 entered promiscuous mode [ 298.688565][T10197] device veth0_vlan left promiscuous mode [ 298.722669][T10197] device veth0_vlan entered promiscuous mode [ 298.792274][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.801217][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): ЊЊЊЊЊЊ: link becomes ready [ 298.809170][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.051274][T10199] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.058328][T10199] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.065655][T10199] device bridge_slave_0 entered promiscuous mode [ 299.074815][T10199] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.085103][T10199] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.092369][T10199] device bridge_slave_1 entered promiscuous mode [ 299.116578][T10205] device pim6reg1 entered promiscuous mode [ 299.161079][ T24] audit: type=1400 audit(1731669108.289:174): avc: denied { write } for pid=10199 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 299.190704][T10199] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.197694][T10199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.204860][T10199] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.211697][T10199] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.218914][ T24] audit: type=1400 audit(1731669108.309:175): avc: denied { read } for pid=10199 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 299.495080][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.539035][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.666366][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.777723][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.785967][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.792844][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.800746][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.809649][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.816529][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.824813][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.832781][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.840781][T10238] device pim6reg1 entered promiscuous mode [ 299.974224][T10199] device veth0_vlan entered promiscuous mode [ 299.986777][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 299.995201][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.003360][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.011251][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 300.080424][T10199] device veth1_macvtap entered promiscuous mode [ 300.125882][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 300.141784][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 300.183453][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 300.245265][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 300.285154][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 300.317627][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 300.326060][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 300.354407][ T24] audit: type=1400 audit(1731669109.479:176): avc: denied { mounton } for pid=10199 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 300.389786][ T1161] device veth1_macvtap left promiscuous mode [ 300.401775][ T1161] device veth0_vlan left promiscuous mode [ 300.642467][T10267] device pim6reg1 entered promiscuous mode [ 300.653607][T10256] device veth0_vlan left promiscuous mode [ 300.703316][T10256] device veth0_vlan entered promiscuous mode [ 301.890231][T10298] device syzkaller0 entered promiscuous mode [ 302.378767][T10309] device pim6reg1 entered promiscuous mode [ 304.164358][T10357] device wg2 entered promiscuous mode [ 305.318120][T10404] device pim6reg1 entered promiscuous mode [ 305.571486][T10400] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.611024][T10400] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.727253][T10400] device bridge_slave_0 entered promiscuous mode [ 305.815354][T10400] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.880017][T10400] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.902060][T10400] device bridge_slave_1 entered promiscuous mode [ 305.976924][T10400] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.983913][T10400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.991014][T10400] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.997884][T10400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.032892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.041157][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.051109][T10444] syz.0.2906[10444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.051162][T10444] syz.0.2906[10444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.063164][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.155002][T10400] device veth0_vlan entered promiscuous mode [ 306.161464][T10448] device pim6reg1 entered promiscuous mode [ 306.186892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 306.195411][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.203946][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 306.212638][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 306.232273][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.240553][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.247432][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.254751][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 306.263142][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.270010][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.277611][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 306.291300][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 306.303995][T10400] device veth1_macvtap entered promiscuous mode [ 306.344890][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 306.374869][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 306.390538][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 306.734736][T10488] device syzkaller0 entered promiscuous mode [ 306.836396][T10490] device pim6reg1 entered promiscuous mode [ 306.847530][T10498] device pim6reg1 entered promiscuous mode [ 306.923583][T10505] device dummy0 entered promiscuous mode [ 307.433748][T10548] device syzkaller0 entered promiscuous mode [ 307.455371][T10537] device pim6reg1 entered promiscuous mode [ 308.040371][T10571] device pim6reg1 entered promiscuous mode [ 308.514267][T10592] device pim6reg1 entered promiscuous mode [ 308.578319][T10609] device syzkaller0 entered promiscuous mode [ 308.596580][ T2607] syzkaller0: tun_net_xmit 48 [ 308.919151][T10627] device veth0_vlan left promiscuous mode [ 308.982214][T10627] device veth0_vlan entered promiscuous mode [ 309.915661][T10661] device syzkaller0 entered promiscuous mode [ 310.180660][T10692] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.187796][T10692] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.195107][T10692] device bridge_slave_0 entered promiscuous mode [ 310.202446][T10692] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.209549][T10692] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.217333][T10692] device bridge_slave_1 entered promiscuous mode [ 310.283429][T10692] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.290336][T10692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.297404][T10692] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.304442][T10692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.620712][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.636643][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.643842][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.742349][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.078045][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.085047][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.203864][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 311.226288][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.233148][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.268457][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 311.283081][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 311.397475][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 311.465090][T10692] device veth0_vlan entered promiscuous mode [ 311.506797][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 311.603289][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.741448][T10692] device veth1_macvtap entered promiscuous mode [ 311.803515][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.843165][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 311.851972][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 311.865781][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 311.874144][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 311.894598][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 311.928829][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 311.966008][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 311.983964][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 312.086035][ T1161] device veth1_macvtap left promiscuous mode [ 312.301653][T10745] device pim6reg1 entered promiscuous mode [ 312.856752][T10753] device syzkaller0 entered promiscuous mode [ 313.054101][T10759] device veth0_vlan left promiscuous mode [ 313.060774][T10759] device veth0_vlan entered promiscuous mode [ 313.318662][T10776] device pim6reg1 entered promiscuous mode [ 313.779672][T10825] device pim6reg1 entered promiscuous mode [ 313.988216][T10842] device syzkaller0 entered promiscuous mode [ 315.223113][T10887] €Т0: renamed from pim6reg1 [ 315.810426][T10895] device sit0 entered promiscuous mode [ 317.620999][T10922] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.627991][T10922] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.635234][T10922] device bridge_slave_0 entered promiscuous mode [ 317.643616][T10922] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.650513][T10922] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.668742][T10922] device bridge_slave_1 entered promiscuous mode [ 318.156022][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.197507][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 318.306979][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 318.315235][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.323710][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.330565][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.452566][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 318.487619][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.525643][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.534251][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.541129][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.548911][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 318.556934][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 318.575434][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 318.596137][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 318.607131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 318.614448][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 318.625229][T10922] device veth0_vlan entered promiscuous mode [ 318.650026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 318.658319][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 318.667316][T10922] device veth1_macvtap entered promiscuous mode [ 318.679031][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 318.793920][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 318.897582][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 318.994683][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 319.047889][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 319.488686][ T1161] device veth0_vlan left promiscuous mode [ 320.164087][T11058] device pim6reg1 entered promiscuous mode [ 320.420064][ T24] audit: type=1400 audit(1731669129.549:177): avc: denied { create } for pid=11066 comm="syz.4.3087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 320.475957][T11067] device sit0 entered promiscuous mode [ 321.802451][T11104] device veth1_macvtap left promiscuous mode [ 323.174963][T11132] QБ6уз\b‹ЁY­4: renamed from lo [ 329.194315][T11218] syz.0.3129[11218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.194400][T11218] syz.0.3129[11218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.603033][ T24] audit: type=1400 audit(1731669138.729:178): avc: denied { read } for pid=11211 comm="syz.3.3127" name="cgroup.subtree_control" dev="cgroup2" ino=197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 330.288761][T11239] device syzkaller0 entered promiscuous mode [ 332.891954][T11316] device pim6reg1 entered promiscuous mode [ 333.859092][T11341] device pim6reg1 entered promiscuous mode [ 335.460075][T11405] device pim6reg1 entered promiscuous mode [ 335.568650][T11415] device pim6reg1 entered promiscuous mode [ 336.312692][T11446] device syzkaller0 entered promiscuous mode [ 336.706439][T11468] device pim6reg1 entered promiscuous mode [ 337.768971][T11497] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.775828][T11497] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.866596][T11497] device bridge_slave_0 entered promiscuous mode [ 337.873635][T11497] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.880870][T11497] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.888982][T11497] device bridge_slave_1 entered promiscuous mode [ 338.479697][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 338.541879][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.658398][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.666577][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.674697][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.681550][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.744990][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 338.853714][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.936745][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.945101][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.952419][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.964104][T11528] џџџџџџџџ: renamed from vlan1 [ 338.974019][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 338.984175][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 339.001207][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 339.022400][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 339.058012][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 339.129487][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 339.223914][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 339.331564][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.434703][T11497] device veth0_vlan entered promiscuous mode [ 339.448004][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.586736][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 339.753195][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 339.867341][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 340.042695][T11497] device veth1_macvtap entered promiscuous mode [ 340.108917][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 340.223727][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 340.335128][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 340.364903][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 340.386601][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 340.499053][ T1161] GPL: port 1(erspan0) entered disabled state [ 340.519191][ T1161] device erspan0 left promiscuous mode [ 340.609828][ T1161] GPL: port 1(erspan0) entered disabled state [ 340.791703][T11589] device pim6reg1 entered promiscuous mode [ 341.118669][ T1161] device bridge_slave_1 left promiscuous mode [ 341.139424][ T1161] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.233536][ T1161] device bridge_slave_0 left promiscuous mode [ 341.293586][ T1161] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.321658][ T1161] device veth0_vlan left promiscuous mode [ 342.024214][T11639] device pim6reg1 entered promiscuous mode [ 342.483151][T11647] device pim6reg1 entered promiscuous mode [ 342.519388][T11655] device pim6reg1 entered promiscuous mode [ 344.401778][T11686] device pim6reg1 entered promiscuous mode [ 344.493361][T11698] device pim6reg1 entered promiscuous mode [ 344.825615][T11702] device pim6reg1 entered promiscuous mode [ 345.004214][T11706] device pim6reg1 entered promiscuous mode [ 345.754055][T11737] device pim6reg1 entered promiscuous mode [ 347.755919][T11807] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 347.839123][T11807] device syzkaller0 entered promiscuous mode [ 348.215278][T11816] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.587170][ T24] audit: type=1400 audit(1731669157.719:179): avc: denied { create } for pid=11830 comm="syz.4.3299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 348.873994][T11841] device pim6reg1 entered promiscuous mode [ 349.378775][T11862] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.392830][T11862] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.206421][T11911] device veth0_vlan left promiscuous mode [ 350.359061][T11911] device veth0_vlan entered promiscuous mode [ 351.285912][T11922] device syzkaller0 entered promiscuous mode [ 356.211999][T12082] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.785430][T12098] device veth0_vlan left promiscuous mode [ 356.791887][T12098] device veth0_vlan entered promiscuous mode [ 358.076941][T12118] device syzkaller0 entered promiscuous mode [ 358.336372][T12148] gretap0: refused to change device tx_queue_len [ 359.238374][T12173] device veth0_vlan left promiscuous mode [ 359.345205][T12173] device veth0_vlan entered promiscuous mode [ 359.466929][T12182] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.473917][T12182] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.497903][T12183] device bridge_slave_1 left promiscuous mode [ 359.504100][T12183] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.529355][T12183] device bridge_slave_0 left promiscuous mode [ 359.549524][T12183] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.855140][T12200] device syzkaller0 entered promiscuous mode [ 360.798553][T12257] device syzkaller0 entered promiscuous mode [ 361.519816][T12312] device syzkaller0 entered promiscuous mode [ 362.214197][T12333] device sit0 entered promiscuous mode [ 362.420770][T12337] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.432580][T12337] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.550825][T12342] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.557718][T12342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.564793][T12342] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.571729][T12342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.647550][T12342] device bridge0 entered promiscuous mode [ 362.676522][T12352] device pim6reg1 entered promiscuous mode [ 367.475771][T12515] device syzkaller0 entered promiscuous mode [ 367.638685][T12536] syz.0.3500[12536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.638738][T12536] syz.0.3500[12536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.802996][T12542] device pim6reg1 entered promiscuous mode [ 367.884204][T12545] device pim6reg1 entered promiscuous mode [ 367.904584][T12545] FAULT_INJECTION: forcing a failure. [ 367.904584][T12545] name failslab, interval 1, probability 0, space 0, times 1 [ 367.937177][T12545] CPU: 0 PID: 12545 Comm: syz.2.3503 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 367.948367][T12545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 367.958447][T12545] Call Trace: [ 367.961582][T12545] dump_stack_lvl+0x1e2/0x24b [ 367.966097][T12545] ? bfq_pos_tree_add_move+0x43b/0x43b [ 367.971386][T12545] dump_stack+0x15/0x17 [ 367.975405][T12545] should_fail+0x3c6/0x510 [ 367.979660][T12545] ? __alloc_skb+0x80/0x510 [ 367.983971][T12545] __should_failslab+0xa4/0xe0 [ 367.988649][T12545] should_failslab+0x9/0x20 [ 367.992994][T12545] kmem_cache_alloc+0x3d/0x2e0 [ 367.997598][T12545] __alloc_skb+0x80/0x510 [ 368.001756][T12545] ? if_nlmsg_size+0x59c/0x5f0 [ 368.006358][T12545] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 368.011478][T12545] rtmsg_ifinfo+0x78/0x120 [ 368.015734][T12545] dev_close_many+0x2a9/0x530 [ 368.020295][T12545] ? __dev_open+0x4e0/0x4e0 [ 368.024590][T12545] ? __kasan_check_read+0x11/0x20 [ 368.029456][T12545] unregister_netdevice_many+0x492/0x17d0 [ 368.034994][T12545] ? kmem_cache_free+0xa9/0x1e0 [ 368.039685][T12545] ? __kasan_check_write+0x14/0x20 [ 368.044644][T12545] ? __kasan_slab_free+0x11/0x20 [ 368.049403][T12545] ? alloc_netdev_mqs+0xcd0/0xcd0 [ 368.054262][T12545] ? __kasan_check_read+0x11/0x20 [ 368.059123][T12545] unregister_netdevice_queue+0x2e6/0x350 [ 368.064687][T12545] ? linkwatch_urgent_event+0x335/0x4d0 [ 368.070057][T12545] ? list_netdevice+0x4c0/0x4c0 [ 368.074757][T12545] __tun_detach+0xd14/0x1510 [ 368.079177][T12545] ? mutex_trylock+0xa0/0xa0 [ 368.083598][T12545] ? tun_chr_open+0x530/0x530 [ 368.088195][T12545] tun_chr_close+0x92/0x140 [ 368.092539][T12545] __fput+0x33d/0x7b0 [ 368.096356][T12545] ____fput+0x15/0x20 [ 368.100175][T12545] task_work_run+0x129/0x190 [ 368.104607][T12545] exit_to_user_mode_loop+0xbf/0xd0 [ 368.109640][T12545] syscall_exit_to_user_mode+0xa2/0x1a0 [ 368.115110][T12545] do_syscall_64+0x40/0x70 [ 368.119444][T12545] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 368.125169][T12545] RIP: 0033:0x7f1e7b48e719 [ 368.129427][T12545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 368.149039][T12545] RSP: 002b:00007f1e7a107038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 368.157382][T12545] RAX: 0000000000000000 RBX: 00007f1e7b645f80 RCX: 00007f1e7b48e719 [ 368.165179][T12545] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 368.172991][T12545] RBP: 00007f1e7a107090 R08: 0000000000000000 R09: 0000000000000000 [ 368.180801][T12545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 368.188798][T12545] R13: 0000000000000000 R14: 00007f1e7b645f80 R15: 00007ffd33e1d798 [ 368.255832][T12559] syz.0.3506[12559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.255892][T12559] syz.0.3506[12559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.597710][T12661] device veth0_vlan left promiscuous mode [ 371.618219][T12661] device veth0_vlan entered promiscuous mode [ 373.205111][T12695] џџџџџџ: renamed from vlan1 [ 373.359580][T12698] device syzkaller0 entered promiscuous mode [ 373.863686][T12705] device pim6reg1 entered promiscuous mode [ 375.064913][T12742] device sit0 left promiscuous mode [ 375.837586][T12752] device pim6reg1 entered promiscuous mode [ 376.332279][T12769] syz.0.3573[12769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.332337][T12769] syz.0.3573[12769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 378.235112][T12798] device syzkaller0 entered promiscuous mode [ 379.599857][T12818] device syzkaller0 entered promiscuous mode [ 380.079801][T12835] syz.3.3591[12835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.089999][T12835] syz.3.3591[12835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.231434][T12839] device pim6reg1 entered promiscuous mode [ 381.940683][T12867] device veth0_vlan left promiscuous mode [ 382.119260][T12867] device veth0_vlan entered promiscuous mode [ 382.248361][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.258810][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.418187][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџџџ: link becomes ready [ 386.093114][T13036] device veth1_macvtap left promiscuous mode [ 386.099054][T13036] device macsec0 entered promiscuous mode [ 386.423613][T13060] device pim6reg1 entered promiscuous mode [ 386.585942][T13060] FAULT_INJECTION: forcing a failure. [ 386.585942][T13060] name failslab, interval 1, probability 0, space 0, times 0 [ 386.598817][T13060] CPU: 0 PID: 13060 Comm: syz.3.3652 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 386.609995][T13060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 386.619882][T13060] Call Trace: [ 386.623156][T13060] dump_stack_lvl+0x1e2/0x24b [ 386.627737][T13060] ? bfq_pos_tree_add_move+0x43b/0x43b [ 386.633038][T13060] ? node_free_rcu+0x30/0x30 [ 386.637539][T13060] dump_stack+0x15/0x17 [ 386.641972][T13060] should_fail+0x3c6/0x510 [ 386.646223][T13060] ? nf_nat_masq_schedule+0x2b9/0x5a0 [ 386.651431][T13060] __should_failslab+0xa4/0xe0 [ 386.656047][T13060] should_failslab+0x9/0x20 [ 386.660372][T13060] kmem_cache_alloc_trace+0x3a/0x2e0 [ 386.665495][T13060] nf_nat_masq_schedule+0x2b9/0x5a0 [ 386.670529][T13060] ? masq_inet_event+0x250/0x250 [ 386.675299][T13060] ? masq_device_event+0xd0/0xd0 [ 386.680075][T13060] ? masq_inet6_event+0xd2/0x180 [ 386.684853][T13060] ? memcpy+0x56/0x70 [ 386.688757][T13060] masq_inet6_event+0x124/0x180 [ 386.693434][T13060] ? inet_cmp+0x230/0x230 [ 386.697605][T13060] ? __kasan_check_write+0x14/0x20 [ 386.702637][T13060] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 386.707515][T13060] atomic_notifier_call_chain+0x95/0x100 [ 386.712983][T13060] inet6addr_notifier_call_chain+0x24/0x30 [ 386.718646][T13060] addrconf_ifdown+0xe21/0x1a60 [ 386.723308][T13060] ? addrconf_cleanup+0x1b0/0x1b0 [ 386.728158][T13060] ? __kasan_check_write+0x14/0x20 [ 386.733276][T13060] ? mutex_lock+0xa5/0x110 [ 386.737619][T13060] ? mutex_trylock+0xa0/0xa0 [ 386.742042][T13060] ? __kasan_check_write+0x14/0x20 [ 386.747009][T13060] addrconf_notify+0x378/0xe90 [ 386.751677][T13060] raw_notifier_call_chain+0x8c/0xf0 [ 386.756800][T13060] dev_close_many+0x37f/0x530 [ 386.761399][T13060] ? __dev_open+0x4e0/0x4e0 [ 386.765741][T13060] ? __kasan_check_read+0x11/0x20 [ 386.770683][T13060] unregister_netdevice_many+0x492/0x17d0 [ 386.776417][T13060] ? kmem_cache_free+0xa9/0x1e0 [ 386.781190][T13060] ? __kasan_check_write+0x14/0x20 [ 386.786141][T13060] ? __kasan_slab_free+0x11/0x20 [ 386.790907][T13060] ? alloc_netdev_mqs+0xcd0/0xcd0 [ 386.795764][T13060] ? add_timer+0x68/0x80 [ 386.799934][T13060] ? __queue_delayed_work+0x16d/0x1f0 [ 386.805168][T13060] ? __kasan_check_read+0x11/0x20 [ 386.810022][T13060] unregister_netdevice_queue+0x2e6/0x350 [ 386.815594][T13060] ? linkwatch_urgent_event+0x335/0x4d0 [ 386.821026][T13060] ? list_netdevice+0x4c0/0x4c0 [ 386.825716][T13060] __tun_detach+0xd14/0x1510 [ 386.830674][T13060] ? mutex_trylock+0xa0/0xa0 [ 386.835078][T13060] ? tun_chr_open+0x530/0x530 [ 386.839676][T13060] tun_chr_close+0x92/0x140 [ 386.844005][T13060] __fput+0x33d/0x7b0 [ 386.847833][T13060] ____fput+0x15/0x20 [ 386.851642][T13060] task_work_run+0x129/0x190 [ 386.856074][T13060] exit_to_user_mode_loop+0xbf/0xd0 [ 386.861196][T13060] syscall_exit_to_user_mode+0xa2/0x1a0 [ 386.866664][T13060] do_syscall_64+0x40/0x70 [ 386.870916][T13060] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 386.876641][T13060] RIP: 0033:0x7f04910d5719 [ 386.880900][T13060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.900615][T13060] RSP: 002b:00007f048fd4e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 386.908844][T13060] RAX: 0000000000000000 RBX: 00007f049128cf80 RCX: 00007f04910d5719 [ 386.916656][T13060] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 386.924465][T13060] RBP: 00007f048fd4e090 R08: 0000000000000000 R09: 0000000000000000 [ 386.932274][T13060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 386.940086][T13060] R13: 0000000000000000 R14: 00007f049128cf80 R15: 00007ffdf8a40ef8 [ 386.949116][T13070] syz.4.3653[13070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.949171][T13070] syz.4.3653[13070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.287701][T13081] device veth1_macvtap left promiscuous mode [ 387.669565][T13084] device veth1_macvtap entered promiscuous mode [ 387.675816][T13084] device macsec0 entered promiscuous mode [ 389.272502][T13122] FAULT_INJECTION: forcing a failure. [ 389.272502][T13122] name failslab, interval 1, probability 0, space 0, times 0 [ 389.398449][T13122] CPU: 1 PID: 13122 Comm: syz.2.3669 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 389.409648][T13122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 389.419651][T13122] Call Trace: [ 389.422781][T13122] dump_stack_lvl+0x1e2/0x24b [ 389.427287][T13122] ? panic+0x812/0x812 [ 389.431202][T13122] ? bfq_pos_tree_add_move+0x43b/0x43b [ 389.436492][T13122] ? __kasan_slab_free+0x11/0x20 [ 389.441258][T13122] ? slab_free_freelist_hook+0xc0/0x190 [ 389.446646][T13122] dump_stack+0x15/0x17 [ 389.451071][T13122] should_fail+0x3c6/0x510 [ 389.455354][T13122] ? kobject_uevent_env+0x269/0x700 [ 389.460354][T13122] __should_failslab+0xa4/0xe0 [ 389.464952][T13122] should_failslab+0x9/0x20 [ 389.469294][T13122] kmem_cache_alloc_trace+0x3a/0x2e0 [ 389.474415][T13122] ? mutex_lock+0xa5/0x110 [ 389.478673][T13122] ? dev_uevent_filter+0xb0/0xb0 [ 389.483451][T13122] kobject_uevent_env+0x269/0x700 [ 389.488394][T13122] ? mutex_unlock+0x1c/0x40 [ 389.492904][T13122] kobject_uevent+0x1f/0x30 [ 389.497225][T13122] device_del+0xd2f/0xf00 [ 389.501411][T13122] ? kill_device+0xd0/0xd0 [ 389.505655][T13122] ? __kasan_check_write+0x14/0x20 [ 389.510600][T13122] ? mutex_unlock+0x1c/0x40 [ 389.514944][T13122] ? pm_runtime_set_memalloc_noio+0x21f/0x270 [ 389.520845][T13122] netdev_unregister_kobject+0x18a/0x250 [ 389.526306][T13122] unregister_netdevice_many+0x1276/0x17d0 [ 389.531945][T13122] ? alloc_netdev_mqs+0xcd0/0xcd0 [ 389.536798][T13122] ? __queue_delayed_work+0x182/0x1f0 [ 389.542012][T13122] ? __kasan_check_read+0x11/0x20 [ 389.546875][T13122] unregister_netdevice_queue+0x2e6/0x350 [ 389.552417][T13122] ? linkwatch_urgent_event+0x65/0x4d0 [ 389.557721][T13122] ? list_netdevice+0x4c0/0x4c0 [ 389.562403][T13122] __tun_detach+0xd14/0x1510 [ 389.566829][T13122] ? mutex_trylock+0xa0/0xa0 [ 389.571339][T13122] ? tun_chr_open+0x530/0x530 [ 389.575855][T13122] tun_chr_close+0x92/0x140 [ 389.580208][T13122] __fput+0x33d/0x7b0 [ 389.584022][T13122] ____fput+0x15/0x20 [ 389.587836][T13122] task_work_run+0x129/0x190 [ 389.592290][T13122] exit_to_user_mode_loop+0xbf/0xd0 [ 389.597289][T13122] syscall_exit_to_user_mode+0xa2/0x1a0 [ 389.602664][T13122] do_syscall_64+0x40/0x70 [ 389.606923][T13122] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 389.612649][T13122] RIP: 0033:0x7f1e7b48e719 [ 389.616904][T13122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 389.636524][T13122] RSP: 002b:00007f1e7a107038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 389.644762][T13122] RAX: 0000000000000000 RBX: 00007f1e7b645f80 RCX: 00007f1e7b48e719 [ 389.652572][T13122] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 389.660382][T13122] RBP: 00007f1e7a107090 R08: 0000000000000000 R09: 0000000000000000 [ 389.668279][T13122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 389.676179][T13122] R13: 0000000000000000 R14: 00007f1e7b645f80 R15: 00007ffd33e1d798 [ 389.748251][T13132] device veth1_macvtap left promiscuous mode [ 393.320235][T13221] syz.3.3697[13221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.323777][T13221] syz.3.3697[13221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.975701][T13292] syz.1.3719[13292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.987315][T13292] syz.1.3719[13292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.718223][T13320] device pim6reg1 entered promiscuous mode [ 395.897653][T13338] device pim6reg1 entered promiscuous mode [ 396.315673][T13358] device veth1_macvtap left promiscuous mode [ 396.321998][T13358] device macsec0 left promiscuous mode [ 397.153566][T13379] syz.3.3744[13379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.153621][T13379] syz.3.3744[13379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.561454][T13435] FAULT_INJECTION: forcing a failure. [ 398.561454][T13435] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 398.767079][T13435] CPU: 1 PID: 13435 Comm: syz.1.3762 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 398.778261][T13435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 398.788157][T13435] Call Trace: [ 398.791302][T13435] dump_stack_lvl+0x1e2/0x24b [ 398.795816][T13435] ? bfq_pos_tree_add_move+0x43b/0x43b [ 398.801094][T13435] ? irq_exit_rcu+0x9/0x10 [ 398.805340][T13435] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 398.810981][T13435] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 398.816971][T13435] dump_stack+0x15/0x17 [ 398.820964][T13435] should_fail+0x3c6/0x510 [ 398.825217][T13435] should_fail_usercopy+0x1a/0x20 [ 398.830075][T13435] _copy_from_user+0x20/0xd0 [ 398.834501][T13435] __se_sys_bpf+0x232/0x11cb0 [ 398.839018][T13435] ? trace_event_raw_event_bpf_trace_printk+0x175/0x260 [ 398.846133][T13435] ? ktime_get+0x10e/0x140 [ 398.850397][T13435] ? lapic_next_event+0x5f/0x70 [ 398.855091][T13435] ? clockevents_program_event+0x214/0x2c0 [ 398.860712][T13435] ? __x64_sys_bpf+0x90/0x90 [ 398.865147][T13435] ? visit_groups_merge+0x2434/0x24b0 [ 398.870352][T13435] ? ctx_flexible_sched_in+0x100/0x100 [ 398.875642][T13435] ? kvm_sched_clock_read+0x18/0x40 [ 398.880679][T13435] ? ctx_flexible_sched_in+0xa8/0x100 [ 398.885882][T13435] ? ctx_pinned_sched_in+0x100/0x100 [ 398.891003][T13435] ? kvm_sched_clock_read+0x18/0x40 [ 398.896040][T13435] ? sched_clock+0x3a/0x40 [ 398.900300][T13435] ? sched_clock_cpu+0x1b/0x3b0 [ 398.904978][T13435] ? _raw_spin_lock+0xa4/0x1b0 [ 398.909587][T13435] ? _raw_spin_trylock_bh+0x190/0x190 [ 398.914788][T13435] ? ctx_sched_in+0x276/0x310 [ 398.919313][T13435] ? _raw_spin_unlock+0x4d/0x70 [ 398.924006][T13435] ? perf_event_context_sched_in+0x48f/0x580 [ 398.929814][T13435] ? __this_cpu_preempt_check+0x13/0x20 [ 398.935182][T13435] ? __perf_event_task_sched_in+0x219/0x2a0 [ 398.940907][T13435] ? perf_pmu_sched_task+0x190/0x190 [ 398.946030][T13435] ? native_set_ldt+0x360/0x360 [ 398.950727][T13435] ? __this_cpu_preempt_check+0x13/0x20 [ 398.956186][T13435] ? perf_sched_cb_inc+0x260/0x260 [ 398.961138][T13435] ? _raw_spin_unlock_irq+0x4e/0x70 [ 398.966308][T13435] ? finish_task_switch+0x130/0x5a0 [ 398.971340][T13435] ? switch_mm_irqs_off+0x71b/0x9a0 [ 398.976368][T13435] ? __switch_to_asm+0x34/0x60 [ 398.980971][T13435] ? __schedule+0xbee/0x1330 [ 398.985403][T13435] ? __kasan_check_read+0x11/0x20 [ 398.990266][T13435] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 398.996165][T13435] __x64_sys_bpf+0x7b/0x90 [ 399.000496][T13435] do_syscall_64+0x34/0x70 [ 399.004745][T13435] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 399.010472][T13435] RIP: 0033:0x7f353d814719 [ 399.014729][T13435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 399.034224][T13435] RSP: 002b:00007f353c48d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 399.042413][T13435] RAX: ffffffffffffffda RBX: 00007f353d9cbf80 RCX: 00007f353d814719 [ 399.050225][T13435] RDX: 0000000000000080 RSI: 0000000020000640 RDI: 0000000000000005 [ 399.058036][T13435] RBP: 00007f353c48d090 R08: 0000000000000000 R09: 0000000000000000 [ 399.065845][T13435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 399.073745][T13435] R13: 0000000000000000 R14: 00007f353d9cbf80 R15: 00007ffe491500b8 [ 399.767591][T13490] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 399.969976][T13490] device syzkaller0 entered promiscuous mode [ 400.462826][T13512] device syzkaller0 entered promiscuous mode [ 400.941614][T13517] device bridge_slave_1 left promiscuous mode [ 400.951102][T13517] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.994408][T13517] device bridge_slave_0 left promiscuous mode [ 401.005689][T13517] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.205009][T13525] device syzkaller0 entered promiscuous mode [ 402.435340][T13560] device syzkaller0 entered promiscuous mode [ 403.727555][T13593] syz.4.3804[13593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.727612][T13593] syz.4.3804[13593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.741748][T13594] device veth1_macvtap entered promiscuous mode [ 403.781237][T13594] device macsec0 entered promiscuous mode [ 403.841036][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 404.593489][T13634] device syzkaller0 entered promiscuous mode [ 405.508965][T13657] device veth1_macvtap left promiscuous mode [ 406.632513][T13692] syz.0.3834[13692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.632564][T13692] syz.0.3834[13692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.887656][T13747] device veth0_vlan left promiscuous mode [ 409.011939][T13747] device veth0_vlan entered promiscuous mode [ 409.218164][T13745] device sit0 entered promiscuous mode [ 409.321136][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 409.336781][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 409.346440][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџџџ: link becomes ready [ 409.427072][T13767] device syzkaller0 entered promiscuous mode [ 410.496715][T13773] device syzkaller0 entered promiscuous mode [ 413.653460][T13909] device veth0_vlan left promiscuous mode [ 413.734165][T13909] device veth0_vlan entered promiscuous mode [ 413.999499][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.067492][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.228446][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџџџ: link becomes ready [ 416.246787][T13980] device sit0 entered promiscuous mode [ 417.349163][T14039] device wg2 entered promiscuous mode [ 417.554148][T14056] syz.1.3935[14056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.554208][T14056] syz.1.3935[14056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.145712][T14095] device syzkaller0 entered promiscuous mode [ 418.834313][T14156] syz.1.3969[14156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.834371][T14156] syz.1.3969[14156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.789753][T14203] syz.2.3981[14203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.863468][T14206] syz.2.3981[14206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.875124][T14205] syz.4.3982[14205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.945001][T14203] syz.2.3981[14203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.989305][ T24] audit: type=1400 audit(1731669229.119:180): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 420.068536][T14205] syz.4.3982[14205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.321718][ T24] audit: type=1400 audit(1731669229.119:181): avc: denied { unlink } for pid=77 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 420.376107][ T24] audit: type=1400 audit(1731669229.119:182): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 420.521223][T14233] device syzkaller0 entered promiscuous mode [ 421.204334][T14242] device syzkaller0 entered promiscuous mode [ 421.478346][T14265] syz.2.3998[14265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.873973][T14281] device syzkaller0 entered promiscuous mode [ 422.540873][T14278] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.448589][T14353] device wg2 entered promiscuous mode [ 425.048839][T14399] device bridge0 entered promiscuous mode [ 425.111324][T14406] device pim6reg1 entered promiscuous mode [ 425.153534][T14412] ЊЊЊЊЊЊ: renamed from vlan0 [ 425.196852][T14416] device bridge0 left promiscuous mode [ 425.360523][T14416] device bridge0 entered promiscuous mode [ 426.539515][T14452] device sit0 left promiscuous mode [ 429.088328][T14509] device syzkaller0 entered promiscuous mode [ 429.591021][T14523] device syzkaller0 entered promiscuous mode [ 430.981776][T14590] device pim6reg1 entered promiscuous mode [ 432.154951][T14617] bpf_get_probe_write_proto: 1 callbacks suppressed [ 432.154961][T14617] syz.2.4108[14617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.163731][T14617] syz.2.4108[14617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.690855][T14666] device veth0_vlan left promiscuous mode [ 434.765693][T14666] device veth0_vlan entered promiscuous mode [ 434.870359][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 434.899283][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 434.909027][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 436.457468][T14772] device pim6reg1 entered promiscuous mode [ 436.726501][T14787] device syzkaller0 entered promiscuous mode [ 437.244213][T14800] device syzkaller0 entered promiscuous mode [ 437.325874][T14805] device pim6reg1 entered promiscuous mode [ 437.454242][T14824] device syzkaller0 entered promiscuous mode [ 437.499111][T14815] Т: renamed from veth0_vlan [ 437.605194][T14833] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 437.610756][T14833] pim6reg0: linktype set to 776 [ 437.639933][T14836] device syzkaller0 entered promiscuous mode [ 437.821779][T14850] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 438.948987][T14894] device syzkaller0 entered promiscuous mode [ 439.626693][T14918] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 439.676588][T14918] dvmrp1: linktype set to 768 [ 440.460743][T14944] device syzkaller0 entered promiscuous mode [ 440.597970][T14947] device pim6reg1 entered promiscuous mode [ 441.243810][T14978] device pim6reg1 entered promiscuous mode [ 441.651190][T14989] device syzkaller0 entered promiscuous mode [ 445.562348][T15037] device veth0_vlan left promiscuous mode [ 445.641023][T15037] device veth0_vlan entered promiscuous mode [ 445.725244][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 445.733405][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 445.756203][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): џџџџџџџџ: link becomes ready [ 447.006239][T15067] device macsec0 left promiscuous mode [ 448.228674][T15093] bridge0: port 3(veth0) entered blocking state [ 448.235148][T15093] bridge0: port 3(veth0) entered disabled state [ 448.270179][T15093] device veth0 entered promiscuous mode [ 448.284675][T15093] bridge0: port 3(veth0) entered blocking state [ 448.291050][T15093] bridge0: port 3(veth0) entered forwarding state [ 448.417050][ T7] device veth1_macvtap left promiscuous mode [ 449.217233][T15139] bridge0: port 3(gretap0) entered blocking state [ 449.226070][T15139] bridge0: port 3(gretap0) entered disabled state [ 449.240476][T15139] device gretap0 entered promiscuous mode [ 449.246651][T15139] bridge0: port 3(gretap0) entered blocking state [ 449.252892][T15139] bridge0: port 3(gretap0) entered forwarding state [ 449.261061][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 451.137244][T15189] device veth0_vlan left promiscuous mode [ 451.143172][T15189] device veth0_vlan entered promiscuous mode [ 451.157050][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 451.193879][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 451.266449][ T1161] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 451.536970][T15202] syz.2.4273[15202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=6 req=4247 state=3 status=67 (errno 32: Broken pipe) [ 451.537020][T15202] syz.2.4273[15202] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 454.417437][ T7] bridge0: port 3(gretap0) entered disabled state [ 454.436083][ T7] device gretap0 left promiscuous mode [ 454.441353][ T7] bridge0: port 3(gretap0) entered disabled state [ 454.656974][ T7] device veth0 left promiscuous mode [ 454.662114][ T7] bridge0: port 3(veth0) entered disabled state [ 454.668522][ T7] device bridge_slave_1 left promiscuous mode [ 454.674417][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.681599][ T7] device bridge_slave_0 left promiscuous mode [ 454.687568][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.695482][ T7] device bridge_slave_1 left promiscuous mode [ 454.701476][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.708446][ T7] device bridge_slave_0 left promiscuous mode [ 454.714335][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.096632][ T1161] device bridge_slave_1 left promiscuous mode [ 461.102579][ T1161] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.109901][ T1161] device bridge_slave_0 left promiscuous mode [ 461.115905][ T1161] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.123517][ T1161] device veth0_vlan left promiscuous mode