last executing test programs: 16.627197118s ago: executing program 0 (id=580): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000004080)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f0000000000)='syzkaller\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r2}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000380)='%pB \x00') bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{r3}, &(0x7f0000000500), &(0x7f0000000540)='%pB \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_type(r4, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000280), 0x9) r6 = openat$cgroup_procs(r4, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000080), 0x12) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r11}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 16.371440192s ago: executing program 3 (id=585): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xb, 0x6, 0x408, 0x2000cd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) mkdir(&(0x7f0000000400)='./file0\x00', 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000380)='mm_page_alloc\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_freezer_state(r7, &(0x7f0000000380), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000001740)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000000000003000000030000000000000000000006040000000000000000000001000000000000000000"], &(0x7f0000000300)=""/4082, 0x4d, 0xff2, 0x3, 0x10000, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000001380)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYRESOCT=r8, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a2, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89a0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 16.283055479s ago: executing program 2 (id=586): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000003695c8b2c6b79b76e48f7a8c19fc9fa609d25f970fbde592344753cb716310ba712d84ddfec5c502bbfd4fe319a1987dde7d1a2ad942f57b2e2e439092d81c1d26fc80698384685781ca447916f8", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0xcaf5, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x0, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r3, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) write$cgroup_subtree(r7, &(0x7f0000000b40)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102032900fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r11, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r4}, 0x4) 16.153174292s ago: executing program 0 (id=588): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) syz_clone(0x1000100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) close(r2) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x16, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@call={0x85, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='GPL\x00', 0x10001, 0x14, &(0x7f0000000300)=""/20, 0x40f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x7, 0x8, 0xae}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000580)=[{0x5, 0x3, 0xd}, {0x3, 0x1, 0x4, 0xc}, {0x4, 0x5, 0x4, 0x9}, {0x5, 0x1, 0x2, 0x2}, {0x1, 0x4, 0xc, 0x9}, {0x4, 0x2, 0x3, 0x8}, {0x4, 0x1, 0xf, 0xa}, {0x5, 0x3, 0x1, 0x6}], 0x10, 0x3, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0xf}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_devices(r9, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e0306003c5c98012884636086466670841ffe80"], 0xffdd) 16.097357947s ago: executing program 0 (id=589): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r2}, 0x18) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[], 0x2) 15.901269445s ago: executing program 0 (id=591): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000040000"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000cc0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="9feb0100180000000000000000000400007edf82f87101001800050000"], &(0x7f0000000c00)=""/161, 0x1d, 0xa1, 0xfffffffe, 0x0, 0x0, @void, @value}, 0x28) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="0f7135231a4ed01f6d48cb303ba27c1dcb22cf14aa527d503b98aed5ccff60ec4fd5823efdaabfe98c9beaa85c122ed194c27722c5991abe6cc8e4f6c30858eb8061fdc43162b5e83c4d298d007ba6ae675850ba6974f831275172", @ANYRESHEX=r0, @ANYRESHEX=r1, @ANYBLOB="823fbca91549798443eafc8419c521ae3719ed44a7d938eba7f2917d7887a5a953399e3acbd5324d10ce207ed51a5431fe8a2e6f45cc219003583b7b87da9e6c8435e99dc24822e7707bb3585010d7f09f686ed3625475a4e3615469e5b30e7ee0e1e0e077158068447e248d422bdf5b106a735bcfeb8f139bfce323538f4192af479dac884aebcae8856b13ffb58317910d2617a2981c8f15955c246f206c825892d9d25ae6d515416c69115fe33bcc2bd8da7d2836bf804920502b25fce2d5305478782ac1181c226134dcce7c1393970e35ee851c158094915d04", @ANYRESHEX], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40047440, 0x2000000c) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000009d96b718323b3b98841d0a983f18", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000080)='syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xc, 0x10, &(0x7f0000000e40)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r5, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r3, @ANYBLOB="010000000000000000000000a5590e4e00000000", @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="010000000200"/28], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x6, 0x5, 0x9, 0x4, 0x0, 0x8000, 0xd0008, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x6}, 0x10344d, 0x1, 0x3ff, 0x0, 0x100, 0xffff502a, 0x8000, 0x0, 0x8, 0x0, 0x1000}, 0x0, 0x9, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 15.901015475s ago: executing program 4 (id=592): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r3) (fail_nth: 28) 15.453574716s ago: executing program 3 (id=593): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000340)=""/159}, 0x6e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000040)='mm_lru_insertion\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000840)=[{0x20, 0x0, 0x7, 0xfffff010}, {0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000ecff0000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9e}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa33"], 0xfdef) 15.402693431s ago: executing program 1 (id=594): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xab4b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a40)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a80)={0x1}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a80)={0x1, 0xffffffffffffffff}, 0x4) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r0, @ANYBLOB="0a0000000000000000000000000000005c00000086d1ecfc66", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x50) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[], 0x18}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1c0042, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1c0042, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000001c0)='l~\xff\xd8\xf8\x9a0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1d, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r8 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40082404, &(0x7f0000000200)=0x13db) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x2, 0x4, 0x8, 0xffffff81, 0x20, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffc, 0x2, 0x1, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x2, 0x4, 0x8, 0xffffff81, 0x20, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffc, 0x2, 0x1, 0x0, @void, @value, @void, @value}, 0x50) 15.048582763s ago: executing program 1 (id=595): socketpair$tipc(0x1e, 0x2, 0x0, 0x0) (async, rerun: 32) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) sendmsg$tipc(r0, 0x0, 0x0) (async) close(r1) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 64) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_kthread_work_queue_work\x00', r3}, 0x10) (async) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) (async, rerun: 64) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000780)=ANY=[@ANYBLOB="0a000000866e16000000b30000007f00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r4, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000001b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_type(r6, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000280), 0x9) (async) r8 = openat$cgroup_procs(r6, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000c40), 0x12) (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r10, 0x0, 0x0) (async) r11 = openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) (async) write$cgroup_pid(r11, &(0x7f0000000080), 0x12) 15.047317764s ago: executing program 4 (id=596): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240), ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x20, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000800)=""/196, 0x26, 0xc4, 0x1, 0x0, 0x0, @void, @value}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x15, 0x8, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, r4, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x0, '\x00', r3, r4, 0x4, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000480)=ANY=[@ANYRESOCT=r6, @ANYRESDEC=r5, @ANYRESOCT=r2], 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r8}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r11}, 0x10) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$MAP_CREATE(0x0, 0x0, 0x48) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r14}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r15 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r15}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) 15.046117334s ago: executing program 2 (id=597): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x20, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfc1, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@exit, @ldst={0x3, 0x2, 0x3, 0x8, 0x2, 0x80, 0x1}, @map_fd={0x18, 0x8, 0x1, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @ringbuf_query, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x189}]}, &(0x7f0000000300)='syzkaller\x00', 0x976, 0x91, &(0x7f0000000740)=""/145, 0x41100, 0x41, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x5, 0xa, 0x5, 0x70d0}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000880)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000008c0)=[{0x5, 0x2, 0x4, 0x4}, {0x5, 0x2, 0x6, 0x3}, {0x0, 0x3, 0xd, 0x5}, {0x5, 0x2, 0xf, 0x5}, {0x4, 0x3, 0x9, 0x1}], 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}, {0x85, 0x0, 0x0, 0xa4}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000a00)={r0, r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x20, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6d) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x8001}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0xa}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xe}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xd3, &(0x7f0000000a40)=""/211, 0x41100, 0x60, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000300), &(0x7f0000000540)=[{0x5, 0x3, 0x3, 0xa}, {0x5, 0x2, 0xd, 0x3}, {0x5, 0x25, 0xa, 0xb}], 0x10, 0x1, @void, @value}, 0x94) 15.034562385s ago: executing program 2 (id=598): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000004080)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f0000000000)='syzkaller\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r2}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000380)='%pB \x00') bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{r3}, &(0x7f0000000500), &(0x7f0000000540)='%pB \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_type(r4, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000280), 0x9) r6 = openat$cgroup_procs(r4, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000080), 0x12) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r11}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 14.916591556s ago: executing program 1 (id=599): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0xb9e4, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x56, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000700)=@raw=[@ldst={0x2, 0x1, 0x4, 0x2, 0x6, 0xc, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x2}], &(0x7f0000000740)='syzkaller\x00', 0x800, 0x59, &(0x7f0000000780)=""/89, 0x41100, 0x20, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0x2, 0x62b66471, 0x8}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x101, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x10, 0x5, &(0x7f0000000180)=@raw=[@cb_func={0x18, 0x3, 0x4, 0x0, 0x5}, @generic={0x8, 0xc, 0xd, 0x2, 0x1}, @map_fd={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000000200)='GPL\x00', 0x7, 0x49, &(0x7f00000002c0)=""/73, 0x41100, 0x25, '\x00', 0x0, @sk_msg=0x7, r0, 0x8, &(0x7f0000000240)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x5, 0x0, 0x1}, 0x10, r6, r7, 0x0, &(0x7f0000000980)=[r4], 0x0, 0x10, 0x9, @void, @value}, 0x94) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpu.stat\x00', 0x26e1, 0x0) close(r8) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r8, &(0x7f0000000080), 0x11ffffce1) close(r9) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0xb9e4, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x56, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000700)=@raw=[@ldst={0x2, 0x1, 0x4, 0x2, 0x6, 0xc, 0x8}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x2}], &(0x7f0000000740)='syzkaller\x00', 0x800, 0x59, &(0x7f0000000780)=""/89, 0x41100, 0x20, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0x2, 0x62b66471, 0x8}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x101, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x10, 0x5, &(0x7f0000000180)=@raw=[@cb_func={0x18, 0x3, 0x4, 0x0, 0x5}, @generic={0x8, 0xc, 0xd, 0x2, 0x1}, @map_fd={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000000200)='GPL\x00', 0x7, 0x49, &(0x7f00000002c0)=""/73, 0x41100, 0x25, '\x00', 0x0, @sk_msg=0x7, r0, 0x8, &(0x7f0000000240)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x5, 0x0, 0x1}, 0x10, r6, r7, 0x0, &(0x7f0000000980)=[r4], 0x0, 0x10, 0x9, @void, @value}, 0x94) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpu.stat\x00', 0x26e1, 0x0) (async) close(r8) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)) (async) write$cgroup_type(r8, &(0x7f0000000080), 0x11ffffce1) (async) close(r9) (async) close(r3) (async) 14.608219114s ago: executing program 3 (id=600): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06fb6e3d34001200", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd63fecd8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r1, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x3b, &(0x7f0000000580)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000680), &(0x7f00000008c0), 0x8, 0xa5, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@func={0xd, 0x0, 0x0, 0xc, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0xad2000}}, @const={0xe}, @fwd={0x10}, @struct={0x1, 0x3, 0x0, 0x4, 0x0, 0x6, [{0x5, 0x5, 0x2}, {0x1}, {0xe, 0x2, 0x6}]}, @ptr={0x7, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61, 0x30, 0x30]}}, &(0x7f0000000d80)=""/69, 0x96, 0x45, 0x0, 0x4, 0x10000, @value=r0}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="1f00000061970000020000000900000040200100", @ANYRES32=r0, @ANYBLOB="03000000d0980000000000000000ed0000000000", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="02000000000000000200"/24, @ANYRES32=r3, @ANYBLOB], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x6, 0x2, 0x4d9f4346, 0x50a0, r0, 0x6cf, '\x00', 0x0, r3, 0x5, 0x5, 0x4, 0xf, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r6}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000e80)='ns/pid\x00') close(r8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) (async) socketpair(0x18, 0x0, 0x2, &(0x7f0000004080)) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001080)={r7, 0x0, 0x5b, 0x0, &(0x7f0000000d00)="7c9e86e895ee6a9d8e6d029327982f27ab4dadee6e909d25291dbca13801cfcf5567b0961eca5446cbf90db7ae293d1d67e5a9e3070c82c08085ae48f7307946027b4e2202dc01084ee17651f8439e8c6e4bbaef9ead8f933aeb4c", 0x0, 0x970000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}, 0x50) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) sendmsg$inet(r9, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c1c5b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f20cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x41, r11, 0x4}, 0x38) recvmsg$unix(r10, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 14.580133427s ago: executing program 3 (id=601): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r2}, 0x18) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[], 0x2) 14.564671978s ago: executing program 2 (id=602): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x4, &(0x7f0000000000), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1d, 0xffffff01, 0x8, 0x8, 0x3, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x2, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000003000), 0x201, 0x0) 14.465540547s ago: executing program 1 (id=603): r0 = openat$cgroup_root(0xffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000500)={0x0, r2}, 0x10) r4 = openat$cgroup_devices(r0, &(0x7f00000004c0)='devices.deny\x00', 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)=@o_path={&(0x7f0000000400)='./file0\x00', r1, 0x4000, r4}, 0x77) openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="61154c000000000061138c0000000000bfa00000000000001503000008004e002d3501000000000095004100000000006916320000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffbd4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe01c5473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076ebae3f55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932c9a6aa57f1ad2e99e0e67ab93716d20000009fbb0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000f4000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c6939628950000000000000001c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b30410856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff010404faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202ee1192b81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9b5a8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18487b6feb89752cd600000000abc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d5454d127edab14ba61ba1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf855689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18533d4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684e62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961cf4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fd0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a7ae906abc1ae1ae8c4fae92883cfa1978a04bbff4bbe0000000000000000000000000044585397feaadda3fcc64e7b0c08f7ac5c64cb190f1712a3b10fc34eb758705f1751d8c8b712eb39d2b8ad44f129c2c9aedb15"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 14.464431027s ago: executing program 2 (id=604): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xb, 0x6, 0x408, 0x2000cd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) mkdir(&(0x7f0000000400)='./file0\x00', 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000380)='mm_page_alloc\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_freezer_state(r7, &(0x7f0000000380), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000001740)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000000000003000000030000000000000000000006040000000000000000000001000000000000000000"], &(0x7f0000000300)=""/4082, 0x4d, 0xff2, 0x3, 0x10000, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000001380)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYRESOCT=r8, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a2, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89a0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 14.459895728s ago: executing program 0 (id=605): socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r0, @ANYBLOB="7240ae5d0168e9743c106d3eccae1d6d3220febd9367e6b7cfe9f6a555d63a3ed3aa758df2c69c147621bfe11fcf7f7769e03fd4bbfdf867680d9269f61bad0bbadf12dcdcc6e6d5b562842b08bffe", @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xc, 0x1, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0xb}], &(0x7f00000002c0)='GPL\x00', 0xfffffff9, 0x7, &(0x7f0000000300)=""/7, 0x40f00, 0x2f, '\x00', 0x0, @fallback=0x5, r2, 0x8, &(0x7f0000000340)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1, 0x5, 0x0, &(0x7f0000000540)=[{0x1, 0x1, 0x6, 0x5}, {0x1, 0x2, 0x9, 0x8}, {0x1, 0x5, 0x2, 0xe}, {0x4, 0x3, 0x8, 0x1}, {0x1, 0x4, 0xc, 0xb}], 0x10, 0xf69d, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x42ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x10000010000000, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x18) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x18, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000000)='^.{@+@\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0x8}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x0, 0x40004}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1bc81a00}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x3, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x4}, {}, {0x4, 0x0, 0x9}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0x2, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 14.458788348s ago: executing program 3 (id=606): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRESHEX=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000020000000000000000085100000080000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r2}, 0x10) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4105}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000001180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f0000000040)=0xffffffffffff241d, 0x12) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 469.317117ms ago: executing program 4 (id=611): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) close(r2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="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"/1810], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x35, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r4, 0x4) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000680)="00ba3b0000", 0x5}], 0x1}, 0x0) 459.346908ms ago: executing program 3 (id=610): write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)={'a', ' *:* ', 'rm\x00'}, 0x9) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = gettid() r2 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xa, 0x5c, 0x3, 0xc4, 0x0, 0x8e46, 0x2, 0xe, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x101060, 0x9, 0x6, 0x1, 0x6, 0x5, 0x7}, r1, 0x3, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x6, 0x8, 0xe5, 0x6, 0x0, 0x9, 0x1000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000140), 0xb}, 0x8, 0x6, 0x2, 0x9, 0x8, 0x1, 0x8, 0x0, 0xca2e8fff, 0x0, 0xfff}, 0x0, 0x10, 0xffffffffffffffff, 0xa) recvmsg(r0, &(0x7f0000000900)={&(0x7f0000000200)=@rc={0x1f, @none}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000280)=""/66, 0x42}, {&(0x7f0000000300)=""/112, 0x70}, {&(0x7f0000000380)=""/24, 0x18}, {&(0x7f00000003c0)=""/19, 0x13}, {&(0x7f0000000400)=""/14, 0xe}, {&(0x7f0000000440)=""/138, 0x8a}, {&(0x7f0000000500)=""/228, 0xe4}, {&(0x7f0000000600)=""/153, 0x99}, {&(0x7f00000006c0)=""/166, 0xa6}], 0x9, &(0x7f0000000840)=""/178, 0xb2}, 0x8000) bpf$ENABLE_STATS(0x20, &(0x7f0000000940), 0x4) bpf$ENABLE_STATS(0x20, &(0x7f0000000980), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f00000009c0)='devlink_health_recover_aborted\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff2, 0x0, 0x0, 0x0, 0xfffffffd}, [@generic={0x4, 0x7, 0x9, 0x9, 0x10}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x4}]}, &(0x7f0000000a80)='GPL\x00', 0x13, 0x5c, &(0x7f0000000ac0)=""/92, 0x0, 0x30, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x5, 0x0, 0x3}, 0x10, 0x1f995, 0xffffffffffffffff, 0x9, 0x0, &(0x7f0000000bc0)=[{0x0, 0x5, 0x9, 0xb}, {0x5, 0x3, 0x4, 0x4}, {0x2, 0x4, 0xf, 0x1}, {0x0, 0x5, 0xa, 0xa}, {0x3, 0x3, 0x3, 0x3}, {0x3, 0x4, 0x10, 0x1}, {0x2, 0x4, 0xf, 0x2}, {0x2, 0x5, 0xf}, {0x3, 0x5, 0xe, 0x2}], 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r2, 0x34, 0x0, 0xd, &(0x7f0000000d40)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000d80)=[0x0], &(0x7f0000000dc0)=[0x0, 0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r6 = openat$cgroup_root(0xffffff9c, &(0x7f0000000ec0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@cgroup=r6, 0xffffffffffffffff, 0x14, 0x2020, r3, @void, @void, @value=0xffffffffffffffff, @void, r5}, 0x20) r7 = syz_open_procfs$namespace(r1, &(0x7f0000000f00)='ns/uts\x00') mkdir(&(0x7f0000000f40)='./file0\x00', 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001400)={r3, 0xe0, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000001180)=[0x0, 0x0, 0x0], &(0x7f00000011c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x41, &(0x7f0000001200)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001240), &(0x7f0000001280), 0x8, 0x96, 0x8, 0x8, &(0x7f00000012c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000014c0)={0x6, 0x1b, &(0x7f0000000f80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7ff}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1ff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @ldst={0x0, 0x0, 0x4, 0x4, 0x8, 0xfffffffffffffff4, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}]}, &(0x7f0000001080)='GPL\x00', 0xfffffff9, 0x47, &(0x7f00000010c0)=""/71, 0x1f8a71128375f8f3, 0x40, '\x00', r8, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001440)={0x2, 0xf, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000001480)=[{0x3, 0x2, 0x10}, {0x1, 0x2, 0x7, 0x9}, {0x1, 0x4, 0x9, 0xb}], 0x10, 0x5, @void, @value}, 0x94) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xc, &(0x7f00000015c0)=@raw=[@exit, @map_fd={0x18, 0x7, 0x1, 0x0, r4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fffffff}}], &(0x7f0000001640)='syzkaller\x00', 0x6, 0x13, &(0x7f0000001680)=""/19, 0x40f00, 0xa, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000016c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000001700)={0x1, 0xe, 0xf6c, 0x81}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001740)=[r4, r4, r4, r4, r4], &(0x7f0000001780)=[{0x1, 0x2, 0xf, 0x8}, {0x3, 0x2, 0xc, 0xb}, {0x0, 0x5, 0x6, 0x2}, {0x0, 0x2, 0x10, 0x5}], 0x10, 0x93d, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001880)={&(0x7f0000001580)='f2fs_file_write_iter\x00', r9, 0x0, 0x6}, 0x18) r10 = openat$cgroup_ro(r6, &(0x7f00000018c0)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) syz_clone(0x25000000, &(0x7f0000001900)="21f7eb900aa1ab97c798f72c44ae5bba1f1040608f0a284ab0c6c52798c7c263800db2cdbe8425", 0x27, &(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)="9033fb88c84936ea6b16c1e90455552a007797f83855b9ddbc425079b7fc43677a618e4d3095c68feac3f79dd431c608ee8470539dc79e10b9c36ea58d72fb876f636673da3dccf11a5eff35dde946e9c40df08d2aba1108157be8ee8d1ca474a4b8c3961e2bb84c5bd46f31a13fcc21e7282dcbe7393d7bd8db2a60e214fded907e5a7250400c015e35dd83f7e6d4c52a86a0079ff409ab9c8f62faca657835e7d5ab787791e56fa344e39e4d4bdc3f") write$cgroup_int(r10, &(0x7f0000001a80)=0x8, 0x12) bpf$ENABLE_STATS(0x20, &(0x7f0000001ac0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001b00)) bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x6, 0x4, 0x80000000, 0x6e5, 0x28009, r4, 0x200, '\x00', r8, 0xffffffffffffffff, 0x5, 0x2, 0x2, 0x0, @value=r10, @void, @void, @value}, 0x50) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001bc0)={0x3, 0x4, 0x4, 0xa, 0x0, r10, 0x0, '\x00', r8, r10, 0x4, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001c40)={0x3, 0x4, 0x4, 0xa, 0x0, r11, 0x0, '\x00', r8, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000001cc0)) bpf$ITER_CREATE(0x21, &(0x7f0000001d00)={r10}, 0x8) openat$cgroup_ro(r6, &(0x7f0000001d40)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) 407.912313ms ago: executing program 4 (id=612): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000004080)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f0000000000)='syzkaller\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r2}, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000380)='%pB \x00') bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{r3}, &(0x7f0000000500), &(0x7f0000000540)='%pB \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_type(r4, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000280), 0x9) r6 = openat$cgroup_procs(r4, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000080), 0x12) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r11}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 229.28357ms ago: executing program 4 (id=613): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x44) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x42, &(0x7f0000000040), 0x3b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x100}, 0x0) (async) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x100}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r9}, &(0x7f0000000380), 0x0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r9}, &(0x7f0000000380), 0x0}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r10}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000fc0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 133.843368ms ago: executing program 4 (id=614): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000400000000000000000000000018240000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1c, 0x63c1, 0x7fff, 0x400, 0x0, r1, 0x1, '\x00', 0x0, r0, 0x1, 0x1, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="b40000000000000048100000000000000400000000000000950018000000000083d1c42e8494cfd4b2b43ea94987a9d8919bce403a946838041959bc7dc541185743ac753eb0c4eb758e86d8ce131a542ce2e108c36cef52e52544110358cdeef4734bf01cb3d6d5e7af30056f097cee9665cf05d834616b9629fb663a08d4d26142c6e8597c6afbbc37fa4b40ef5d08af039f8dbd1027ac0ab2bc392fbb3207703c40d6b769aabb002b0ad3147525ccdcfb716f38d3f8577a1802089005000000000000009edb"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd4e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200, 0x60010, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x20005480}, 0x8828, 0x0, 0x10000000, 0x0, 0x3, 0x0, 0x10}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001418) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$TUNSETOFFLOAD(r7, 0x4008744b, 0x0) 133.086118ms ago: executing program 2 (id=609): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)="d0", 0x1}], 0x1}, 0x20040801) recvmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x2122) sendmsg$inet(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000fc0)='\x00', 0x1}], 0x1}, 0x0) recvmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x41) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000800000362acbd17963f0bbea87a49020b261e9b3fd666eeee4b5bfb0ce7ccd998a849f16163d91fa8493e242d0cb4fe886a62c66a872c19bce7488f76ab9af284d7b4297a2fbfddd67677579072d6f8a13946ace03e1ec51a5e1f5412c3cdec4151baa3e174f890ff5129dacc9e1bae4584f5697cf8523600ebbf207266e900faa5cdbdc8283e3fbb1b3d39adf97e6cd5ba93271e3a4ec20b7603dc25cb593dd34566a34645cad7b4061c4c69f33512e9783c47c576079009498d86fd4", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003200)={&(0x7f0000003040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@enum={0x6}]}, {0x0, [0x61, 0x2e, 0x61, 0x30, 0x5f, 0x61, 0x5f]}}, &(0x7f0000003180)=""/128, 0x2d, 0x80, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000002c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000004c0), 0x0, 0x3, r2}, 0x38) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_type(r3, 0x0, 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000280), 0x9) r5 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@cgroup=r3, 0x33, 0x1, 0x6, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000080), 0x12) 104.188581ms ago: executing program 1 (id=608): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x8, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x39}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 542.46µs ago: executing program 1 (id=615): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r3, 0x58, &(0x7f00000001c0)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r6}, &(0x7f0000000500), &(0x7f0000000540)=r7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000080)) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000290000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r9, 0x0, 0xe, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 0s ago: executing program 0 (id=607): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x100800}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'dvmrp1\x00', 0x2}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8400}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000000780)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7S\x03U\xe0\xd8t\xe3%96\x00'/168) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)=0x7fff) (async) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000300)={0x2, &(0x7f0000000040)=[{0x30, 0xff, 0x0, 0xfffff010}, {0x2}]}) (async) ioctl$TUNGETIFF(r1, 0x800454d2, 0x0) r3 = syz_clone(0x40, &(0x7f0000000340)="4c6b755520209bc264154d89af0a6ecd70427c4fd49e264b4f8cc3149fcb", 0x1e, 0x0, &(0x7f0000000140), &(0x7f0000000240)="0a15812e71b8b1d98eb8e9bb1bdccbd9259ab78977a47f385573") syz_clone(0x380400, &(0x7f0000000100)="13c0c0a2021e2dace4aeb7f26691530178dd3a77f618e968108d7522a9966237e535234110db0938", 0x28, &(0x7f0000000280), &(0x7f00000003c0), &(0x7f0000000400)="b5b87866156a9f4e9edd0c72bdd2846295ef26f6ee744f45e9409d949add7b22e843330572cde53e41d228d37426c8f1b2a187bb8100f698f62f35cb5ad2874421daaf821ac2df57f02bfd36334c05f9f42802b1e00eadd2") (async, rerun: 64) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd0a992bd98416a8b}, 0x10820, 0x0, 0xfffffffe, 0x0, 0xfffffffffffffffe}, r3, 0xd, 0xffffffffffffffff, 0x0) (rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$ppp(0xffffff9c, &(0x7f0000000040), 0x80c02, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800086}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) (async) ioctl$TUNSETOFFLOAD(r0, 0x40047451, 0x2000000c) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.147' (ED25519) to the list of known hosts. [ 20.831186][ T30] audit: type=1400 audit(1727775952.444:66): avc: denied { integrity } for pid=280 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 20.855466][ T30] audit: type=1400 audit(1727775952.464:67): avc: denied { mounton } for pid=280 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.857422][ T280] cgroup: Unknown subsys name 'net' [ 20.878070][ T30] audit: type=1400 audit(1727775952.464:68): avc: denied { mount } for pid=280 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.905493][ T30] audit: type=1400 audit(1727775952.494:69): avc: denied { unmount } for pid=280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.905722][ T280] cgroup: Unknown subsys name 'devices' [ 21.030996][ T280] cgroup: Unknown subsys name 'hugetlb' [ 21.036416][ T280] cgroup: Unknown subsys name 'rlimit' [ 21.228767][ T30] audit: type=1400 audit(1727775952.844:70): avc: denied { setattr } for pid=280 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.251762][ T30] audit: type=1400 audit(1727775952.844:71): avc: denied { mounton } for pid=280 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.268761][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.276292][ T30] audit: type=1400 audit(1727775952.844:72): avc: denied { mount } for pid=280 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.307672][ T30] audit: type=1400 audit(1727775952.904:73): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.333000][ T30] audit: type=1400 audit(1727775952.904:74): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.388334][ T30] audit: type=1400 audit(1727775952.994:75): avc: denied { read } for pid=280 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.413741][ T280] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.297013][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.303910][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.311307][ T293] device bridge_slave_0 entered promiscuous mode [ 22.317871][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.324892][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.332259][ T291] device bridge_slave_0 entered promiscuous mode [ 22.340630][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.347479][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.355138][ T291] device bridge_slave_1 entered promiscuous mode [ 22.369276][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.376221][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.383534][ T293] device bridge_slave_1 entered promiscuous mode [ 22.437576][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.444556][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.451755][ T292] device bridge_slave_0 entered promiscuous mode [ 22.458448][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.465602][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.472900][ T292] device bridge_slave_1 entered promiscuous mode [ 22.519970][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.526942][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.534572][ T294] device bridge_slave_0 entered promiscuous mode [ 22.542615][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.549619][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.556777][ T294] device bridge_slave_1 entered promiscuous mode [ 22.644201][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.651129][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.658361][ T295] device bridge_slave_0 entered promiscuous mode [ 22.666704][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.673763][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.681026][ T295] device bridge_slave_1 entered promiscuous mode [ 22.766358][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.773253][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.780368][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.787111][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.818332][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.825227][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.832357][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.839208][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.847217][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.854124][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.861169][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.867946][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.908363][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.915239][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.922386][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.929242][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.953593][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.960477][ T295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.967563][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.974393][ T295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.990961][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.998022][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.005121][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.012313][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.019412][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.026761][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.033830][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.041110][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.048233][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.056144][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.063145][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.091513][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.100678][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.108768][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.115605][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.122903][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.130910][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.137731][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.145417][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.153527][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.161338][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.168939][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.187363][ T293] device veth0_vlan entered promiscuous mode [ 23.201016][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.209747][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.217548][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.224839][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.232126][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.240128][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.247155][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.254431][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.262446][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.269304][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.300762][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.309021][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.316875][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.324913][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.333304][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.340611][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.347785][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.355969][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.363901][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.370744][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.377909][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.386078][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.394327][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.401178][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.408311][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.416522][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.424567][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.431417][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.438697][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.446681][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.454471][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.462613][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.470642][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.477756][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.485163][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.492976][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.500897][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.508717][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.516531][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.540747][ T295] device veth0_vlan entered promiscuous mode [ 23.551735][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.559937][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.567793][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.575156][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.582589][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.590910][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.599116][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.606732][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.614741][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.622080][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.636293][ T291] device veth0_vlan entered promiscuous mode [ 23.643524][ T292] device veth0_vlan entered promiscuous mode [ 23.650465][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.658851][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.667009][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.675104][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.683088][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.691090][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.699252][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.706533][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.720078][ T293] device veth1_macvtap entered promiscuous mode [ 23.730370][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.737854][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.745890][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.753957][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.762515][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.772134][ T292] device veth1_macvtap entered promiscuous mode [ 23.781623][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.789128][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.796335][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.814898][ T291] device veth1_macvtap entered promiscuous mode [ 23.823304][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.830799][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.839059][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.847101][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.854324][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.861475][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.869685][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.877815][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.884688][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.892102][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.900122][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.907903][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.916076][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.924220][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.932157][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.939920][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.948120][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.956344][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.978016][ T295] device veth1_macvtap entered promiscuous mode [ 23.985817][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.998059][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.006889][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.015239][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.023653][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.031786][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.039946][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.047972][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.071209][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.084613][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.093109][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.101936][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.159581][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.167801][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.189023][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.197405][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.205840][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.213693][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.218478][ C0] hrtimer: interrupt took 25341 ns [ 24.233567][ T294] device veth0_vlan entered promiscuous mode [ 24.328113][ T294] device veth1_macvtap entered promiscuous mode [ 24.339084][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.347151][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.355802][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.373043][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.381386][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.426737][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.458532][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.845281][ T340] device wg2 entered promiscuous mode [ 25.204692][ T344] device pim6reg1 entered promiscuous mode [ 25.844525][ T374] bridge0: port 3(veth0_to_batadv) entered blocking state [ 25.854129][ T30] kauditd_printk_skb: 40 callbacks suppressed [ 25.854155][ T30] audit: type=1400 audit(1727775957.454:116): avc: denied { read } for pid=360 comm="syz.3.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 25.902070][ T374] bridge0: port 3(veth0_to_batadv) entered disabled state [ 25.913511][ T374] device veth0_to_batadv entered promiscuous mode [ 25.919989][ T374] bridge0: port 3(veth0_to_batadv) entered blocking state [ 25.926923][ T374] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 25.958137][ T30] audit: type=1400 audit(1727775957.494:117): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 25.985772][ T378] bridge0: port 3(veth0_to_batadv) entered blocking state [ 26.027558][ T378] bridge0: port 3(veth0_to_batadv) entered disabled state [ 26.059071][ T378] device veth0_to_batadv entered promiscuous mode [ 26.079875][ T378] bridge0: port 3(veth0_to_batadv) entered blocking state [ 26.086860][ T378] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 26.599097][ T386] syz.2.20 (386) used greatest stack depth: 22040 bytes left [ 27.438788][ T405] device pim6reg1 entered promiscuous mode [ 27.661537][ T414] device pim6reg1 entered promiscuous mode [ 28.017679][ T426] bridge0: port 3(veth0_to_batadv) entered blocking state [ 28.027456][ T30] audit: type=1400 audit(1727775959.634:118): avc: denied { setopt } for pid=417 comm="syz.4.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.041441][ T426] bridge0: port 3(veth0_to_batadv) entered disabled state [ 28.062841][ T426] device veth0_to_batadv entered promiscuous mode [ 28.073189][ T426] bridge0: port 3(veth0_to_batadv) entered blocking state [ 28.080757][ T426] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 28.107378][ T30] audit: type=1400 audit(1727775959.714:119): avc: denied { write } for pid=430 comm="syz.0.34" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.640474][ T445] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.200612][ T462] bridge0: port 3(veth0_to_batadv) entered blocking state [ 29.216001][ T462] bridge0: port 3(veth0_to_batadv) entered disabled state [ 29.241027][ T462] device veth0_to_batadv entered promiscuous mode [ 29.249576][ T462] bridge0: port 3(veth0_to_batadv) entered blocking state [ 29.256877][ T462] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 29.415508][ T30] audit: type=1400 audit(1727775961.024:120): avc: denied { create } for pid=471 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 30.639502][ T30] audit: type=1400 audit(1727775962.254:121): avc: denied { create } for pid=539 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 30.825151][ T30] audit: type=1400 audit(1727775962.254:122): avc: denied { ioctl } for pid=540 comm="syz.3.66" path="socket:[15569]" dev="sockfs" ino=15569 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.052674][ T552] bridge0: port 3(veth0_to_batadv) entered blocking state [ 31.120441][ T552] bridge0: port 3(veth0_to_batadv) entered disabled state [ 31.189420][ T552] device veth0_to_batadv entered promiscuous mode [ 31.390637][ T552] bridge0: port 3(veth0_to_batadv) entered blocking state [ 31.397729][ T552] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 31.605359][ T573] device syzkaller0 entered promiscuous mode [ 31.933589][ T30] audit: type=1400 audit(1727775963.544:123): avc: denied { relabelfrom } for pid=571 comm="syz.2.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.025699][ T30] audit: type=1400 audit(1727775963.544:124): avc: denied { relabelto } for pid=571 comm="syz.2.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.314846][ T594] device veth0_to_batadv left promiscuous mode [ 32.363368][ T594] bridge0: port 3(veth0_to_batadv) entered disabled state [ 33.364758][ T623] ------------[ cut here ]------------ [ 33.370346][ T623] Please remove unsupported %[ 33.374798][ T623] WARNING: CPU: 0 PID: 623 at lib/vsprintf.c:2667 format_decode+0x12d2/0x1f10 [ 33.383981][ T623] Modules linked in: [ 33.388040][ T623] CPU: 0 PID: 623 Comm: syz.3.91 Not tainted 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 33.397693][ T623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 33.398579][ T30] audit: type=1400 audit(1727775964.994:125): avc: denied { create } for pid=624 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 33.407776][ T623] RIP: 0010:format_decode+0x12d2/0x1f10 [ 33.432384][ T623] Code: 9d 04 01 48 b8 00 00 00 00 00 fc ff df 41 0f b6 04 07 84 c0 0f 85 30 0c 00 00 41 0f be 36 48 c7 c7 80 a4 a4 85 e8 8e e3 b8 fe <0f> 0b e9 01 fa ff ff 48 8b 4c 24 18 80 e1 07 38 c1 0f 8c e3 ed ff [ 33.452067][ T623] RSP: 0018:ffffc90000ca7600 EFLAGS: 00010246 [ 33.457930][ T623] RAX: 8aea2feae6823700 RBX: 00000000ffffffdb RCX: 0000000000040000 [ 33.465785][ T623] RDX: ffffc90002764000 RSI: 0000000000000494 RDI: 0000000000000495 [ 33.473566][ T623] RBP: ffffc90000ca76f0 R08: ffffffff81578a05 R09: fffff52000194de9 [ 33.481379][ T623] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff0a00ffffff00 [ 33.489209][ T623] R13: ffff0000ffffff00 R14: ffffc90000ca792c R15: 1ffff92000194f25 [ 33.497071][ T623] FS: 00007f87b4e776c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 33.505866][ T623] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.512275][ T623] CR2: 0000001b2e110ff8 CR3: 0000000129dd8000 CR4: 00000000003506b0 [ 33.520107][ T623] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.527884][ T623] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 33.535710][ T623] Call Trace: [ 33.538833][ T623] [ 33.541603][ T623] ? show_regs+0x58/0x60 [ 33.545864][ T623] ? __warn+0x160/0x2f0 [ 33.549862][ T623] ? format_decode+0x12d2/0x1f10 [ 33.554621][ T623] ? report_bug+0x3d9/0x5b0 [ 33.558979][ T623] ? format_decode+0x12d2/0x1f10 [ 33.563743][ T623] ? handle_bug+0x41/0x70 [ 33.567903][ T623] ? exc_invalid_op+0x1b/0x50 [ 33.572441][ T623] ? asm_exc_invalid_op+0x1b/0x20 [ 33.577273][ T623] ? __wake_up_klogd+0xd5/0x110 [ 33.581995][ T623] ? format_decode+0x12d2/0x1f10 [ 33.586734][ T623] ? __kernel_text_address+0x9b/0x110 [ 33.592049][ T623] ? vsnprintf+0x1c70/0x1c70 [ 33.596465][ T623] ? bstr_printf+0x1b6/0x10c0 [ 33.601259][ T623] ? memcpy+0x56/0x70 [ 33.605057][ T623] bstr_printf+0x130/0x10c0 [ 33.609426][ T623] ? bpf_bprintf_cleanup+0xc0/0xc0 [ 33.614343][ T623] ? vbin_printf+0x1bc0/0x1bc0 [ 33.618960][ T623] ? bpf_trace_printk+0x122/0x330 [ 33.623805][ T623] ? memcpy+0x56/0x70 [ 33.627621][ T623] bpf_trace_printk+0x1b5/0x330 [ 33.632325][ T623] ? kmem_cache_alloc+0xf5/0x200 [ 33.637079][ T623] ? ktime_get+0xf1/0x160 [ 33.641372][ T623] ? bpf_probe_write_user+0xf0/0xf0 [ 33.646798][ T623] ? x64_sys_call+0x87f/0x9a0 [ 33.651372][ T623] ? ktime_get+0xf1/0x160 [ 33.655475][ T623] bpf_prog_12183cdb1cd51dab+0x2e/0x4a4 [ 33.661074][ T623] bpf_test_run+0x478/0xa10 [ 33.665760][ T623] ? convert___skb_to_skb+0x570/0x570 [ 33.671004][ T623] ? eth_type_trans+0x2e4/0x620 [ 33.675650][ T623] ? eth_get_headlen+0x240/0x240 [ 33.680449][ T623] ? convert___skb_to_skb+0x44/0x570 [ 33.685627][ T623] bpf_prog_test_run_skb+0xb41/0x1420 [ 33.690855][ T623] ? anon_inode_getfd+0x33/0x40 [ 33.695533][ T623] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 33.701276][ T623] ? __kasan_check_write+0x14/0x20 [ 33.706410][ T623] ? fput_many+0x160/0x1b0 [ 33.710642][ T623] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 33.716391][ T623] bpf_prog_test_run+0x3b0/0x630 [ 33.721149][ T623] ? bpf_prog_query+0x220/0x220 [ 33.725815][ T623] ? selinux_bpf+0xd2/0x100 [ 33.730187][ T623] ? security_bpf+0x82/0xb0 [ 33.734491][ T623] __sys_bpf+0x525/0x760 [ 33.738597][ T623] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 33.743786][ T623] ? __kasan_check_read+0x11/0x20 [ 33.748677][ T623] __x64_sys_bpf+0x7c/0x90 [ 33.752893][ T623] x64_sys_call+0x87f/0x9a0 [ 33.757230][ T623] do_syscall_64+0x3b/0xb0 [ 33.761511][ T623] ? clear_bhb_loop+0x35/0x90 [ 33.766009][ T623] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 33.771750][ T623] RIP: 0033:0x7f87b61fdff9 [ 33.776121][ T623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.795633][ T623] RSP: 002b:00007f87b4e77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 33.803862][ T623] RAX: ffffffffffffffda RBX: 00007f87b63b5f80 RCX: 00007f87b61fdff9 [ 33.811670][ T623] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 33.819475][ T623] RBP: 00007f87b6270296 R08: 0000000000000000 R09: 0000000000000000 [ 33.827274][ T623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 33.835109][ T623] R13: 0000000000000000 R14: 00007f87b63b5f80 R15: 00007fff23254e48 [ 33.843094][ T623] [ 33.845945][ T623] ---[ end trace 77c8f9debe8a3c12 ]--- [ 33.962560][ T30] audit: type=1400 audit(1727775965.574:126): avc: denied { create } for pid=630 comm="syz.2.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 35.081261][ T30] audit: type=1400 audit(1727775966.694:127): avc: denied { create } for pid=701 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 35.756959][ T751] bridge0: port 4(veth0_macvtap) entered blocking state [ 35.801233][ T751] bridge0: port 4(veth0_macvtap) entered disabled state [ 35.830659][ T751] device veth0_macvtap entered promiscuous mode [ 35.853179][ T751] bridge0: port 4(veth0_macvtap) entered blocking state [ 35.860020][ T751] bridge0: port 4(veth0_macvtap) entered forwarding state [ 36.469660][ T778] geneve1: tun_chr_ioctl cmd 1074025692 [ 36.558097][ T695] syz.1.113 (695) used greatest stack depth: 21880 bytes left [ 36.748106][ T807] -æ@ÉJ³: renamed from syzkaller0 [ 36.771124][ T815] syz.3.149[815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.771229][ T815] syz.3.149[815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.785953][ T30] audit: type=1400 audit(1727775968.394:128): avc: denied { create } for pid=809 comm="syz.1.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 36.912761][ T30] audit: type=1400 audit(1727775968.524:129): avc: denied { create } for pid=816 comm="syz.0.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 37.598159][ T30] audit: type=1400 audit(1727775969.204:130): avc: denied { create } for pid=827 comm="syz.2.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 37.891316][ T842] device pim6reg1 entered promiscuous mode [ 37.968943][ T846] device pim6reg1 entered promiscuous mode [ 37.976880][ T846] FAULT_INJECTION: forcing a failure. [ 37.976880][ T846] name failslab, interval 1, probability 0, space 0, times 1 [ 37.991188][ T846] CPU: 1 PID: 846 Comm: syz.3.159 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 38.002125][ T846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 38.012027][ T846] Call Trace: [ 38.015137][ T846] [ 38.017922][ T846] dump_stack_lvl+0x151/0x1c0 [ 38.022646][ T846] ? io_uring_drop_tctx_refs+0x190/0x190 [ 38.028115][ T846] dump_stack+0x15/0x20 [ 38.032106][ T846] should_fail+0x3c6/0x510 [ 38.036394][ T846] __should_failslab+0xa4/0xe0 [ 38.040957][ T846] ? __alloc_skb+0xbe/0x550 [ 38.045386][ T846] should_failslab+0x9/0x20 [ 38.049724][ T846] slab_pre_alloc_hook+0x37/0xd0 [ 38.054604][ T846] ? __alloc_skb+0xbe/0x550 [ 38.059039][ T846] kmem_cache_alloc+0x44/0x200 [ 38.063726][ T846] __alloc_skb+0xbe/0x550 [ 38.067890][ T846] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 38.073103][ T846] rtmsg_ifinfo+0x78/0x120 [ 38.077354][ T846] dev_close_many+0x2a6/0x530 [ 38.081866][ T846] ? __dev_open+0x4e0/0x4e0 [ 38.086205][ T846] ? __kasan_check_read+0x11/0x20 [ 38.091153][ T846] unregister_netdevice_many+0x492/0x17c0 [ 38.096705][ T846] ? kmem_cache_free+0x116/0x2e0 [ 38.101571][ T846] ? __kasan_check_write+0x14/0x20 [ 38.106512][ T846] ? alloc_netdev_mqs+0xc90/0xc90 [ 38.111463][ T846] ? __kasan_check_read+0x11/0x20 [ 38.116320][ T846] unregister_netdevice_queue+0x2e6/0x350 [ 38.121961][ T846] ? linkwatch_urgent_event+0x335/0x4d0 [ 38.127344][ T846] ? list_netdevice+0x4c0/0x4c0 [ 38.132033][ T846] __tun_detach+0xd14/0x1510 [ 38.136541][ T846] ? wait_for_completion_killable_timeout+0x10/0x10 [ 38.142966][ T846] tun_chr_close+0x92/0x140 [ 38.147303][ T846] ? tun_chr_open+0x530/0x530 [ 38.151838][ T846] __fput+0x3fe/0x910 [ 38.155730][ T846] ____fput+0x15/0x20 [ 38.159542][ T846] task_work_run+0x129/0x190 [ 38.163969][ T846] exit_to_user_mode_loop+0xc4/0xe0 [ 38.169004][ T846] exit_to_user_mode_prepare+0x5a/0xa0 [ 38.174300][ T846] syscall_exit_to_user_mode+0x26/0x160 [ 38.179679][ T846] do_syscall_64+0x47/0xb0 [ 38.183932][ T846] ? clear_bhb_loop+0x35/0x90 [ 38.188444][ T846] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 38.194271][ T846] RIP: 0033:0x7f87b61fdff9 [ 38.198513][ T846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.217956][ T846] RSP: 002b:00007f87b4e77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 38.226201][ T846] RAX: 0000000000000000 RBX: 00007f87b63b5f80 RCX: 00007f87b61fdff9 [ 38.234010][ T846] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 38.241825][ T846] RBP: 00007f87b4e77090 R08: 0000000000000000 R09: 0000000000000000 [ 38.249638][ T846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.257451][ T846] R13: 0000000000000000 R14: 00007f87b63b5f80 R15: 00007fff23254e48 [ 38.265267][ T846] [ 38.325048][ T30] audit: type=1400 audit(1727775969.934:131): avc: denied { create } for pid=850 comm="syz.3.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 38.381439][ T30] audit: type=1400 audit(1727775969.974:132): avc: denied { create } for pid=852 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 38.549449][ T30] audit: type=1400 audit(1727775970.164:133): avc: denied { create } for pid=865 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.586519][ T866] device pim6reg1 entered promiscuous mode [ 38.611195][ T30] audit: type=1400 audit(1727775970.224:134): avc: denied { write } for pid=873 comm="syz.4.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.630418][ T30] audit: type=1400 audit(1727775970.224:135): avc: denied { read } for pid=873 comm="syz.4.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.241939][ T908] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 39.789014][ T30] audit: type=1400 audit(1727775971.394:136): avc: denied { setopt } for pid=933 comm="syz.4.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.869226][ T938] device syzkaller0 entered promiscuous mode [ 40.467886][ T974] device pim6reg1 entered promiscuous mode [ 40.477480][ T974] FAULT_INJECTION: forcing a failure. [ 40.477480][ T974] name failslab, interval 1, probability 0, space 0, times 0 [ 40.499949][ T974] CPU: 0 PID: 974 Comm: syz.4.200 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 40.510982][ T974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 40.520878][ T974] Call Trace: [ 40.524003][ T974] [ 40.526783][ T974] dump_stack_lvl+0x151/0x1c0 [ 40.531296][ T974] ? io_uring_drop_tctx_refs+0x190/0x190 [ 40.536766][ T974] ? memcpy+0x56/0x70 [ 40.540583][ T974] dump_stack+0x15/0x20 [ 40.544572][ T974] should_fail+0x3c6/0x510 [ 40.548825][ T974] __should_failslab+0xa4/0xe0 [ 40.553430][ T974] should_failslab+0x9/0x20 [ 40.557763][ T974] slab_pre_alloc_hook+0x37/0xd0 [ 40.562538][ T974] ? netlink_trim+0x19b/0x230 [ 40.567150][ T974] __kmalloc_track_caller+0x6c/0x260 [ 40.572260][ T974] ? netlink_trim+0x19b/0x230 [ 40.576864][ T974] ? netlink_trim+0x19b/0x230 [ 40.581377][ T974] pskb_expand_head+0x113/0x1240 [ 40.586146][ T974] netlink_trim+0x19b/0x230 [ 40.590569][ T974] netlink_broadcast_filtered+0x66/0x1220 [ 40.596122][ T974] ? __kasan_kmalloc+0x9/0x10 [ 40.600640][ T974] ? rtmsg_ifinfo_build_skb+0xd4/0x180 [ 40.605932][ T974] nlmsg_notify+0x101/0x1c0 [ 40.610273][ T974] rtmsg_ifinfo+0xe7/0x120 [ 40.614523][ T974] dev_close_many+0x2a6/0x530 [ 40.619037][ T974] ? __dev_open+0x4e0/0x4e0 [ 40.623466][ T974] ? __kasan_check_read+0x11/0x20 [ 40.628323][ T974] unregister_netdevice_many+0x492/0x17c0 [ 40.633879][ T974] ? __kasan_check_write+0x14/0x20 [ 40.638834][ T974] ? alloc_netdev_mqs+0xc90/0xc90 [ 40.643690][ T974] ? add_timer+0x68/0x80 [ 40.647768][ T974] ? __queue_delayed_work+0x16d/0x1f0 [ 40.652990][ T974] ? __kasan_check_read+0x11/0x20 [ 40.657838][ T974] unregister_netdevice_queue+0x2e6/0x350 [ 40.663387][ T974] ? linkwatch_urgent_event+0x335/0x4d0 [ 40.668768][ T974] ? list_netdevice+0x4c0/0x4c0 [ 40.673459][ T974] __tun_detach+0xd14/0x1510 [ 40.677881][ T974] ? wait_for_completion_killable_timeout+0x10/0x10 [ 40.684311][ T974] tun_chr_close+0x92/0x140 [ 40.688647][ T974] ? tun_chr_open+0x530/0x530 [ 40.693160][ T974] __fput+0x3fe/0x910 [ 40.696981][ T974] ____fput+0x15/0x20 [ 40.700796][ T974] task_work_run+0x129/0x190 [ 40.705223][ T974] exit_to_user_mode_loop+0xc4/0xe0 [ 40.710258][ T974] exit_to_user_mode_prepare+0x5a/0xa0 [ 40.715552][ T974] syscall_exit_to_user_mode+0x26/0x160 [ 40.720936][ T974] do_syscall_64+0x47/0xb0 [ 40.725184][ T974] ? clear_bhb_loop+0x35/0x90 [ 40.729698][ T974] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 40.735425][ T974] RIP: 0033:0x7f0a42ea1ff9 [ 40.739684][ T974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.759474][ T974] RSP: 002b:00007f0a41b1b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 40.767712][ T974] RAX: 0000000000000000 RBX: 00007f0a43059f80 RCX: 00007f0a42ea1ff9 [ 40.775698][ T974] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 40.783508][ T974] RBP: 00007f0a41b1b090 R08: 0000000000000000 R09: 0000000000000000 [ 40.791321][ T974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 40.799141][ T974] R13: 0000000000000000 R14: 00007f0a43059f80 R15: 00007fffbeaa0bb8 [ 40.807041][ T974] [ 41.194678][ T988] device pim6reg1 entered promiscuous mode [ 41.992956][ T1020] device pim6reg1 entered promiscuous mode [ 42.140851][ T1028] FAULT_INJECTION: forcing a failure. [ 42.140851][ T1028] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 42.153917][ T1028] CPU: 1 PID: 1028 Comm: syz.1.214 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 42.164937][ T1028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 42.174825][ T1028] Call Trace: [ 42.178038][ T1028] [ 42.180814][ T1028] dump_stack_lvl+0x151/0x1c0 [ 42.185327][ T1028] ? io_uring_drop_tctx_refs+0x190/0x190 [ 42.190888][ T1028] dump_stack+0x15/0x20 [ 42.194875][ T1028] should_fail+0x3c6/0x510 [ 42.199132][ T1028] should_fail_usercopy+0x1a/0x20 [ 42.203991][ T1028] strncpy_from_user+0x24/0x2d0 [ 42.208675][ T1028] strncpy_from_user_nofault+0x73/0x150 [ 42.214057][ T1028] bpf_probe_read_user_str+0x2a/0x70 [ 42.219276][ T1028] bpf_prog_bc7c5c6b9645592f+0x35/0x3ac [ 42.224656][ T1028] bpf_trace_run3+0x11e/0x250 [ 42.229174][ T1028] ? bpf_trace_run2+0x210/0x210 [ 42.233856][ T1028] ? __this_cpu_preempt_check+0x13/0x20 [ 42.239234][ T1028] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 42.245754][ T1028] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 42.252028][ T1028] __bpf_trace_sched_switch+0xb/0x10 [ 42.257143][ T1028] __traceiter_sched_switch+0x85/0xc0 [ 42.262351][ T1028] __schedule+0x134b/0x1590 [ 42.266692][ T1028] ? release_firmware_map_entry+0x190/0x190 [ 42.272419][ T1028] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 42.278235][ T1028] ? prepare_to_wait_event+0x3e6/0x420 [ 42.283527][ T1028] schedule+0x11f/0x1e0 [ 42.287523][ T1028] synchronize_rcu_expedited+0x49d/0x600 [ 42.292987][ T1028] ? synchronize_rcu+0x120/0x120 [ 42.297759][ T1028] ? __kernel_text_address+0x9b/0x110 [ 42.302980][ T1028] ? unwind_get_return_address+0x4d/0x90 [ 42.308523][ T1028] ? rcu_exp_handler+0x360/0x360 [ 42.313300][ T1028] ? __this_cpu_preempt_check+0x13/0x20 [ 42.318677][ T1028] ? __raise_softirq_irqoff+0x1a/0xe0 [ 42.323974][ T1028] ? raise_softirq_irqoff+0x9/0x40 [ 42.328919][ T1028] ? __this_cpu_preempt_check+0x13/0x20 [ 42.334301][ T1028] ? io_schedule+0x120/0x120 [ 42.338726][ T1028] ? br_device_event+0x185/0x7c0 [ 42.343504][ T1028] ? __kasan_check_read+0x11/0x20 [ 42.348360][ T1028] synchronize_net+0x2d/0x40 [ 42.352787][ T1028] dev_deactivate_many+0x69b/0xb80 [ 42.357740][ T1028] __dev_close_many+0x252/0x390 [ 42.362423][ T1028] ? exit_to_user_mode_loop+0xc4/0xe0 [ 42.367632][ T1028] ? exit_to_user_mode_prepare+0x5a/0xa0 [ 42.373099][ T1028] ? syscall_exit_to_user_mode+0x26/0x160 [ 42.378757][ T1028] ? dev_close_many+0x530/0x530 [ 42.383447][ T1028] dev_close_many+0x22a/0x530 [ 42.388073][ T1028] ? __dev_open+0x4e0/0x4e0 [ 42.392395][ T1028] ? __kasan_check_read+0x11/0x20 [ 42.397254][ T1028] unregister_netdevice_many+0x492/0x17c0 [ 42.402799][ T1028] ? kmem_cache_free+0x116/0x2e0 [ 42.407576][ T1028] ? __kasan_check_write+0x14/0x20 [ 42.412522][ T1028] ? slab_free_freelist_hook+0xbd/0x190 [ 42.417906][ T1028] ? alloc_netdev_mqs+0xc90/0xc90 [ 42.422760][ T1028] ? kfree_skbmem+0x104/0x170 [ 42.427286][ T1028] ? __kasan_check_read+0x11/0x20 [ 42.432149][ T1028] unregister_netdevice_queue+0x2e6/0x350 [ 42.437703][ T1028] ? linkwatch_urgent_event+0x335/0x4d0 [ 42.443158][ T1028] ? list_netdevice+0x4c0/0x4c0 [ 42.447848][ T1028] __tun_detach+0xd14/0x1510 [ 42.452271][ T1028] ? wait_for_completion_killable_timeout+0x10/0x10 [ 42.458706][ T1028] tun_chr_close+0x92/0x140 [ 42.463036][ T1028] ? tun_chr_open+0x530/0x530 [ 42.467547][ T1028] __fput+0x3fe/0x910 [ 42.471374][ T1028] ____fput+0x15/0x20 [ 42.475189][ T1028] task_work_run+0x129/0x190 [ 42.479630][ T1028] exit_to_user_mode_loop+0xc4/0xe0 [ 42.484649][ T1028] exit_to_user_mode_prepare+0x5a/0xa0 [ 42.489943][ T1028] syscall_exit_to_user_mode+0x26/0x160 [ 42.495321][ T1028] do_syscall_64+0x47/0xb0 [ 42.499574][ T1028] ? clear_bhb_loop+0x35/0x90 [ 42.504174][ T1028] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.509902][ T1028] RIP: 0033:0x7f96fa76bff9 [ 42.514164][ T1028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.533861][ T1028] RSP: 002b:00007f96f93c4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 42.542103][ T1028] RAX: 0000000000000000 RBX: 00007f96fa924058 RCX: 00007f96fa76bff9 [ 42.549913][ T1028] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 42.557734][ T1028] RBP: 00007f96f93c4090 R08: 0000000000000000 R09: 0000000000000000 [ 42.565538][ T1028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.573356][ T1028] R13: 0000000000000001 R14: 00007f96fa924058 R15: 00007ffe06492118 [ 42.581180][ T1028] [ 42.882979][ T1049] device pim6reg1 entered promiscuous mode [ 43.052623][ T30] audit: type=1400 audit(1727775974.664:137): avc: denied { create } for pid=1063 comm="syz.3.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 43.352764][ T1075] device pim6reg1 entered promiscuous mode [ 43.452388][ T1077] FAULT_INJECTION: forcing a failure. [ 43.452388][ T1077] name failslab, interval 1, probability 0, space 0, times 0 [ 43.464938][ T1077] CPU: 0 PID: 1077 Comm: syz.4.231 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 43.475927][ T1077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 43.485821][ T1077] Call Trace: [ 43.488945][ T1077] [ 43.491716][ T1077] dump_stack_lvl+0x151/0x1c0 [ 43.496234][ T1077] ? io_uring_drop_tctx_refs+0x190/0x190 [ 43.501714][ T1077] ? 0xffffffffa00189ac [ 43.505693][ T1077] ? is_bpf_text_address+0x172/0x190 [ 43.510903][ T1077] dump_stack+0x15/0x20 [ 43.514893][ T1077] should_fail+0x3c6/0x510 [ 43.519152][ T1077] __should_failslab+0xa4/0xe0 [ 43.523747][ T1077] ? __alloc_skb+0xbe/0x550 [ 43.528086][ T1077] should_failslab+0x9/0x20 [ 43.532427][ T1077] slab_pre_alloc_hook+0x37/0xd0 [ 43.537201][ T1077] ? __alloc_skb+0xbe/0x550 [ 43.541539][ T1077] kmem_cache_alloc+0x44/0x200 [ 43.546140][ T1077] ? cpumask_next+0x8a/0xb0 [ 43.550483][ T1077] __alloc_skb+0xbe/0x550 [ 43.554647][ T1077] inet6_rt_notify+0x2db/0x550 [ 43.559249][ T1077] ? rt6_nh_dump_exceptions+0x650/0x650 [ 43.564631][ T1077] fib6_del+0xce0/0x1060 [ 43.568712][ T1077] ? fib6_locate+0x560/0x560 [ 43.573135][ T1077] ? enqueue_task_fair+0xd34/0x2690 [ 43.578170][ T1077] fib6_clean_node+0x2ed/0x550 [ 43.582773][ T1077] ? node_free_rcu+0x30/0x30 [ 43.587194][ T1077] ? __kasan_check_write+0x14/0x20 [ 43.592266][ T1077] ? resched_curr+0x9d/0x1c0 [ 43.596694][ T1077] fib6_walk_continue+0x52d/0x720 [ 43.601554][ T1077] fib6_walk+0x172/0x2d0 [ 43.605632][ T1077] fib6_clean_all+0x202/0x2c0 [ 43.610143][ T1077] ? rt6_sync_down_dev+0x170/0x170 [ 43.615093][ T1077] ? fib6_del+0x1060/0x1060 [ 43.619434][ T1077] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 43.625073][ T1077] ? node_free_rcu+0x30/0x30 [ 43.629497][ T1077] ? rt6_sync_down_dev+0x170/0x170 [ 43.634444][ T1077] ? try_invoke_on_locked_down_task+0x2a0/0x2a0 [ 43.640526][ T1077] ? schedule_preempt_disabled+0x20/0x20 [ 43.645991][ T1077] rt6_disable_ip+0x153/0x730 [ 43.650500][ T1077] ? preempt_schedule_thunk+0x16/0x18 [ 43.655711][ T1077] ? tracing_record_taskinfo+0x50/0x230 [ 43.661092][ T1077] ? fib6_ifdown+0x510/0x510 [ 43.665518][ T1077] ? __kasan_check_read+0x11/0x20 [ 43.670376][ T1077] addrconf_ifdown+0x160/0x1ae0 [ 43.675064][ T1077] ? wq_worker_last_func+0x50/0x50 [ 43.680010][ T1077] ? addrconf_cleanup+0x1b0/0x1b0 [ 43.684869][ T1077] ? mutex_unlock+0xb2/0x260 [ 43.689298][ T1077] ? __mutex_lock_slowpath+0x10/0x10 [ 43.694418][ T1077] ? nf_nat_masq_schedule+0x620/0x620 [ 43.699625][ T1077] ? masq_device_event+0xd0/0xd0 [ 43.704398][ T1077] addrconf_notify+0x37d/0xdd0 [ 43.709000][ T1077] raw_notifier_call_chain+0x8c/0xf0 [ 43.714118][ T1077] dev_close_many+0x37c/0x530 [ 43.718633][ T1077] ? __dev_open+0x4e0/0x4e0 [ 43.722971][ T1077] ? mutex_unlock+0xb2/0x260 [ 43.727401][ T1077] ? __kasan_check_read+0x11/0x20 [ 43.732258][ T1077] unregister_netdevice_many+0x492/0x17c0 [ 43.737821][ T1077] ? __kasan_check_write+0x14/0x20 [ 43.742759][ T1077] ? synchronize_rcu+0x120/0x120 [ 43.747536][ T1077] ? alloc_netdev_mqs+0xc90/0xc90 [ 43.752394][ T1077] ? locks_remove_file+0x41a/0x1180 [ 43.757432][ T1077] ? __kasan_check_read+0x11/0x20 [ 43.762289][ T1077] unregister_netdevice_queue+0x2e6/0x350 [ 43.767847][ T1077] ? linkwatch_urgent_event+0x335/0x4d0 [ 43.773227][ T1077] ? list_netdevice+0x4c0/0x4c0 [ 43.777915][ T1077] __tun_detach+0xd14/0x1510 [ 43.782342][ T1077] ? wait_for_completion_killable_timeout+0x10/0x10 [ 43.788764][ T1077] tun_chr_close+0x92/0x140 [ 43.793099][ T1077] ? tun_chr_open+0x530/0x530 [ 43.797616][ T1077] __fput+0x3fe/0x910 [ 43.801440][ T1077] ____fput+0x15/0x20 [ 43.805255][ T1077] task_work_run+0x129/0x190 [ 43.809777][ T1077] exit_to_user_mode_loop+0xc4/0xe0 [ 43.815014][ T1077] exit_to_user_mode_prepare+0x5a/0xa0 [ 43.820279][ T1077] syscall_exit_to_user_mode+0x26/0x160 [ 43.825671][ T1077] do_syscall_64+0x47/0xb0 [ 43.830033][ T1077] ? clear_bhb_loop+0x35/0x90 [ 43.834556][ T1077] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 43.840270][ T1077] RIP: 0033:0x7f0a42ea1ff9 [ 43.844521][ T1077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.863963][ T1077] RSP: 002b:00007f0a41afa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 43.872205][ T1077] RAX: 0000000000000000 RBX: 00007f0a4305a058 RCX: 00007f0a42ea1ff9 [ 43.880014][ T1077] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 43.887824][ T1077] RBP: 00007f0a41afa090 R08: 0000000000000000 R09: 0000000000000000 [ 43.895638][ T1077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.903449][ T1077] R13: 0000000000000001 R14: 00007f0a4305a058 R15: 00007fffbeaa0bb8 [ 43.911264][ T1077] [ 44.438721][ T30] audit: type=1400 audit(1727775976.044:138): avc: denied { create } for pid=1093 comm="syz.0.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 44.439226][ T1100] dvmrp1: tun_chr_ioctl cmd 1074025684 [ 44.529581][ T1104] syz.0.239[1104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.529661][ T1104] syz.0.239[1104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.851994][ T1112] device wg2 entered promiscuous mode [ 45.787766][ T30] audit: type=1400 audit(1727775977.394:139): avc: denied { create } for pid=1178 comm="syz.4.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 45.819661][ T1170] device pim6reg1 entered promiscuous mode [ 46.898937][ T1234] device sit0 entered promiscuous mode [ 47.824385][ T30] audit: type=1400 audit(1727775979.434:140): avc: denied { create } for pid=1259 comm="syz.2.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 48.632279][ T1285] syz.3.287[1285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.632375][ T1285] syz.3.287[1285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.497649][ T1316] bridge0: port 3(veth0_to_batadv) entered blocking state [ 49.520039][ T1316] bridge0: port 3(veth0_to_batadv) entered disabled state [ 49.537974][ T1316] device veth0_to_batadv entered promiscuous mode [ 49.547785][ T1316] bridge0: port 3(veth0_to_batadv) entered blocking state [ 49.555222][ T1316] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 49.585602][ T30] audit: type=1400 audit(1727775981.194:141): avc: denied { append } for pid=1322 comm="syz.0.297" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 49.598222][ T1325] device syzkaller0 entered promiscuous mode [ 51.484168][ T1400] device bridge0 entered promiscuous mode [ 51.658987][ T1408] device pim6reg1 entered promiscuous mode [ 51.794795][ T1428] device pim6reg1 entered promiscuous mode [ 53.008457][ C0] sched: RT throttling activated [ 55.233153][ T30] audit: type=1400 audit(1727775986.844:142): avc: denied { create } for pid=1448 comm="syz.2.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 55.454110][ T30] audit: type=1400 audit(1727775987.064:143): avc: denied { ioctl } for pid=1455 comm="syz.2.339" path="pid:[4026532364]" dev="nsfs" ino=4026532364 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.983421][ T1490] device veth0_vlan left promiscuous mode [ 56.006084][ T1490] device veth0_vlan entered promiscuous mode [ 56.059159][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 56.067387][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 56.075720][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 56.300302][ T1495] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.332902][ T1505] syz.2.353[1505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.332978][ T1505] syz.2.353[1505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.255591][ T30] audit: type=1400 audit(1727775988.864:144): avc: denied { create } for pid=1543 comm="syz.1.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 57.592440][ T1564] tun0: tun_chr_ioctl cmd 1074025675 [ 57.617899][ T1564] tun0: persist enabled [ 57.629678][ T1564] tun0: tun_chr_ioctl cmd 1074025675 [ 57.634810][ T1564] tun0: persist enabled [ 58.119426][ T1593] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.126466][ T1593] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.144726][ T1593] device bridge_slave_0 entered promiscuous mode [ 58.170821][ T1593] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.178168][ T1593] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.259548][ T1593] device bridge_slave_1 entered promiscuous mode [ 58.360394][ T1608] device syzkaller0 entered promiscuous mode [ 58.634128][ T1619] device veth1_macvtap left promiscuous mode [ 58.715329][ T1619] device macsec0 entered promiscuous mode [ 58.810888][ T1624] device veth1_macvtap entered promiscuous mode [ 58.927773][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.946862][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.980293][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.013079][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.053469][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.060367][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.092754][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.115085][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.123822][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.130707][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.218002][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.249604][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.261218][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.324364][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 59.356541][ T1593] device veth0_vlan entered promiscuous mode [ 59.384900][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.405817][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.437218][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.505534][ T1593] device veth1_macvtap entered promiscuous mode [ 59.531079][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 59.546592][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 59.556309][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 59.577987][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 59.586447][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 59.642472][ T30] audit: type=1400 audit(1727775991.254:145): avc: denied { mounton } for pid=1593 comm="syz-executor" path="/root/syzkaller.xYheBu/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 59.836911][ T30] audit: type=1400 audit(1727775991.254:146): avc: denied { mount } for pid=1593 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 59.968834][ T30] audit: type=1400 audit(1727775991.284:147): avc: denied { mounton } for pid=1593 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 60.345331][ T1671] device syzkaller0 entered promiscuous mode [ 60.574257][ T1680] device pim6reg1 entered promiscuous mode [ 60.627907][ T1682] device pim6reg1 entered promiscuous mode [ 60.677230][ T1689] bond_slave_1: mtu less than device minimum [ 61.112111][ T1723] device pim6reg1 entered promiscuous mode [ 61.129606][ T1723] FAULT_INJECTION: forcing a failure. [ 61.129606][ T1723] name failslab, interval 1, probability 0, space 0, times 0 [ 61.142742][ T1723] CPU: 1 PID: 1723 Comm: syz.1.416 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 61.153790][ T1723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 61.163680][ T1723] Call Trace: [ 61.166794][ T1723] [ 61.169575][ T1723] dump_stack_lvl+0x151/0x1c0 [ 61.174082][ T1723] ? io_uring_drop_tctx_refs+0x190/0x190 [ 61.179638][ T1723] dump_stack+0x15/0x20 [ 61.183630][ T1723] should_fail+0x3c6/0x510 [ 61.187883][ T1723] __should_failslab+0xa4/0xe0 [ 61.192485][ T1723] ? __alloc_skb+0xbe/0x550 [ 61.196822][ T1723] should_failslab+0x9/0x20 [ 61.201163][ T1723] slab_pre_alloc_hook+0x37/0xd0 [ 61.205940][ T1723] ? __alloc_skb+0xbe/0x550 [ 61.210279][ T1723] kmem_cache_alloc+0x44/0x200 [ 61.214962][ T1723] ? __kasan_slab_free+0x11/0x20 [ 61.219737][ T1723] __alloc_skb+0xbe/0x550 [ 61.223904][ T1723] inet6_netconf_notify_devconf+0xdd/0x190 [ 61.229548][ T1723] addrconf_ifdown+0x17cd/0x1ae0 [ 61.234321][ T1723] ? __kasan_check_write+0x14/0x20 [ 61.239266][ T1723] ? addrconf_cleanup+0x1b0/0x1b0 [ 61.244135][ T1723] ? mutex_unlock+0xb2/0x260 [ 61.248551][ T1723] ? __mutex_lock_slowpath+0x10/0x10 [ 61.253670][ T1723] ? _raw_spin_lock+0xa4/0x1b0 [ 61.258271][ T1723] ? _raw_spin_trylock_bh+0x190/0x190 [ 61.263568][ T1723] addrconf_notify+0x37d/0xdd0 [ 61.268165][ T1723] ? mirred_device_event+0x1c5/0x210 [ 61.273287][ T1723] raw_notifier_call_chain+0x8c/0xf0 [ 61.278410][ T1723] unregister_netdevice_many+0xe0a/0x17c0 [ 61.283966][ T1723] ? synchronize_rcu+0x120/0x120 [ 61.288737][ T1723] ? alloc_netdev_mqs+0xc90/0xc90 [ 61.293598][ T1723] ? locks_remove_file+0x41a/0x1180 [ 61.298732][ T1723] ? __kasan_check_read+0x11/0x20 [ 61.303579][ T1723] unregister_netdevice_queue+0x2e6/0x350 [ 61.309326][ T1723] ? linkwatch_urgent_event+0x335/0x4d0 [ 61.314706][ T1723] ? list_netdevice+0x4c0/0x4c0 [ 61.319397][ T1723] __tun_detach+0xd14/0x1510 [ 61.323819][ T1723] ? wait_for_completion_killable_timeout+0x10/0x10 [ 61.330294][ T1723] tun_chr_close+0x92/0x140 [ 61.334583][ T1723] ? tun_chr_open+0x530/0x530 [ 61.339097][ T1723] __fput+0x3fe/0x910 [ 61.342934][ T1723] ____fput+0x15/0x20 [ 61.346737][ T1723] task_work_run+0x129/0x190 [ 61.351165][ T1723] exit_to_user_mode_loop+0xc4/0xe0 [ 61.356193][ T1723] exit_to_user_mode_prepare+0x5a/0xa0 [ 61.361488][ T1723] syscall_exit_to_user_mode+0x26/0x160 [ 61.366873][ T1723] do_syscall_64+0x47/0xb0 [ 61.371131][ T1723] ? clear_bhb_loop+0x35/0x90 [ 61.375726][ T1723] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 61.381479][ T1723] RIP: 0033:0x7f96fa76bff9 [ 61.385707][ T1723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.405154][ T1723] RSP: 002b:00007f96f93e5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 61.413391][ T1723] RAX: 0000000000000000 RBX: 00007f96fa923f80 RCX: 00007f96fa76bff9 [ 61.421204][ T1723] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 61.429012][ T1723] RBP: 00007f96f93e5090 R08: 0000000000000000 R09: 0000000000000000 [ 61.436910][ T1723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 61.444724][ T1723] R13: 0000000000000000 R14: 00007f96fa923f80 R15: 00007ffe06492118 [ 61.452540][ T1723] [ 62.015791][ T1761] device pim6reg1 entered promiscuous mode [ 62.028639][ T1761] FAULT_INJECTION: forcing a failure. [ 62.028639][ T1761] name failslab, interval 1, probability 0, space 0, times 0 [ 62.055396][ T1761] CPU: 1 PID: 1761 Comm: syz.2.430 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 62.066439][ T1761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 62.076335][ T1761] Call Trace: [ 62.079453][ T1761] [ 62.082235][ T1761] dump_stack_lvl+0x151/0x1c0 [ 62.086750][ T1761] ? io_uring_drop_tctx_refs+0x190/0x190 [ 62.092211][ T1761] ? inet6_dump_fib+0xc90/0xc90 [ 62.096898][ T1761] dump_stack+0x15/0x20 [ 62.100975][ T1761] should_fail+0x3c6/0x510 [ 62.105251][ T1761] __should_failslab+0xa4/0xe0 [ 62.109847][ T1761] should_failslab+0x9/0x20 [ 62.114170][ T1761] slab_pre_alloc_hook+0x37/0xd0 [ 62.118947][ T1761] kmem_cache_alloc_trace+0x48/0x210 [ 62.124066][ T1761] ? nf_nat_masq_schedule+0x2f3/0x620 [ 62.129272][ T1761] nf_nat_masq_schedule+0x2f3/0x620 [ 62.134402][ T1761] ? __kasan_check_write+0x14/0x20 [ 62.139340][ T1761] ? masq_inet_event+0x250/0x250 [ 62.144115][ T1761] ? masq_device_event+0xd0/0xd0 [ 62.148976][ T1761] ? masq_inet6_event+0xd2/0x180 [ 62.153749][ T1761] ? memcpy+0x56/0x70 [ 62.157569][ T1761] masq_inet6_event+0x124/0x180 [ 62.162254][ T1761] ? inet_cmp+0x230/0x230 [ 62.166422][ T1761] ? __kasan_check_write+0x14/0x20 [ 62.171373][ T1761] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 62.176230][ T1761] atomic_notifier_call_chain+0x95/0x100 [ 62.181694][ T1761] inet6addr_notifier_call_chain+0x24/0x30 [ 62.187342][ T1761] addrconf_ifdown+0xe21/0x1ae0 [ 62.192116][ T1761] ? addrconf_cleanup+0x1b0/0x1b0 [ 62.197058][ T1761] ? mutex_unlock+0xb2/0x260 [ 62.201483][ T1761] ? __mutex_lock_slowpath+0x10/0x10 [ 62.206603][ T1761] ? nf_nat_masq_schedule+0x620/0x620 [ 62.211899][ T1761] ? masq_device_event+0xd0/0xd0 [ 62.216673][ T1761] addrconf_notify+0x37d/0xdd0 [ 62.221282][ T1761] raw_notifier_call_chain+0x8c/0xf0 [ 62.226396][ T1761] dev_close_many+0x37c/0x530 [ 62.230997][ T1761] ? __dev_open+0x4e0/0x4e0 [ 62.235337][ T1761] ? __kasan_check_read+0x11/0x20 [ 62.240206][ T1761] unregister_netdevice_many+0x492/0x17c0 [ 62.245775][ T1761] ? __kasan_check_write+0x14/0x20 [ 62.250695][ T1761] ? slab_free_freelist_hook+0xbd/0x190 [ 62.256077][ T1761] ? alloc_netdev_mqs+0xc90/0xc90 [ 62.260937][ T1761] ? add_timer+0x68/0x80 [ 62.265015][ T1761] ? __queue_delayed_work+0x16d/0x1f0 [ 62.270229][ T1761] ? __kasan_check_read+0x11/0x20 [ 62.275084][ T1761] unregister_netdevice_queue+0x2e6/0x350 [ 62.280640][ T1761] ? linkwatch_urgent_event+0x335/0x4d0 [ 62.286019][ T1761] ? list_netdevice+0x4c0/0x4c0 [ 62.290709][ T1761] __tun_detach+0xd14/0x1510 [ 62.295233][ T1761] ? wait_for_completion_killable_timeout+0x10/0x10 [ 62.301732][ T1761] tun_chr_close+0x92/0x140 [ 62.306068][ T1761] ? tun_chr_open+0x530/0x530 [ 62.310582][ T1761] __fput+0x3fe/0x910 [ 62.314406][ T1761] ____fput+0x15/0x20 [ 62.318312][ T1761] task_work_run+0x129/0x190 [ 62.322734][ T1761] exit_to_user_mode_loop+0xc4/0xe0 [ 62.327769][ T1761] exit_to_user_mode_prepare+0x5a/0xa0 [ 62.333064][ T1761] syscall_exit_to_user_mode+0x26/0x160 [ 62.338460][ T1761] do_syscall_64+0x47/0xb0 [ 62.342694][ T1761] ? clear_bhb_loop+0x35/0x90 [ 62.347216][ T1761] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 62.353023][ T1761] RIP: 0033:0x7ff9087feff9 [ 62.357277][ T1761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.376808][ T1761] RSP: 002b:00007ff907478038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 62.385052][ T1761] RAX: 0000000000000000 RBX: 00007ff9089b6f80 RCX: 00007ff9087feff9 [ 62.392861][ T1761] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 62.400672][ T1761] RBP: 00007ff907478090 R08: 0000000000000000 R09: 0000000000000000 [ 62.408487][ T1761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 62.416296][ T1761] R13: 0000000000000000 R14: 00007ff9089b6f80 R15: 00007ffe0701aa98 [ 62.424111][ T1761] [ 62.472791][ T1768] tun0: tun_chr_ioctl cmd 2148553947 [ 62.768051][ T1784] device pim6reg1 entered promiscuous mode [ 62.933867][ T1797] device lo entered promiscuous mode [ 63.042967][ T30] audit: type=1400 audit(1727775994.654:148): avc: denied { create } for pid=1806 comm="syz.3.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 63.095906][ T1813] syz.4.446[1813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.095968][ T1813] syz.4.446[1813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.248154][ T1818] device sit0 left promiscuous mode [ 63.636802][ T1831] device pim6reg1 entered promiscuous mode [ 64.509255][ T30] audit: type=1400 audit(1727775996.124:149): avc: denied { create } for pid=1879 comm="syz.4.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 65.097302][ T1905] device sit0 entered promiscuous mode [ 65.160449][ T1907] syz.3.472 (1907) used greatest stack depth: 21264 bytes left [ 65.712630][ T1928] device pim6reg1 entered promiscuous mode [ 73.076565][ T2087] device syzkaller0 entered promiscuous mode [ 73.227585][ T2098] device sit0 entered promiscuous mode [ 73.480325][ T2117] device pim6reg1 entered promiscuous mode [ 73.492007][ T2117] FAULT_INJECTION: forcing a failure. [ 73.492007][ T2117] name failslab, interval 1, probability 0, space 0, times 0 [ 73.505123][ T2117] CPU: 1 PID: 2117 Comm: syz.3.533 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 73.516146][ T2117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 73.526131][ T2117] Call Trace: [ 73.529253][ T2117] [ 73.532028][ T2117] dump_stack_lvl+0x151/0x1c0 [ 73.536541][ T2117] ? io_uring_drop_tctx_refs+0x190/0x190 [ 73.542017][ T2117] dump_stack+0x15/0x20 [ 73.546000][ T2117] should_fail+0x3c6/0x510 [ 73.550340][ T2117] __should_failslab+0xa4/0xe0 [ 73.554944][ T2117] ? __alloc_skb+0xbe/0x550 [ 73.559287][ T2117] should_failslab+0x9/0x20 [ 73.563632][ T2117] slab_pre_alloc_hook+0x37/0xd0 [ 73.568393][ T2117] ? __alloc_skb+0xbe/0x550 [ 73.572730][ T2117] kmem_cache_alloc+0x44/0x200 [ 73.577331][ T2117] __alloc_skb+0xbe/0x550 [ 73.581497][ T2117] alloc_uevent_skb+0x80/0x230 [ 73.586103][ T2117] kobject_uevent_net_broadcast+0x188/0x590 [ 73.591836][ T2117] kobject_uevent_env+0x525/0x700 [ 73.596691][ T2117] kobject_uevent+0x1f/0x30 [ 73.601031][ T2117] __kobject_del+0xee/0x300 [ 73.605369][ T2117] kobject_put+0x1cc/0x260 [ 73.609628][ T2117] net_rx_queue_update_kobjects+0x418/0x490 [ 73.615438][ T2117] netdev_unregister_kobject+0x10a/0x260 [ 73.620915][ T2117] unregister_netdevice_many+0x1295/0x17c0 [ 73.626549][ T2117] ? alloc_netdev_mqs+0xc90/0xc90 [ 73.631404][ T2117] ? add_timer+0x68/0x80 [ 73.635495][ T2117] ? __queue_delayed_work+0x16d/0x1f0 [ 73.640693][ T2117] ? __kasan_check_read+0x11/0x20 [ 73.645551][ T2117] unregister_netdevice_queue+0x2e6/0x350 [ 73.651111][ T2117] ? linkwatch_urgent_event+0x335/0x4d0 [ 73.656487][ T2117] ? list_netdevice+0x4c0/0x4c0 [ 73.661177][ T2117] __tun_detach+0xd14/0x1510 [ 73.665655][ T2117] ? wait_for_completion_killable_timeout+0x10/0x10 [ 73.672029][ T2117] tun_chr_close+0x92/0x140 [ 73.676362][ T2117] ? tun_chr_open+0x530/0x530 [ 73.680877][ T2117] __fput+0x3fe/0x910 [ 73.684699][ T2117] ____fput+0x15/0x20 [ 73.688521][ T2117] task_work_run+0x129/0x190 [ 73.692946][ T2117] exit_to_user_mode_loop+0xc4/0xe0 [ 73.697978][ T2117] exit_to_user_mode_prepare+0x5a/0xa0 [ 73.703274][ T2117] syscall_exit_to_user_mode+0x26/0x160 [ 73.708652][ T2117] do_syscall_64+0x47/0xb0 [ 73.712905][ T2117] ? clear_bhb_loop+0x35/0x90 [ 73.717433][ T2117] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 73.723234][ T2117] RIP: 0033:0x7f87b61fdff9 [ 73.727485][ T2117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.747099][ T2117] RSP: 002b:00007f87b4e77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 73.755354][ T2117] RAX: 0000000000000000 RBX: 00007f87b63b5f80 RCX: 00007f87b61fdff9 [ 73.763159][ T2117] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 73.770966][ T2117] RBP: 00007f87b4e77090 R08: 0000000000000000 R09: 0000000000000000 [ 73.778777][ T2117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 73.786590][ T2117] R13: 0000000000000000 R14: 00007f87b63b5f80 R15: 00007fff23254e48 [ 73.794413][ T2117] [ 74.284577][ T2138] ÿÿÿÿÿÿ: renamed from vlan1 [ 74.718698][ T2165] device sit0 left promiscuous mode [ 74.841011][ T2171] device pim6reg1 entered promiscuous mode [ 74.875242][ T2168] FAULT_INJECTION: forcing a failure. [ 74.875242][ T2168] name failslab, interval 1, probability 0, space 0, times 0 [ 74.888219][ T2168] CPU: 1 PID: 2168 Comm: syz.4.547 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 74.899274][ T2168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 74.909141][ T2168] Call Trace: [ 74.912262][ T2168] [ 74.915044][ T2168] dump_stack_lvl+0x151/0x1c0 [ 74.919549][ T2168] ? io_uring_drop_tctx_refs+0x190/0x190 [ 74.925017][ T2168] dump_stack+0x15/0x20 [ 74.929013][ T2168] should_fail+0x3c6/0x510 [ 74.933263][ T2168] __should_failslab+0xa4/0xe0 [ 74.937862][ T2168] should_failslab+0x9/0x20 [ 74.942205][ T2168] slab_pre_alloc_hook+0x37/0xd0 [ 74.946973][ T2168] ? __ipv6_ifa_notify+0x2e1/0x11c0 [ 74.952021][ T2168] __kmalloc_track_caller+0x6c/0x260 [ 74.957129][ T2168] ? __ipv6_ifa_notify+0x2e1/0x11c0 [ 74.962167][ T2168] ? __ipv6_ifa_notify+0x2e1/0x11c0 [ 74.967214][ T2168] __alloc_skb+0x10c/0x550 [ 74.971455][ T2168] __ipv6_ifa_notify+0x2e1/0x11c0 [ 74.976314][ T2168] ? snmp6_fill_stats+0x720/0x720 [ 74.981173][ T2168] ? __kasan_check_write+0x14/0x20 [ 74.986116][ T2168] ? try_to_grab_pending+0x1de/0x5d0 [ 74.991241][ T2168] ? mod_delayed_work_on+0x190/0x190 [ 74.996448][ T2168] ? neigh_ifdown+0x1f/0x30 [ 75.000789][ T2168] ? __kasan_check_write+0x14/0x20 [ 75.005825][ T2168] ? __kasan_check_write+0x14/0x20 [ 75.010773][ T2168] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 75.015636][ T2168] addrconf_ifdown+0xe14/0x1ae0 [ 75.020318][ T2168] ? addrconf_cleanup+0x1b0/0x1b0 [ 75.025370][ T2168] ? mutex_unlock+0xb2/0x260 [ 75.029786][ T2168] ? __mutex_lock_slowpath+0x10/0x10 [ 75.034903][ T2168] ? nf_nat_masq_schedule+0x620/0x620 [ 75.040105][ T2168] ? masq_device_event+0xd0/0xd0 [ 75.044878][ T2168] addrconf_notify+0x37d/0xdd0 [ 75.049480][ T2168] raw_notifier_call_chain+0x8c/0xf0 [ 75.054608][ T2168] dev_close_many+0x37c/0x530 [ 75.059224][ T2168] ? __dev_open+0x4e0/0x4e0 [ 75.063575][ T2168] ? __kasan_check_read+0x11/0x20 [ 75.068423][ T2168] unregister_netdevice_many+0x492/0x17c0 [ 75.073977][ T2168] ? kmem_cache_free+0x116/0x2e0 [ 75.078751][ T2168] ? __kasan_check_write+0x14/0x20 [ 75.083696][ T2168] ? alloc_netdev_mqs+0xc90/0xc90 [ 75.088559][ T2168] ? __kasan_check_read+0x11/0x20 [ 75.093418][ T2168] unregister_netdevice_queue+0x2e6/0x350 [ 75.098970][ T2168] ? linkwatch_urgent_event+0x335/0x4d0 [ 75.104353][ T2168] ? list_netdevice+0x4c0/0x4c0 [ 75.109041][ T2168] __tun_detach+0xd14/0x1510 [ 75.113464][ T2168] ? wait_for_completion_killable_timeout+0x10/0x10 [ 75.119892][ T2168] tun_chr_close+0x92/0x140 [ 75.124228][ T2168] ? tun_chr_open+0x530/0x530 [ 75.128738][ T2168] __fput+0x3fe/0x910 [ 75.132561][ T2168] ____fput+0x15/0x20 [ 75.136378][ T2168] task_work_run+0x129/0x190 [ 75.140809][ T2168] exit_to_user_mode_loop+0xc4/0xe0 [ 75.145838][ T2168] exit_to_user_mode_prepare+0x5a/0xa0 [ 75.151132][ T2168] syscall_exit_to_user_mode+0x26/0x160 [ 75.156515][ T2168] do_syscall_64+0x47/0xb0 [ 75.160769][ T2168] ? clear_bhb_loop+0x35/0x90 [ 75.165280][ T2168] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 75.171009][ T2168] RIP: 0033:0x7f6653522ff9 [ 75.175272][ T2168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.194706][ T2168] RSP: 002b:00007f665219c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 75.202959][ T2168] RAX: 0000000000000000 RBX: 00007f66536daf80 RCX: 00007f6653522ff9 [ 75.210759][ T2168] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 75.218574][ T2168] RBP: 00007f665219c090 R08: 0000000000000000 R09: 0000000000000000 [ 75.226384][ T2168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 75.234208][ T2168] R13: 0000000000000000 R14: 00007f66536daf80 R15: 00007ffd6ed34f58 [ 75.242098][ T2168] [ 75.374082][ T2185] device wg2 left promiscuous mode [ 75.410671][ T2186] device wg2 entered promiscuous mode [ 75.428868][ T2185] device wg2 left promiscuous mode [ 75.453190][ T2189] device syzkaller0 entered promiscuous mode [ 75.469340][ T2187] ref_ctr_offset mismatch. inode: 0xc3 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 75.721857][ T2219] device pim6reg1 entered promiscuous mode [ 75.787158][ T2225] FAULT_INJECTION: forcing a failure. [ 75.787158][ T2225] name failslab, interval 1, probability 0, space 0, times 0 [ 75.801201][ T2225] CPU: 1 PID: 2225 Comm: syz.2.562 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 75.812247][ T2225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 75.822139][ T2225] Call Trace: [ 75.825273][ T2225] [ 75.828026][ T2225] dump_stack_lvl+0x151/0x1c0 [ 75.832546][ T2225] ? io_uring_drop_tctx_refs+0x190/0x190 [ 75.838005][ T2225] ? __kasan_slab_free+0x11/0x20 [ 75.842780][ T2225] dump_stack+0x15/0x20 [ 75.846768][ T2225] should_fail+0x3c6/0x510 [ 75.851025][ T2225] __should_failslab+0xa4/0xe0 [ 75.855621][ T2225] should_failslab+0x9/0x20 [ 75.859963][ T2225] slab_pre_alloc_hook+0x37/0xd0 [ 75.864737][ T2225] ? dev_uevent_filter+0xb0/0xb0 [ 75.869519][ T2225] kmem_cache_alloc_trace+0x48/0x210 [ 75.874630][ T2225] ? kobject_uevent_env+0x269/0x700 [ 75.879665][ T2225] ? dev_uevent_filter+0xb0/0xb0 [ 75.884438][ T2225] kobject_uevent_env+0x269/0x700 [ 75.889300][ T2225] ? dev_fwnode+0x50/0x80 [ 75.893465][ T2225] kobject_uevent+0x1f/0x30 [ 75.897805][ T2225] device_del+0xcbd/0xe90 [ 75.901980][ T2225] ? kill_device+0xd0/0xd0 [ 75.906226][ T2225] ? dynamic_kobj_release+0x20/0x20 [ 75.911258][ T2225] ? pm_runtime_set_memalloc_noio+0x21f/0x270 [ 75.917160][ T2225] netdev_unregister_kobject+0x18b/0x260 [ 75.922630][ T2225] unregister_netdevice_many+0x1295/0x17c0 [ 75.928273][ T2225] ? alloc_netdev_mqs+0xc90/0xc90 [ 75.933142][ T2225] ? add_timer+0x68/0x80 [ 75.937212][ T2225] ? __queue_delayed_work+0x16d/0x1f0 [ 75.942418][ T2225] ? __kasan_check_read+0x11/0x20 [ 75.947276][ T2225] unregister_netdevice_queue+0x2e6/0x350 [ 75.952833][ T2225] ? linkwatch_urgent_event+0x335/0x4d0 [ 75.958213][ T2225] ? list_netdevice+0x4c0/0x4c0 [ 75.962901][ T2225] __tun_detach+0xd14/0x1510 [ 75.967331][ T2225] tun_chr_close+0x92/0x140 [ 75.971662][ T2225] ? tun_chr_open+0x530/0x530 [ 75.976193][ T2225] __fput+0x3fe/0x910 [ 75.979999][ T2225] ____fput+0x15/0x20 [ 75.983817][ T2225] task_work_run+0x129/0x190 [ 75.988416][ T2225] exit_to_user_mode_loop+0xc4/0xe0 [ 75.993463][ T2225] exit_to_user_mode_prepare+0x5a/0xa0 [ 75.998748][ T2225] syscall_exit_to_user_mode+0x26/0x160 [ 76.004215][ T2225] do_syscall_64+0x47/0xb0 [ 76.008652][ T2225] ? clear_bhb_loop+0x35/0x90 [ 76.013162][ T2225] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 76.018892][ T2225] RIP: 0033:0x7ff9087feff9 [ 76.023143][ T2225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.042668][ T2225] RSP: 002b:00007ff907457038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 76.051162][ T2225] RAX: 0000000000000000 RBX: 00007ff9089b7058 RCX: 00007ff9087feff9 [ 76.058938][ T2225] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 76.066832][ T2225] RBP: 00007ff907457090 R08: 0000000000000000 R09: 0000000000000000 [ 76.074647][ T2225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 76.082459][ T2225] R13: 0000000000000001 R14: 00007ff9089b7058 R15: 00007ffe0701aa98 [ 76.090283][ T2225] [ 76.131353][ T2227] bond_slave_1: mtu greater than device maximum [ 76.460015][ T2239] device pim6reg1 entered promiscuous mode [ 77.234700][ T30] audit: type=1400 audit(1727776008.844:150): avc: denied { create } for pid=2269 comm="syz.3.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 77.254095][ T2270] device veth1_macvtap left promiscuous mode [ 77.274892][ T2270] device veth1_macvtap entered promiscuous mode [ 77.281910][ T2270] device macsec0 entered promiscuous mode [ 77.347264][ T2274] device pim6reg1 entered promiscuous mode [ 77.393238][ T2274] FAULT_INJECTION: forcing a failure. [ 77.393238][ T2274] name failslab, interval 1, probability 0, space 0, times 0 [ 77.424286][ T2274] CPU: 1 PID: 2274 Comm: syz.3.578 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 77.435327][ T2274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 77.445220][ T2274] Call Trace: [ 77.448339][ T2274] [ 77.451118][ T2274] dump_stack_lvl+0x151/0x1c0 [ 77.455636][ T2274] ? io_uring_drop_tctx_refs+0x190/0x190 [ 77.461097][ T2274] ? task_work_run+0x129/0x190 [ 77.465699][ T2274] ? do_syscall_64+0x47/0xb0 [ 77.470128][ T2274] dump_stack+0x15/0x20 [ 77.474116][ T2274] should_fail+0x3c6/0x510 [ 77.478373][ T2274] __should_failslab+0xa4/0xe0 [ 77.482970][ T2274] should_failslab+0x9/0x20 [ 77.487314][ T2274] slab_pre_alloc_hook+0x37/0xd0 [ 77.492088][ T2274] __kmalloc+0x6d/0x270 [ 77.496077][ T2274] ? kobject_get_path+0xbc/0x1f0 [ 77.500851][ T2274] kobject_get_path+0xbc/0x1f0 [ 77.505454][ T2274] kobject_uevent_env+0x27f/0x700 [ 77.510319][ T2274] kobject_uevent+0x1f/0x30 [ 77.514649][ T2274] __kobject_del+0xee/0x300 [ 77.518991][ T2274] kobject_put+0x1cc/0x260 [ 77.523245][ T2274] netdev_queue_update_kobjects+0x390/0x400 [ 77.529061][ T2274] ? net_rx_queue_update_kobjects+0x46f/0x490 [ 77.534962][ T2274] netdev_unregister_kobject+0x117/0x260 [ 77.540434][ T2274] unregister_netdevice_many+0x1295/0x17c0 [ 77.546074][ T2274] ? alloc_netdev_mqs+0xc90/0xc90 [ 77.550931][ T2274] ? add_timer+0x68/0x80 [ 77.555015][ T2274] ? __queue_delayed_work+0x16d/0x1f0 [ 77.560224][ T2274] ? __kasan_check_read+0x11/0x20 [ 77.565081][ T2274] unregister_netdevice_queue+0x2e6/0x350 [ 77.570729][ T2274] ? linkwatch_urgent_event+0x335/0x4d0 [ 77.576111][ T2274] ? list_netdevice+0x4c0/0x4c0 [ 77.580805][ T2274] __tun_detach+0xd14/0x1510 [ 77.585220][ T2274] ? wait_for_completion_killable_timeout+0x10/0x10 [ 77.591753][ T2274] tun_chr_close+0x92/0x140 [ 77.596083][ T2274] ? tun_chr_open+0x530/0x530 [ 77.600608][ T2274] __fput+0x3fe/0x910 [ 77.604440][ T2274] ____fput+0x15/0x20 [ 77.608233][ T2274] task_work_run+0x129/0x190 [ 77.612664][ T2274] exit_to_user_mode_loop+0xc4/0xe0 [ 77.617701][ T2274] exit_to_user_mode_prepare+0x5a/0xa0 [ 77.622987][ T2274] syscall_exit_to_user_mode+0x26/0x160 [ 77.628454][ T2274] do_syscall_64+0x47/0xb0 [ 77.632706][ T2274] ? clear_bhb_loop+0x35/0x90 [ 77.637218][ T2274] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 77.642946][ T2274] RIP: 0033:0x7f87b61fdff9 [ 77.647204][ T2274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.666819][ T2274] RSP: 002b:00007f87b4e77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 77.675148][ T2274] RAX: 0000000000000000 RBX: 00007f87b63b5f80 RCX: 00007f87b61fdff9 [ 77.682957][ T2274] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 77.690780][ T2274] RBP: 00007f87b4e77090 R08: 0000000000000000 R09: 0000000000000000 [ 77.698587][ T2274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 77.706394][ T2274] R13: 0000000000000000 R14: 00007f87b63b5f80 R15: 00007fff23254e48 [ 77.714222][ T2274] [ 78.271867][ T2299] ------------[ cut here ]------------ [ 78.310366][ T2299] trace type BPF program uses run-time allocation [ 78.366519][ T2306] device syzkaller0 entered promiscuous mode [ 78.392978][ T2299] WARNING: CPU: 0 PID: 2299 at kernel/bpf/verifier.c:11689 check_map_prog_compatibility+0x6f1/0x890 [ 78.417823][ T2299] Modules linked in: [ 78.430468][ T2299] CPU: 0 PID: 2299 Comm: syz.2.586 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 78.463489][ T2299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 78.508266][ T2299] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 78.545283][ T2299] Code: db e9 f9 fc ff ff e8 1e 33 ed ff 31 db e9 ed fc ff ff e8 12 33 ed ff c6 05 1d 3c a3 05 01 48 c7 c7 c0 e1 87 85 e8 4f 70 be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 78.607171][ T2299] RSP: 0018:ffffc90000c3f328 EFLAGS: 00010246 [ 78.613547][ T2299] RAX: 7f81141f7ac1a400 RBX: 0000000000000001 RCX: 0000000000040000 [ 78.627535][ T2320] device pim6reg1 entered promiscuous mode [ 78.635446][ T2299] RDX: ffffc9000175f000 RSI: 0000000000000af4 RDI: 0000000000000af5 [ 78.651925][ T2299] RBP: ffffc90000c3f370 R08: ffffffff81578a05 R09: fffff52000187d8d [ 78.652252][ T2320] FAULT_INJECTION: forcing a failure. [ 78.652252][ T2320] name failslab, interval 1, probability 0, space 0, times 0 [ 78.672963][ T2299] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 78.681947][ T2299] R13: ffff88812404a000 R14: ffffc900000de000 R15: dffffc0000000000 [ 78.690148][ T2299] FS: 00007ff9074786c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 78.699207][ T2320] CPU: 0 PID: 2320 Comm: syz.4.592 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 78.710318][ T2320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 78.720292][ T2320] Call Trace: [ 78.723418][ T2320] [ 78.726195][ T2320] dump_stack_lvl+0x151/0x1c0 [ 78.730967][ T2320] ? io_uring_drop_tctx_refs+0x190/0x190 [ 78.736439][ T2320] dump_stack+0x15/0x20 [ 78.740443][ T2320] should_fail+0x3c6/0x510 [ 78.744705][ T2320] __should_failslab+0xa4/0xe0 [ 78.749279][ T2320] ? __alloc_skb+0xbe/0x550 [ 78.753627][ T2320] should_failslab+0x9/0x20 [ 78.757965][ T2320] slab_pre_alloc_hook+0x37/0xd0 [ 78.762736][ T2320] ? __alloc_skb+0xbe/0x550 [ 78.767072][ T2320] kmem_cache_alloc+0x44/0x200 [ 78.771672][ T2320] __alloc_skb+0xbe/0x550 [ 78.775848][ T2320] alloc_uevent_skb+0x80/0x230 [ 78.780438][ T2320] kobject_uevent_net_broadcast+0x188/0x590 [ 78.786169][ T2320] kobject_uevent_env+0x525/0x700 [ 78.791030][ T2320] kobject_uevent+0x1f/0x30 [ 78.795366][ T2320] __kobject_del+0xee/0x300 [ 78.799710][ T2320] kobject_put+0x1cc/0x260 [ 78.803994][ T2320] netdev_queue_update_kobjects+0x390/0x400 [ 78.809693][ T2320] ? net_rx_queue_update_kobjects+0x46f/0x490 [ 78.815593][ T2320] netdev_unregister_kobject+0x117/0x260 [ 78.821057][ T2320] unregister_netdevice_many+0x1295/0x17c0 [ 78.826710][ T2320] ? alloc_netdev_mqs+0xc90/0xc90 [ 78.831568][ T2320] ? __traceiter_kmem_cache_free+0x32/0x50 [ 78.837205][ T2320] ? __kasan_check_read+0x11/0x20 [ 78.842064][ T2320] unregister_netdevice_queue+0x2e6/0x350 [ 78.847613][ T2320] ? linkwatch_urgent_event+0x335/0x4d0 [ 78.853002][ T2320] ? list_netdevice+0x4c0/0x4c0 [ 78.857689][ T2320] __tun_detach+0xd14/0x1510 [ 78.862109][ T2320] ? wait_for_completion_killable_timeout+0x10/0x10 [ 78.868537][ T2320] tun_chr_close+0x92/0x140 [ 78.872873][ T2320] ? tun_chr_open+0x530/0x530 [ 78.877388][ T2320] __fput+0x3fe/0x910 [ 78.881208][ T2320] ____fput+0x15/0x20 [ 78.885025][ T2320] task_work_run+0x129/0x190 [ 78.889451][ T2320] exit_to_user_mode_loop+0xc4/0xe0 [ 78.894482][ T2320] exit_to_user_mode_prepare+0x5a/0xa0 [ 78.899780][ T2320] syscall_exit_to_user_mode+0x26/0x160 [ 78.905166][ T2320] do_syscall_64+0x47/0xb0 [ 78.909410][ T2320] ? clear_bhb_loop+0x35/0x90 [ 78.913925][ T2320] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 78.919656][ T2320] RIP: 0033:0x7f6653522ff9 [ 78.923907][ T2320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.943446][ T2320] RSP: 002b:00007f665219c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 78.951690][ T2320] RAX: 0000000000000000 RBX: 00007f66536daf80 RCX: 00007f6653522ff9 [ 78.959503][ T2320] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 78.967316][ T2320] RBP: 00007f665219c090 R08: 0000000000000000 R09: 0000000000000000 [ 78.975137][ T2320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 78.983370][ T2320] R13: 0000000000000000 R14: 00007f66536daf80 R15: 00007ffd6ed34f58 [ 78.991190][ T2320] [ 79.003217][ T2299] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 79.048165][ T2299] CR2: 00005555557b14a8 CR3: 000000012a5b9000 CR4: 00000000003506b0 [ 79.068740][ T2299] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 79.076849][ T2299] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 79.126354][ T2299] Call Trace: [ 79.133055][ T2299] [ 79.135819][ T2299] ? show_regs+0x58/0x60 [ 79.148492][ T2299] ? __warn+0x160/0x2f0 [ 79.152638][ T2299] ? check_map_prog_compatibility+0x6f1/0x890 [ 79.158599][ T2299] ? report_bug+0x3d9/0x5b0 [ 79.162881][ T2299] ? check_map_prog_compatibility+0x6f1/0x890 [ 79.208537][ T2299] ? handle_bug+0x41/0x70 [ 79.212722][ T2299] ? exc_invalid_op+0x1b/0x50 [ 79.217235][ T2299] ? asm_exc_invalid_op+0x1b/0x20 [ 79.238501][ T2299] ? __wake_up_klogd+0xd5/0x110 [ 79.243257][ T2299] ? check_map_prog_compatibility+0x6f1/0x890 [ 79.249218][ T2299] ? check_map_prog_compatibility+0x6f1/0x890 [ 79.255267][ T2299] resolve_pseudo_ldimm64+0x682/0x1240 [ 79.263436][ T2299] ? check_attach_btf_id+0xef0/0xef0 [ 79.268632][ T2299] ? bpf_check+0x2c36/0x12bf0 [ 79.273703][ T2332] bridge0: port 3(veth0_to_batadv) entered disabled state [ 79.278503][ T2299] ? bpf_check+0x2d23/0x12bf0 [ 79.280790][ T2332] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.288471][ T2299] bpf_check+0x3174/0x12bf0 [ 79.296462][ T2299] ? bpf_prog_5983b2ecacd72377+0x13c/0xd58 [ 79.302369][ T2299] ? is_bpf_text_address+0x172/0x190 [ 79.317675][ T2299] ? stack_trace_save+0x1c0/0x1c0 [ 79.322700][ T2299] ? __kernel_text_address+0x9b/0x110 [ 79.328097][ T2299] ? unwind_get_return_address+0x4d/0x90 [ 79.333613][ T2299] ? bpf_get_btf_vmlinux+0x60/0x60 [ 79.348801][ T2299] ? irqentry_exit+0x30/0x40 [ 79.353570][ T2299] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 79.359348][ T2299] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 79.365441][ T2299] ? __stack_depot_save+0x15f/0x470 [ 79.378316][ T2299] ? __stack_depot_save+0x34/0x470 [ 79.383371][ T2299] ? ____kasan_kmalloc+0xed/0x110 [ 79.397484][ T2299] ? ____kasan_kmalloc+0xdb/0x110 [ 79.405292][ T2299] ? __kasan_kmalloc+0x9/0x10 [ 79.414944][ T2299] ? kmem_cache_alloc_trace+0x115/0x210 [ 79.416983][ T2322] bridge0: port 3(veth0_to_batadv) entered blocking state [ 79.420393][ T2299] ? selinux_bpf_prog_alloc+0x51/0x140 [ 79.420425][ T2299] ? security_bpf_prog_alloc+0x62/0x90 [ 79.420447][ T2299] ? bpf_prog_load+0x9ee/0x1b50 [ 79.420470][ T2299] ? __sys_bpf+0x4bc/0x760 [ 79.420490][ T2299] ? __x64_sys_bpf+0x7c/0x90 [ 79.420509][ T2299] ? x64_sys_call+0x87f/0x9a0 [ 79.420530][ T2299] ? do_syscall_64+0x3b/0xb0 [ 79.420553][ T2299] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 79.420592][ T2299] ? __kasan_kmalloc+0x9/0x10 [ 79.420615][ T2299] ? memset+0x35/0x40 [ 79.420636][ T2299] ? bpf_obj_name_cpy+0x196/0x1e0 [ 79.420657][ T2299] bpf_prog_load+0x12ac/0x1b50 [ 79.420682][ T2299] ? map_freeze+0x370/0x370 [ 79.420708][ T2299] ? selinux_bpf+0xcb/0x100 [ 79.420727][ T2299] ? security_bpf+0x82/0xb0 [ 79.420749][ T2299] __sys_bpf+0x4bc/0x760 [ 79.420769][ T2299] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 79.420798][ T2299] __x64_sys_bpf+0x7c/0x90 [ 79.420819][ T2299] x64_sys_call+0x87f/0x9a0 [ 79.420838][ T2299] do_syscall_64+0x3b/0xb0 [ 79.420861][ T2299] ? clear_bhb_loop+0x35/0x90 [ 79.420880][ T2299] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 79.420905][ T2299] RIP: 0033:0x7ff9087feff9 [ 79.420924][ T2299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.420941][ T2299] RSP: 002b:00007ff907478038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 79.420964][ T2299] RAX: ffffffffffffffda RBX: 00007ff9089b6f80 RCX: 00007ff9087feff9 [ 79.420979][ T2299] RDX: 0000000000000094 RSI: 0000000020000200 RDI: 0000000000000005 [ 79.420993][ T2299] RBP: 00007ff908871296 R08: 0000000000000000 R09: 0000000000000000 [ 79.421007][ T2299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 79.421019][ T2299] R13: 0000000000000000 R14: 00007ff9089b6f80 R15: 00007ffe0701aa98 [ 79.421040][ T2299] [ 79.421047][ T2299] ---[ end trace 77c8f9debe8a3c13 ]--- [ 79.676053][ T2322] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 79.692373][ T2322] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.701313][ T2322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.763376][ T2322] device bridge0 entered promiscuous mode [ 79.839126][ T2351] device pim6reg1 entered promiscuous mode [ 79.943094][ T30] audit: type=1400 audit(1727776011.554:151): avc: denied { write } for pid=2359 comm="syz.2.602" name="cgroup.subtree_control" dev="cgroup2" ino=327 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 79.968892][ T30] audit: type=1400 audit(1727776011.554:152): avc: denied { open } for pid=2359 comm="syz.2.602" path="" dev="cgroup2" ino=327 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 91.799776][ T292] syz-executor (292) used greatest stack depth: 20880 bytes left [ 92.138647][ T2380] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.145590][ T2380] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.153620][ T2380] device bridge_slave_0 entered promiscuous mode [ 92.225910][ T2381] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.232908][ T2381] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.240151][ T2381] device bridge_slave_0 entered promiscuous mode [ 92.252391][ T2380] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.259261][ T2380] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.266445][ T2380] device bridge_slave_1 entered promiscuous mode [ 92.282591][ T291] syz-executor (291) used greatest stack depth: 20416 bytes left [ 92.293877][ T2381] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.300738][ T2381] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.308025][ T2381] device bridge_slave_1 entered promiscuous mode [ 92.327780][ T2383] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.334820][ T2383] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.342073][ T2383] device bridge_slave_0 entered promiscuous mode [ 92.352337][ T2382] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.359202][ T2382] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.366387][ T2382] device bridge_slave_0 entered promiscuous mode [ 92.377917][ T2383] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.384835][ T2383] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.392057][ T2383] device bridge_slave_1 entered promiscuous mode [ 92.406921][ T2382] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.413806][ T2382] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.421216][ T2382] device bridge_slave_1 entered promiscuous mode [ 92.581016][ T2384] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.587902][ T2384] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.595320][ T2384] device bridge_slave_0 entered promiscuous mode [ 92.614369][ T1101] device veth0_macvtap left promiscuous mode [ 92.620371][ T1101] bridge0: port 4(veth0_macvtap) entered disabled state [ 92.627648][ T1101] device veth0_to_batadv left promiscuous mode [ 92.633752][ T1101] bridge0: port 3(veth0_to_batadv) entered disabled state [ 92.641116][ T1101] device bridge_slave_1 left promiscuous mode [ 92.647136][ T1101] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.654523][ T1101] device bridge_slave_0 left promiscuous mode [ 92.660512][ T1101] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.668277][ T1101] device veth1_macvtap left promiscuous mode [ 92.832084][ T2384] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.838957][ T2384] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.846265][ T2384] device bridge_slave_1 entered promiscuous mode [ 92.985042][ T2384] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.991918][ T2384] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.009227][ T1223] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.016540][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.024231][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.051714][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.059204][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.066619][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.074950][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.083039][ T1223] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.089879][ T1223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.097047][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.105193][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.113338][ T1223] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.120445][ T1223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.127606][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.135804][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.143646][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.151511][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.170324][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.177803][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.185328][ T1223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.213052][ T2383] device veth0_vlan entered promiscuous mode [ 93.219664][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.227864][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.236900][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.244575][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.251793][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.259883][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.267773][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.274527][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.281880][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.290026][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.297954][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.304793][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.312009][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.320148][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.328037][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.334797][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.359153][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.366641][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.374405][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.383095][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.391115][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.397969][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.405135][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.413057][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.420780][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.428932][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.448684][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.455960][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.463547][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.471683][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.480217][ T362] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.487042][ T362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.494255][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.502403][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.510353][ T362] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.517265][ T362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.525185][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.533141][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.540947][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.548795][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.561111][ T2383] device veth1_macvtap entered promiscuous mode [ 93.577402][ T2382] device veth0_vlan entered promiscuous mode [ 93.584774][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.593299][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.601231][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.609179][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.616396][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.624576][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.646857][ T2382] device veth1_macvtap entered promiscuous mode [ 93.653737][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.661841][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.670409][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.678083][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.686018][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.709127][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.718126][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.726895][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.734246][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.741476][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 93.749604][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 93.757682][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 93.765936][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 93.774014][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 93.783610][ T2381] device veth0_vlan entered promiscuous mode [ 93.800783][ T2380] device veth0_vlan entered promiscuous mode [ 93.825689][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.833568][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.840843][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.848263][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.856162][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.864710][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.872817][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.879665][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.886936][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.895027][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.901881][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.912813][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.920078][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.938623][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.946513][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.954343][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.962216][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.970049][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 93.978138][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.005727][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 94.015054][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.034816][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.053235][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.062254][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.070533][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.081908][ T2381] device veth1_macvtap entered promiscuous mode [ 94.133924][ T2380] device veth1_macvtap entered promiscuous mode [ 94.140924][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 94.148768][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 94.158598][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.166939][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 94.176721][ T2384] device veth0_vlan entered promiscuous mode [ 94.185359][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 94.193597][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.202202][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.209814][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.239406][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.248003][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.261892][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.270977][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.279349][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.293180][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.311515][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.319707][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.346393][ T2384] device veth1_macvtap entered promiscuous mode [ 94.357480][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 94.370500][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.378991][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 94.422544][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.430855][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.439708][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.447830][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=-1 (errno 104: Connection reset by peer) [ 94.487257][ T2421] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.494274][ T2421] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.616241][ T2427] device bridge_slave_1 left promiscuous mode [ 94.650842][ T2427] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.658383][ T2427] device bridge_slave_0 left promiscuous mode [ 94.665130][ T2427] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.192265][ T1101] device veth0_to_batadv left promiscuous mode [ 95.198374][ T1101] bridge0: port 3(veth0_to_batadv) entered disabled state [ 95.205837][ T1101] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.213221][ T1101] device bridge_slave_0 left promiscuous mode [ 95.219194][ T1101] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.226986][ T1101] device veth0_to_batadv left promiscuous mode [ 95.233176][ T1101] bridge0: port 3(veth0_to_batadv) entered disabled state [ 95.240715][ T1101] device bridge_slave_1 left promiscuous mode [ 95.246625][ T1101] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.253987][ T1101] device bridge_slave_0 left promiscuous mode [ 95.260027][ T1101] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.267795][ T1101] device bridge_slave_1 left promiscuous mode [ 95.274178][ T1101] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.281912][ T1101] device bridge_slave_0 left promiscuous mode [ 95.287858][ T1101] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.296636][ T1101] device veth0_to_batadv left promiscuous mode [ 95.302881][ T1101] bridge0: port 3(veth0_to_batadv) entered disabled state [ 95.310501][ T1101] device bridge_slave_1 left promiscuous mode [ 95.316432][ T1101] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.324159][ T1101] device bridge_slave_0 left promiscuous mode [ 95.330227][ T1101] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.338912][ T1101] device veth1_macvtap left promiscuous mode [ 95.345094][ T1101] device veth1_macvtap left promiscuous mode [ 95.351557][ T1101] device veth1_macvtap left promiscuous mode [ 95.357361][ T1101] device veth0_vlan left promiscuous mode [ 95.363628][ T1101] device veth1_macvtap left promiscuous mode [ 95.369579][ T1101] device veth0_vlan left promiscuous mode [ 97.989601][ T1101] device bridge_slave_1 left promiscuous mode [ 97.995622][ T1101] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.003017][ T1101] device bridge_slave_0 left promiscuous mode [ 98.009103][ T1101] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.016947][ T1101] device bridge_slave_1 left promiscuous mode [ 98.023102][ T1101] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.031791][ T1101] device bridge_slave_0 left promiscuous mode [ 98.037712][ T1101] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.045573][ T1101] device bridge_slave_1 left promiscuous mode [ 98.051582][ T1101] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.058924][ T1101] device bridge_slave_0 left promiscuous mode [ 98.064832][ T1101] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.072923][ T1101] device bridge_slave_1 left promiscuous mode [ 98.079014][ T1101] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.086431][ T1101] device bridge_slave_0 left promiscuous mode [ 98.092501][ T1101] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.101031][ T1101] device veth1_macvtap left promiscuous mode [ 98.106838][ T1101] device veth0_vlan left promiscuous mode [ 98.112583][ T1101] device veth1_macvtap left promiscuous mode [ 98.118377][ T1101] device veth0_vlan left promiscuous mode [ 98.124058][ T1101] device veth1_macvtap left promiscuous mode [ 98.129898][ T1101] device veth0_vlan left promiscuous mode [ 98.135543][ T1101] device veth1_macvtap left promiscuous mode [ 98.141518][ T1101] device veth0_vlan left promiscuous mode [ 98.147163][ T1101] device veth1_macvtap left promiscuous mode [ 98.154613][ T1101] device veth0_vlan left promiscuous mode