last executing test programs: 10.905879996s ago: executing program 2 (id=8366): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1a, 0x0, &(0x7f0000000780), &(0x7f0000000700)='syzkaller\x00', 0x7fffffff, 0x6d, &(0x7f0000000800)=""/109, 0x41000, 0x22, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x2, 0xc0a2, 0x8}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0], 0x0, 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000001bc0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000001b80)='GPL\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) sendmsg$unix(r8, &(0x7f00000006c0)={&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000004c0)="7d0018d675fac106840685e64e4fb254ab2dae0a152ece1c17eb66d827e552432c12a1d284de9e3b6af8cacf888a410eba1b77d4eec6f7fb108f249e4b47ddd315a484d90fc2d589c8bf0ff7801935aa06124ac03b26e73412eb3c4095fb3ba7d859544fe39591b7b9b5b916b5ce3f7f20b938005166a46542aa8b58362ddef25a1df99711e62ee827156341ea75ed5f11033c686e4677f19ffd14ad97f7c4d7b068cf83555a8c7eeead0f7eb8aae33469b9c69d90cc7a0035e3867ba6b7cbaa6fda7b6a43ba7d1ce3918247492a73c71daaa746", 0xd4}, {&(0x7f0000000600)="006e92ee88cf402ebf8134e24d78c4762102fdde3a237c5ce8e43b4a9ab257e6b9445790b059773cce9d78a687b173a6e19192772ca8d4cb16228ff3a690b3fdf3e9cc0abfd9b037913ee1dc608ea96851049eff9b647b8d223c9f6ac82a1535c8e089da5eefa854173c9ab8abdaae3d6db10e7433c0d951ce7406d00a2df619be001d459475d1d7f4bf9b9476db29ce3396fdf4cdcbaa00b41e6937105277781bb299908327486a3a55", 0xaa}], 0x2, 0x0, 0x0, 0x8000}, 0x40080) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) 9.216414305s ago: executing program 0 (id=8481): mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x7fff, 0x4024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46e8, 0x0, 0x0, 0x0, 0x40001}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x14, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_int(r2, &(0x7f0000000080)=0x6, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317ce6203c23c00fe800000"], 0xfe1b) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000280), 0x9) gettid() r5 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'pimreg\x00', 0x210}) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4004af88352bd000000000879104c00000000106315e7000026b2ede441ec74"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="2800000000000e00000000000000009e6f330000", @ANYRES32, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) write$cgroup_subtree(r6, 0x0, 0x0) 9.061204087s ago: executing program 2 (id=8366): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1a, 0x0, &(0x7f0000000780), &(0x7f0000000700)='syzkaller\x00', 0x7fffffff, 0x6d, &(0x7f0000000800)=""/109, 0x41000, 0x22, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x2, 0xc0a2, 0x8}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0], 0x0, 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000001bc0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000001b80)='GPL\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) sendmsg$unix(r8, &(0x7f00000006c0)={&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000004c0)="7d0018d675fac106840685e64e4fb254ab2dae0a152ece1c17eb66d827e552432c12a1d284de9e3b6af8cacf888a410eba1b77d4eec6f7fb108f249e4b47ddd315a484d90fc2d589c8bf0ff7801935aa06124ac03b26e73412eb3c4095fb3ba7d859544fe39591b7b9b5b916b5ce3f7f20b938005166a46542aa8b58362ddef25a1df99711e62ee827156341ea75ed5f11033c686e4677f19ffd14ad97f7c4d7b068cf83555a8c7eeead0f7eb8aae33469b9c69d90cc7a0035e3867ba6b7cbaa6fda7b6a43ba7d1ce3918247492a73c71daaa746", 0xd4}, {&(0x7f0000000600)="006e92ee88cf402ebf8134e24d78c4762102fdde3a237c5ce8e43b4a9ab257e6b9445790b059773cce9d78a687b173a6e19192772ca8d4cb16228ff3a690b3fdf3e9cc0abfd9b037913ee1dc608ea96851049eff9b647b8d223c9f6ac82a1535c8e089da5eefa854173c9ab8abdaae3d6db10e7433c0d951ce7406d00a2df619be001d459475d1d7f4bf9b9476db29ce3396fdf4cdcbaa00b41e6937105277781bb299908327486a3a55", 0xaa}], 0x2, 0x0, 0x0, 0x8000}, 0x40080) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) 7.255668895s ago: executing program 0 (id=8487): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x55a0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x6, 0x0, r0, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000100)="a793864cd74d21e1a109f217157f13242c1030076c43eafaae1f0f88513f48487a855d077b81919287f242946c8469e9e08364e05b399c9b00d61d5d0e2cd7958723644533577df5046b084bfc95ff92f55c5052b07c1cde60c2bfd4846397cf77d2f36cd0acd3b5519c496c31d1d93a57119c4d8f91e637cf1d988acaa581b381397fc0c59ebe0363376a1f6200ab8d6e83f84c608e9a79fad2d840a329f2b6443e33598fb5c393ff8725e6299d5118630f52fc"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000200)="ae9c3d3822c86a7be48aebd024b8ab9af8f7d97e7b8ebacecfad50f51b60ee16b73c592cd9fc92070a5796833399", &(0x7f0000000240)=""/43}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000540)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000380)=""/88, 0x58}], 0x1, &(0x7f0000000440)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0xf0}, 0x120) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r6, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f0000000600)=[0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x73, &(0x7f0000000680)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0xae, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f00000008c0)=r16) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000900)='workqueue_execute_start\x00', r10}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000980)={0x80, 0x0}, 0x8) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x1f, 0x13, &(0x7f0000000a00)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x40000000}}, @ldst={0x3, 0x2, 0x4, 0x3, 0x6, 0x10, 0xfffffffffffffffc}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfe}}], &(0x7f0000000ac0)='GPL\x00', 0x66, 0x6d, &(0x7f0000000b00)=""/109, 0x41100, 0xf, '\x00', r16, 0x0, r7, 0x8, &(0x7f0000000b80)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000bc0)={0x3, 0xd, 0x6, 0x8000}, 0x10, 0xffffffffffffffff, r9, 0x1, &(0x7f0000000c00)=[r8, r6], &(0x7f0000000c40)=[{0x1, 0x3, 0xb, 0x6}], 0x10, 0x7}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r14, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000d40)=r19}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r13, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000e00)=""/164, 0xa4}, {&(0x7f0000000ec0)=""/244, 0xf4}, {&(0x7f0000000fc0)=""/39, 0x27}, {&(0x7f0000001000)}, {&(0x7f0000001040)=""/142, 0x8e}, {&(0x7f0000001100)=""/97, 0x61}], 0x6}, 0x40002001) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001400)={{r11, 0xffffffffffffffff}, &(0x7f0000001380), &(0x7f00000013c0)='%pB \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001500)=@bpf_lsm={0x1d, 0x16, &(0x7f0000001240)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r13}}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7b8}, @call={0x85, 0x0, 0x0, 0x14}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa42d}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}], &(0x7f0000001300)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x22, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000001340)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000001440)=[r20, r21], &(0x7f0000001480)=[{0x0, 0x3, 0x4, 0x3}, {0x4, 0x4, 0x0, 0x8}, {0x3, 0x4, 0xc}, {0x0, 0x3, 0x9, 0xa}, {0x1, 0x4, 0x0, 0xb}, {0x3, 0x4, 0x6, 0x2}, {0x3, 0x2, 0x10}], 0x10, 0x2}, 0x90) write$cgroup_subtree(r11, &(0x7f00000015c0)={[{0x2b, 'pids'}]}, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f0000001600), 0x88680, 0x0) r22 = perf_event_open(&(0x7f0000001680)={0x4, 0x80, 0x5, 0x9, 0xfa, 0xa, 0x0, 0x9a, 0xa4, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffff61a, 0x0, @perf_bp={&(0x7f0000001640), 0x8}, 0x109020, 0x8, 0x1, 0x4, 0x3, 0x0, 0xff, 0x0, 0x9, 0x0, 0x5}, r15, 0x1, r7, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r22, 0x40082406, &(0x7f0000001700)='))\\{:@\x00') r23 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=@bloom_filter={0x1e, 0x18, 0x3, 0xf9, 0x0, r13, 0x9, '\x00', r16, r10, 0x0, 0x0, 0x4, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x9, 0x1, &(0x7f00000017c0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000001800)='syzkaller\x00', 0xffff8000, 0x5a, &(0x7f0000001840)=""/90, 0x41100, 0x4, '\x00', 0x0, 0x37, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f00000018c0)={0x1, 0x9, 0x8, 0xef18}, 0x10, r18, r6, 0x3, 0x0, &(0x7f0000001900)=[{0x3, 0x3, 0x3, 0x1}, {0x5, 0x3, 0x6, 0x4}, {0x2, 0x3, 0x8, 0x9}], 0x10, 0x809}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0xe, 0x7, &(0x7f0000001a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xffffff01}, [@call={0x85, 0x0, 0x0, 0xb}, @generic={0x1, 0x4, 0x5, 0xc6, 0x9}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x1}]}, &(0x7f0000001a40)='syzkaller\x00', 0x0, 0x0, 0xfffffffffffffffe, 0x41000, 0x49, '\x00', 0x0, 0x2, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001a80)={0x4, 0x6, 0x6, 0x1}, 0x10, r17, 0xffffffffffffffff, 0x5, &(0x7f0000001ac0)=[r14, r12, r5, r0, r14], &(0x7f0000001b00)=[{0x1, 0x1, 0x4, 0xb}, {0x4, 0x5, 0xa, 0x3}, {0x0, 0x5, 0xc, 0x6}, {0x5, 0x3, 0x10}, {0x5, 0x5, 0x8, 0x8}], 0x10, 0x4}, 0x90) bpf$ENABLE_STATS(0x20, &(0x7f0000001c40), 0x4) r24 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001e40)={&(0x7f0000001d80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@ptr={0x5}, @var={0x5, 0x0, 0x0, 0xe, 0x3, 0x1}, @const={0x7, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x0, 0x2e]}}, &(0x7f0000001e00)=""/10, 0x44, 0xa, 0x0, 0x8ce}, 0x20) r25 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001ec0)={0x1b, 0x0, 0x0, 0xf8a, 0x0, r13, 0xf9a9, '\x00', r16, 0xffffffffffffffff, 0x2, 0x1}, 0x48) r26 = bpf$MAP_CREATE(0x0, &(0x7f0000001f40)=@base={0x16, 0x4, 0x7, 0x0, 0x2, r4, 0x2, '\x00', r16, r4, 0x5, 0x5, 0x5}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002000)=@bpf_ext={0x1c, 0x2, &(0x7f0000001c80)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x455a}], &(0x7f0000001cc0)='GPL\x00', 0x2, 0x48, &(0x7f0000001d00)=""/72, 0x40f00, 0x0, '\x00', r16, 0x0, r24, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001e80)={0x3, 0x9, 0x2, 0x400}, 0x10, 0x74d4, 0xffffffffffffffff, 0x0, &(0x7f0000001fc0)=[r3, r25, r26, r23], 0x0, 0x10, 0x5}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{}, &(0x7f0000002140), &(0x7f00000021c0)}, 0x20) 7.254968665s ago: executing program 1 (id=8488): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x6, 0x14, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x0, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0xa9c, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000010040)=0xffffffffffffffff, 0x4) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000010040)=0xffffffffffffffff, 0x4) 6.940503681s ago: executing program 4 (id=8491): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000340)={[{0x2d, 'net_prio'}, {0x2b, 'net'}, {0x2d, 'blkio'}, {0x2d, 'rlimit'}, {0x2b, 'net'}, {0x2d, 'net_cls'}, {0x2b, 'hugetlb'}, {0x2b, 'memory'}, {0x2d, 'cpu'}]}, 0x42) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xb, &(0x7f0000000300)=ANY=[@ANYRES8=r3, @ANYRES16=r0, @ANYRES64, @ANYRES8=r2, @ANYRESHEX=r2, @ANYRES16=r4, @ANYRESHEX=r3, @ANYRES32=r0], 0x0, 0x8, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b0f, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 6.747712747s ago: executing program 4 (id=8493): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0xfff, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0x2a, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000080000000000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) close(r2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000008000db8592003623de66000000000000000018110000", @ANYRES32], 0x0}, 0x90) close(0xffffffffffffffff) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x6, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000180), &(0x7f00000003c0)=r4}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r7, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x1b, &(0x7f00000006c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0x14, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={r2, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000bc0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000c00)=[0x0], &(0x7f0000000c40)=[0x0], 0x0, 0x38, &(0x7f0000000c80)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000d00), &(0x7f0000000d40), 0x8, 0x17, 0x8, 0x8, &(0x7f0000000d80)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x5, &(0x7f0000000b00)=ANY=[@ANYBLOB="6e42af988820029d104fe4f3e559baaeca619e3226b91397c07826273b3f3eee6ec26d1fbbc65cb795429737db4aeda57a058ea3158b785dffe9f3684af46af90383ad28fa7befca16a02e2da62ec3b2bb213336704d55a0d7d6949d1816d6787353cf8225fa6008b17f34fb119d616cebe4b4cfe3979e19af6d3a09b4c7b64e419d60078bacaec6a5", @ANYRES32=r10], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', r11, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9, 0x0, 0x29}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r12}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000580), &(0x7f00000005c0)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000f00)=ANY=[@ANYRES32, @ANYRESHEX=r9, @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r13, 0x8914, &(0x7f0000000080)) 6.558703553s ago: executing program 3 (id=8495): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x2bd2, 0x3ac, 0x3, 0x198, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x3, 0x1}, 0x48) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000280)={0x1, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@ifindex, 0x10, 0x1, 0x3, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={@map=r2, r3, 0x14, 0x1, r4, @link_id=r5, r6}, 0x20) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0x16, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='hrtimer_init\x00', r11}, 0x10) (async) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r12}, &(0x7f0000000080), &(0x7f0000000340)=r11}, 0x20) (async) write$cgroup_subtree(r7, &(0x7f0000000580)=ANY=[@ANYRESHEX=r12], 0xfdef) 6.475283519s ago: executing program 3 (id=8496): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='percpu_alloc_percpu\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000eaffffffffffffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f00000002c0)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) close(r1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r1}, &(0x7f0000000200), &(0x7f0000000340)=r5}, 0x20) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x7, &(0x7f0000000180)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}, @map_val={0x18, 0x6, 0x2, 0x0, r6}], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) 6.472093909s ago: executing program 2 (id=8366): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1a, 0x0, &(0x7f0000000780), &(0x7f0000000700)='syzkaller\x00', 0x7fffffff, 0x6d, &(0x7f0000000800)=""/109, 0x41000, 0x22, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x2, 0xc0a2, 0x8}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0], 0x0, 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000001bc0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000001b80)='GPL\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) sendmsg$unix(r8, &(0x7f00000006c0)={&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000004c0)="7d0018d675fac106840685e64e4fb254ab2dae0a152ece1c17eb66d827e552432c12a1d284de9e3b6af8cacf888a410eba1b77d4eec6f7fb108f249e4b47ddd315a484d90fc2d589c8bf0ff7801935aa06124ac03b26e73412eb3c4095fb3ba7d859544fe39591b7b9b5b916b5ce3f7f20b938005166a46542aa8b58362ddef25a1df99711e62ee827156341ea75ed5f11033c686e4677f19ffd14ad97f7c4d7b068cf83555a8c7eeead0f7eb8aae33469b9c69d90cc7a0035e3867ba6b7cbaa6fda7b6a43ba7d1ce3918247492a73c71daaa746", 0xd4}, {&(0x7f0000000600)="006e92ee88cf402ebf8134e24d78c4762102fdde3a237c5ce8e43b4a9ab257e6b9445790b059773cce9d78a687b173a6e19192772ca8d4cb16228ff3a690b3fdf3e9cc0abfd9b037913ee1dc608ea96851049eff9b647b8d223c9f6ac82a1535c8e089da5eefa854173c9ab8abdaae3d6db10e7433c0d951ce7406d00a2df619be001d459475d1d7f4bf9b9476db29ce3396fdf4cdcbaa00b41e6937105277781bb299908327486a3a55", 0xaa}], 0x2, 0x0, 0x0, 0x8000}, 0x40080) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) 4.573840005s ago: executing program 0 (id=8497): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002000)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cf84ded40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c86e00f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec231fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c89622bed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895012f1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c3405000000000000003871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d37261774cc5a3bf6b466cb72812da518ff602111b40e761fd21081920382f14d12ca3c3431ee97471c782f321177aa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d50a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a31b16ac5fb73fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953f88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a5fe1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9d66ebbc8bab4ea81232fbef665f6212f875b2a00000000000000aceb111b66a500ca52fd8f848088c67ee65dfdcc4c580e9bc18c1699dca07d019bf1bf9dd3da480d6c155d7e60674ce88ab5ae07a9d16e22792d99986b531ab4e592ab5925da779e700cf20309a2137877690dc5c07956fc82d7b3bb46d3138041af18508938c9be4e5d0a98073463a5cff6c146d020743da474cb81677a6f389f0e00c33b70b7f8bab95435c27167f365a29fb09cbf35bf192f6a65616fa2ad9a6c7ca3a3ecd96aaecd993e8badb40e7eb8a22b0015e70c885cd519e28448168c6d914265998bff74ea1b0e651a6cae9419096248a0e41573827ad60fafce6e6540734c1f23f75337d836c31497e8112969a039d65aa297e2b046b5f4d11116a89f9f65693d4dc3e70fbfe0b2044fdb3f87e887d1daae8e38a0c19f668f776e19a02bb2449ee4384f6536879c85d7e41bc0276ee2b125d41ff358323311703ec01d64a573bdeb75bdcc87d01de38365ab9222713d2d1640a742d62fefb5403b2ed9969c32a0841e8c36b0107bb888eb14ac62e6d4bdfaeb9ee7436b97bf3825a19d6c8997ce285edf1d277ed703f560460417bfe702af833e83c5b987befb6d1fcf765ab7ea537d9dafb622a1ba8686cb9b1c63b84470364942e90d1cf856cead864f5e38c83b9ed86cc5725a20299ce512b165a4dd094d190229675e4ea095a106586152c58a6bf5b719ffd6700a674d091fb611ef8d81729be91a7ced8ce96c71652ecaea0457dddf755556b454371284052836190f077c34054b663c30734b872b4acb52bf429d3e7d46593bc541478ffc262521310d3a2fbf468e514de0b0fb1f18f6e19afc344d"], &(0x7f0000000380)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000001480)=ANY=[@ANYBLOB="3c266770e2aa69ae364e066a10b2219eaa50af0c9f2156", @ANYBLOB="77c7c34514816f01a36e63f22e03c1d016b69187ae767baf0119ac7631282e0c9175b328d33b4d115fbbf1ad4f9d562ece8a9bf008a41e14e8a30f83e19ab923378d1c868063152a142e04ed3f1447b96ccb41563433ebd6f6a28c979308816320fcba0900afaae4e85401f9be6fc1d23fcef4dc21e2cc496d5fc00342551b1e89a08cc8e8ba7c5a6cfe97357f81a1e76ea419338f"], &(0x7f0000001540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0xffffffffffffff32}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b7030000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffb, 0x2}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_clone(0x40000000, &(0x7f0000000340)="453e542a564f5e4cb39898e819e9a50f74b167a47aecfd31bef5375c0a1f1e98693e0c3b85", 0x25, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000480)="c7d7b77cb10806feb66116a54416032f3e8e1c2e7d6faf2eba5017d34c9be4de44bea23c1ef9af33ea3554ecb64a033230f4393094cfbb784cee59cc425f3601c4ce1b4d2febdad55deb607d059ea63cf92e79329117b7f78accf087f96a6fd5c595f42ffc6fd5aa6a3a526a909d11c63daa074a2efbcbf4") perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x3}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x140, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a"], 0xfdef) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000810300007b8af8ff00000000bfa21000000000002fdfa207060000f8ffffffb703000008000000b700000000000001ff0000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) close(r6) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) 4.573139035s ago: executing program 1 (id=8498): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, 0x0) close(r0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x0, 0x59, &(0x7f0000000480)=""/89, 0x41100, 0x1, '\x00', 0x0, 0x29, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000900)={0x0, 0x0, 0xffffffff, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x8}, 0x90) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f0000000140)={'bond0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000001a00000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r6, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfa, &(0x7f0000000800)=[{}], 0x8, 0x10, &(0x7f0000000840), &(0x7f00000003c0), 0x8, 0x28, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r6, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x9e, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x3c, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)=r4}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x2, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x5, 0x19, &(0x7f00000000c0)=""/25, 0x40f00, 0x24, '\x00', 0x0, 0x25, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x2, 0x9, 0x4f7, 0x5}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000240)=[r3, r3, r7, r3, r10], &(0x7f0000000280)=[{0x2, 0x4, 0xf}, {0x1, 0x1, 0x5, 0x2}, {0x4, 0x3, 0x3, 0x8}, {0x3, 0x4, 0x0, 0x2}, {0x2, 0x1, 0x7, 0xa}, {0x5, 0x5, 0xf, 0x6}, {0x5, 0x1, 0xa, 0x7}], 0x10, 0xe555}, 0x90) 4.572389235s ago: executing program 3 (id=8499): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x4000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000740)='ns/uts\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x10, 0x8000, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xb, 0xf, &(0x7f0000000980)=ANY=[], 0x0, 0x4, 0x5b, &(0x7f0000000500)=""/91, 0x0, 0x1, '\x00', 0x0, 0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x3, 0x3, 0xe, 0x7}], 0x10, 0x7fff}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0xd}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 4.571631725s ago: executing program 4 (id=8500): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x25, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESHEX=r0, @ANYRESDEC=r2], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0xfffffe0c, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mm_page_alloc\x00', r3}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200f1ff8500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r10}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r13, &(0x7f0000000000)=ANY=[], 0xfdef) 4.322290915s ago: executing program 4 (id=8501): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0xffffffffffffffaf) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r0, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x18, 0x0, &(0x7f00000003c0)='GPL\x00', 0x4, 0x52, &(0x7f00000004c0)=""/82, 0x0, 0x41, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000a40)=[{0x0, 0x4, 0x13, 0x3}, {0x4, 0x3, 0x6}, {0x5, 0x1, 0x9, 0x8}], 0x10, 0x8}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000004, 0x0, 0x2}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f0000000280)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) write$cgroup_int(r5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000200)='btrfs_cow_block\x00', r4}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0/file0\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_type(r7, &(0x7f0000000140), 0x2, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x9) r9 = openat$cgroup_procs(r7, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000040), 0x12) write$cgroup_type(r6, 0x0, 0x300) 4.283594669s ago: executing program 1 (id=8502): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f00000004c0)='spmi_write_end\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) getpid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='-rliyit +io \x00perf_event '], 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xb, &(0x7f00000021c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x37, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000001980)='page_pool_update_nid\x00'}, 0x10) r2 = syz_clone(0x4000, &(0x7f0000001d40)="b3a1222a134bb1ffcce19d9577df052a130e6b497a3d2fddffce3bd0b710edad2b953500b9910356b0fd91b572431d03abe243ea91abe672fff14e3378267cab36b88ba2cd1bc9486b143defb4720fb09e93cc101d50d5d0b54c388096d4ebec071c5296915b99fa7ecebdea43df84486daa32a6e9f70984c266b44eaa28f0e8e2d26093b2a72b3acec0a9bccbed70d3fb1070ea69d561b431590e6478076604844d226252fd0a4644cb37fa01b32253078cddcb08ef32eac4873267cbee51411d5e66307c23d844dc9988208bba2b0245", 0xd1, &(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)="a09738c3f27d0d192b1ec71c56832d655f6b85aecf679c2632d6d294c8102e11c934") perf_event_open(&(0x7f0000001bc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x142f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5082, 0x0, 0xfffffffc, 0x0, 0x200000}, r2, 0xf, 0xffffffffffffffff, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0), 0x0, 0xd2, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000400), &(0x7f0000000680), 0x8, 0xb2, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000008c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', r3, 0xffffffffffffffff, 0x1, 0x2}, 0x48) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000022c0)={0x0, 0x1a, &(0x7f0000002380)=ANY=[@ANYBLOB="1800000033000000000000000800000011510900e9ffffffb7080000000000007b8af8ff00000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085001300a50000e8b8253e2ec3eff100181100005c18e0e86a8483c68ef942aa4c09760744aa407f78", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x13f, 0x27, &(0x7f00000001c0)=""/39, 0x100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000019c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000001a00)={0x1, 0x9, 0x400, 0x10}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001a40)=[r1, r4, r4], &(0x7f0000001b80)=[{0x0, 0x0, 0x6, 0xb}, {0x1, 0x5, 0x4, 0x6}, {0x0, 0x1, 0xe, 0x5}, {0x1, 0x2, 0x9, 0xb}], 0x10, 0x7b12cf80}, 0x90) socketpair(0x20, 0x2, 0x1ff, &(0x7f0000000340)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000002080)="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", 0x114}, {0x0}, {&(0x7f0000001f80)="c3b9cf0b49e1fe253c47705a1908226e03b40bed2e85e96bbae8697b82d0036942bfec8e41b0444caf61adaa7ebdd9b1db1f843acb62ffea8a6d2b232847378d1b6bff280624dbdbccb37a6ce2bc2839beb4f27d9d4d515a5b83fe930ce8625cb702880f0c9dc3f88e1658538b9f34515dcbf4054795741658bbca5ae68efd7e818b1ecfff44c416aae3bc000000000000000000002610e4abe06cdacebd7ac53a6204d6ca0c877800e71dd064c688169d357f6513ccea9e18b3fc082d00000000", 0xc1}, {0x0}], 0x5}, 0x8c1) bpf$MAP_CREATE(0x1d, &(0x7f0000000700)=@base={0x0, 0x0, 0x6, 0x0, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000540)={&(0x7f0000001a80)="859297c12d29be1caa605db574e0b35ca35bcc99bdd1b303e7e8234c1938e3aeb14b2bfb01f735bff7754888a0a23c77d3501aacd8a7d62626da1f4ebbccd12802df1d1b9b219b9df1f479383ef5184567ad730425ab5de0bc44a7fb8e4e1411c65142677f387e075ddbf1764e537c1f784db6c3be512f053cce1005d63a799225c165bf99fb584b2acc56b743b7d13ce10fef27aafb1dca27f34a5ce1d211da2226fbda98b81b8c404b730a11398a462848c741ec196878ae8c48e21ea542407efd3f2b", &(0x7f0000000500)=""/5, &(0x7f0000001c40)="ff6f97a744075a023820b0ab1a0ac369d6a127f2ebe1517f1766280862eb2c0495bb325f59b09b75ecde4e2cfa91bee6defb6efcb7b8e35174d63769db8d2402317f02d5b717a54df8cdb8a7b14ee855fef6efeb99850e0c80f8d336064ea977cb9bbb1a676f97be9d6300f0420a102db7796662682c3bc7614eaa0080", &(0x7f0000001e40)="2c9cf1fff079d0a1f8e7268f350c7d19489911debea809304fb6c4fdff35ac18ac4f32ef83333a18cbf26958bc87bfa41eec14c1027f28f01784ceaac24e830ab7897371baa3d706ff0ef5284715618a6cff0704adaf6e60594ae0e67c3461aacbe4412806b8bbbe329e2101b4f7000a04223611d1e16255e807d25a717ad01bccc212ee7df1013292cd70fb46d57ad302adce1c2524c1fbbd858211c5ac626b0ad31a2ffad0c072229849d3deead937de66ce315febd3f5f9494afb4b8188d56956130bff0657b94e91bcd2ccc346d3a2711bee9ff8a422b55902235facb5458ef2da01a482", 0x4, r4}, 0x38) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r6, 0xffffffffffffffff}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbf961362c2362775359c1e1ba400000000000007040000f0ffffffb7", @ANYRES32=r7, @ANYBLOB="0000000000000000b70400000800000085000000490000009500000000000000"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r8, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="7638300c000000002f00e9000000", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'syz_tun\x00', 0x800}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x3, 0x408, 0x781, r7, 0xd24, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5, 0x1}, 0x48) 4.277468859s ago: executing program 2 (id=8366): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1a, 0x0, &(0x7f0000000780), &(0x7f0000000700)='syzkaller\x00', 0x7fffffff, 0x6d, &(0x7f0000000800)=""/109, 0x41000, 0x22, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x2, 0xc0a2, 0x8}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0], 0x0, 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000001bc0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000001b80)='GPL\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) sendmsg$unix(r8, &(0x7f00000006c0)={&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000004c0)="7d0018d675fac106840685e64e4fb254ab2dae0a152ece1c17eb66d827e552432c12a1d284de9e3b6af8cacf888a410eba1b77d4eec6f7fb108f249e4b47ddd315a484d90fc2d589c8bf0ff7801935aa06124ac03b26e73412eb3c4095fb3ba7d859544fe39591b7b9b5b916b5ce3f7f20b938005166a46542aa8b58362ddef25a1df99711e62ee827156341ea75ed5f11033c686e4677f19ffd14ad97f7c4d7b068cf83555a8c7eeead0f7eb8aae33469b9c69d90cc7a0035e3867ba6b7cbaa6fda7b6a43ba7d1ce3918247492a73c71daaa746", 0xd4}, {&(0x7f0000000600)="006e92ee88cf402ebf8134e24d78c4762102fdde3a237c5ce8e43b4a9ab257e6b9445790b059773cce9d78a687b173a6e19192772ca8d4cb16228ff3a690b3fdf3e9cc0abfd9b037913ee1dc608ea96851049eff9b647b8d223c9f6ac82a1535c8e089da5eefa854173c9ab8abdaae3d6db10e7433c0d951ce7406d00a2df619be001d459475d1d7f4bf9b9476db29ce3396fdf4cdcbaa00b41e6937105277781bb299908327486a3a55", 0xaa}], 0x2, 0x0, 0x0, 0x8000}, 0x40080) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) 2.297947742s ago: executing program 0 (id=8503): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x80, 0x0, 0x0, 0xb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x1, 0x5}, 0x0, 0x2, 0x0, 0x7, 0x0, 0xd, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_freezer_state(r0, &(0x7f00000001c0), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES64=r1, @ANYBLOB="1800000001070000000000000000260018110000"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x36, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000640)='qgroup_meta_reserve\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000000), 0x400000) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x20000341, &(0x7f0000000500)=ANY=[@ANYRES8=r0], &(0x7f0000000280)='syzkaller\x00', 0x401, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r3, &(0x7f0000000340)="c263b0259ad2d8382d1e9ce289241edeee597dafec8d9635bb8c2b33635e620662c83b8d96f30e6c8c5e02f562b09468fafbbbaafebb42a5b7ab34bc9854a43ebc3d6b4a695aeea3b581472e", &(0x7f00000003c0)=""/91}, 0x20) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000069117e0000000000c6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x200, 0x9, 0x1, 0x10, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) 2.294719482s ago: executing program 1 (id=8504): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0], 0x0, 0x40, &(0x7f0000000500)=[{}], 0x8, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xf3, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x0, 0xfffffffd, 0x491b, 0xe08, r3, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x1, 0x7}, 0x48) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000008c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10}, [@ldst={0x0, 0x0, 0x6, 0x7, 0x6, 0xffffffffffffffff, 0x8}, @exit]}, &(0x7f0000000280)='GPL\x00', 0x6d, 0x73, &(0x7f0000000340)=""/115, 0x41000, 0x58, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0xc, 0x3, 0x100}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000940)=[r3, r4, r5], &(0x7f0000000980)=[{0x4, 0x4, 0xd, 0x5}], 0x10, 0xa595}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000c40)=r2, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d80)={0x6, 0x9, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1d2fd310, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x2, 0x0, 0x1, 0x4, 0x6, 0x1, 0xffffffffffffffff}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xf2e9}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x84}]}, &(0x7f0000000bc0)='GPL\x00', 0x98, 0x10, &(0x7f0000000c00)=""/16, 0x0, 0x49, '\x00', r1, 0x25, r7, 0x8, &(0x7f0000000c80)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x5, 0x9, 0x5, 0x5689}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000d00)=[r6], &(0x7f0000000d40)=[{0x4, 0x5, 0x10, 0x3}], 0x10, 0x2}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.292029852s ago: executing program 3 (id=8505): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0xf, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0xf, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x61) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x4, &(0x7f0000000540)=ANY=[@ANYRESDEC=r2], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xfffffffe}, 0x10, 0x0, r3}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x4, &(0x7f0000000540)=ANY=[@ANYRESDEC=r2], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000440)={0x0, 0xfffffffe}, 0x10, 0x0, r3}, 0x90) r5 = perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x80, 0xff, 0x7f, 0x10, 0x2, 0x0, 0x8, 0x4000, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33d, 0x4, @perf_config_ext={0x800, 0x2}, 0x880, 0xcf, 0x8, 0x9, 0x69, 0x1, 0x9, 0x0, 0x6a, 0x0, 0x5}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001c40)={@ifindex, 0xffffffffffffffff, 0x7, 0x0, 0x0, @prog_id}, 0x20) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000000c0), 0x43) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000000c0), 0x43) recvmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) (async) close(0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7d}, @call={0x85, 0x0, 0x0, 0x50}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7d}, @call={0x85, 0x0, 0x0, 0x50}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000100)=0x94d) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073013700000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r4, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x80ff, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001780)={&(0x7f00000015c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, &(0x7f0000001680)=""/249, 0x29, 0xf9, 0x1}, 0x20) 2.288327982s ago: executing program 4 (id=8506): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000044700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000044700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES16=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x10) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) (async) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) (async) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext, 0x8000}, 0xffffffffffffffff, 0xe, r6, 0x0) (async) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext, 0x8000}, 0xffffffffffffffff, 0xe, r6, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x124, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff310000003c0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13", 0x0, 0x31, 0x6000000000000000}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 2.230484967s ago: executing program 2 (id=8366): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1a, 0x0, &(0x7f0000000780), &(0x7f0000000700)='syzkaller\x00', 0x7fffffff, 0x6d, &(0x7f0000000800)=""/109, 0x41000, 0x22, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x2, 0xc0a2, 0x8}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0], 0x0, 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000001bc0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000001b80)='GPL\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) sendmsg$unix(r8, &(0x7f00000006c0)={&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000004c0)="7d0018d675fac106840685e64e4fb254ab2dae0a152ece1c17eb66d827e552432c12a1d284de9e3b6af8cacf888a410eba1b77d4eec6f7fb108f249e4b47ddd315a484d90fc2d589c8bf0ff7801935aa06124ac03b26e73412eb3c4095fb3ba7d859544fe39591b7b9b5b916b5ce3f7f20b938005166a46542aa8b58362ddef25a1df99711e62ee827156341ea75ed5f11033c686e4677f19ffd14ad97f7c4d7b068cf83555a8c7eeead0f7eb8aae33469b9c69d90cc7a0035e3867ba6b7cbaa6fda7b6a43ba7d1ce3918247492a73c71daaa746", 0xd4}, {&(0x7f0000000600)="006e92ee88cf402ebf8134e24d78c4762102fdde3a237c5ce8e43b4a9ab257e6b9445790b059773cce9d78a687b173a6e19192772ca8d4cb16228ff3a690b3fdf3e9cc0abfd9b037913ee1dc608ea96851049eff9b647b8d223c9f6ac82a1535c8e089da5eefa854173c9ab8abdaae3d6db10e7433c0d951ce7406d00a2df619be001d459475d1d7f4bf9b9476db29ce3396fdf4cdcbaa00b41e6937105277781bb299908327486a3a55", 0xaa}], 0x2, 0x0, 0x0, 0x8000}, 0x40080) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) 118.034861ms ago: executing program 0 (id=8507): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000110880febb0007aafe8000000000000027bfa7b09303960e2f"], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, 0x0, 0x0}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) 117.519231ms ago: executing program 1 (id=8508): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES16, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller1\x00', 0x7101}) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000580)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller0\x00', @random="371692e7f7ef"}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[0xffffffffffffffff, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000008c0)}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r4, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) 114.848151ms ago: executing program 3 (id=8509): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000006c0)={@map=r0, r1, 0x15, 0x2, 0xffffffffffffffff, @prog_id}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYBLOB="9b4a42325135260516600397"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x2, 0x4, 0x7fe6, 0x3}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r3, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x4, 0x62, 0x35, 0x8, 0x0, 0x3, 0x81000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7f, 0xfffffffffffffff9}, 0x0, 0x9, 0x4, 0x1, 0x56, 0x5, 0x1, 0x0, 0x6, 0x0, 0x5}, r6, 0x3, 0xffffffffffffffff, 0xc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) getpid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000001540), 0x0, &(0x7f00000015c0)}, 0x1) 113.094321ms ago: executing program 4 (id=8510): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x200000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x2, 0x4, 0x10008, 0x1}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x2, 0xffffffff}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0x1, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x1, '\x00', r7, r5, 0x3, 0x2, 0x1}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18030000fffffffb000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70200000d000000b7020000000080008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000003c0)='mm_page_alloc\x00', r11}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1, r4}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r12, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) 95.759082ms ago: executing program 0 (id=8511): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_tracing={0x1a, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000009091000000000000b906000018350000020000000000000000000000cd3720000800000018220000", @ANYRES32, @ANYBLOB="000000000900000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7030000850000000c00001ad000b700000000186b000001007b613c820000c00000009500"], &(0x7f0000000800)='syzkaller\x00', 0x100, 0xce, &(0x7f0000000f00)=""/206, 0x40f00, 0x1, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b00)={0x0, 0x0, 0x453, 0x3}, 0x10, 0x336e, 0xffffffffffffffff, 0x7, 0x0, &(0x7f0000001080)=[{0x3, 0x4, 0x0, 0x6}, {0x3, 0x3, 0x4, 0x9}, {0x4, 0x5, 0xb, 0x1}, {0x3, 0x2, 0x2}, {0x4, 0x5, 0xd, 0x3}, {0x1, 0x2, 0xf}, {0x5, 0x2, 0x8, 0x2}], 0x10, 0x2ecf}, 0x90) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000a3018110000", @ANYRES32=r0, @ANYRESOCT=r0], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xd, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x49, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x107, 0x0, &(0x7f00000004c0)="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", 0x0, 0x15, 0x6000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x1000}, 0x50) (rerun: 64) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000001240)=ANY=[@ANYBLOB="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", @ANYRES32], 0x0, 0x0, 0xfffffe39}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) socketpair(0x9, 0x0, 0xda, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4c5cc0df7a32fc15aa9dd556c8ffd000000000000007912900000000000630000980000000095000000000000001ada37f1bfdc12b7b04f86298e854d1e0e8bf95be7f1fd51fb559455936ca4ec2d1d523fefbf4c1d891c06db8bcffcfab1ffd538b64167b8a85ff78bc8693bf2700e4ca624aea45160cf7866b06fbdb8adbe0af0a4a8c15cbdd34127d40d2a77ceadeb2cd6beab4776a523ba48e4f3962928260bda970f079b2bcc3f9d7b66bf1a66ec0218c95ecad2a49f0ce612"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='rss_stat\x00'}, 0x29) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d40)=[{0x0}, {&(0x7f0000000880)=""/129, 0x81}, {&(0x7f0000000940)=""/141, 0x8d}, {0x0}, {&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000bc0)=""/201, 0xc9}, {&(0x7f0000000cc0)=""/118, 0x76}], 0x7, &(0x7f0000000dc0)}, 0x0) (async, rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x0, 0xfff, 0x7}, 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="dcdad6a5e2add5d4e0", @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001ac0)={0x0}, 0x10) close(r4) unlink(0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (async, rerun: 32) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="70d370117ddb"}) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x10001, 0x0, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) 54.964016ms ago: executing program 1 (id=8512): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="72d42d1c736e79ade4194a9a3ce57bb295f04eedd248f75f7c00844a02487284f955068363607b29eb4ef5811f4667d2d08820eea5617726a4c66a8661ed5b22dd62244ced0e1b0368b8b2a17849be0cb090e524130c5e478f0308209585717b7748044edad540c01c0c3ce7a13c94989fa8bae8d4a02c5ccb9e873650894bf84a3c4795668404905bdc8d1e2905e4a1aa17db8aca393dcf5410d40e866fdccfc9df7ba1509b8da7fef6746572deb00fbf920ae6705a0da14d0e8e24f2ee050edf2daf8a7180844467407b397ec572c5fd7be18ab6e20a81a80ce338acfc38e6e19d90bab24442b73c74", 0xea}], 0x2, &(0x7f0000001200)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x82f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_retopts={{0x94, 0x0, 0x7, {[@noop, @timestamp_prespec={0x44, 0x24, 0x9d, 0x3, 0x1, [{@multicast2, 0x6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@rand_addr=0x64010102, 0x6}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}]}, @timestamp_prespec={0x44, 0xc, 0xf7, 0x3, 0x8, [{@rand_addr=0x64010102, 0xd26f}]}, @generic={0x82, 0x10, "4df091427effe5aef1c83c79e8d8"}, @timestamp_prespec={0x44, 0x1c, 0x41, 0x3, 0x3, [{@empty, 0x8}, {@broadcast, 0x1247}, {@broadcast, 0x9}]}, @timestamp={0x44, 0x18, 0xd6, 0x0, 0xf, [0xfffffffb, 0x7, 0x3, 0xe03, 0x4]}, @timestamp={0x44, 0xc, 0x74, 0x0, 0xa, [0x800, 0x80]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xff}}], 0xe0}, 0x40) (async, rerun: 64) unlink(&(0x7f0000001340)='./file0\x00') (async, rerun: 64) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x1) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001380)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_type(r1, &(0x7f00000013c0), 0x9) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001400)={r1}, 0x8) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001440)='./cgroup/syz1\x00', 0x200002, 0x0) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001480)={0x3, 0x0}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001800)={r4, 0x0, 0xf6, 0x8b, &(0x7f00000014c0)="370879e7f6877f2f790063217f3f782939a2d083e3a9111dd24dd3d210bbadd3f38feb80c9c8ae9e2c13160dfd6db336a8ae9ad3d1a1cf56d1956c71b9a3fb8f19376bad93fec753f03cfc988bcd28f9b27b9e3fb50ec1df3713a4e961d4a4e8909b4e31a79ff6cb6671fb3a761e8aa47843b0b8f8111be00a25c02ad03dd02620582f14541b06b6c9ad3d074e2b057f22629f8e8cc3612df778b9152cb3158b129ab5802913a2af815c1953a4e4df2f30a372d7d79de247cb5b48556ba3b9deaf54ac0338ba0f1974710090200a5635f858b1c496fa9aec8acd1a30328fb0b244ef1b20198c956ebd70adfcd63709ebce7bbce19269", &(0x7f00000015c0)=""/139, 0x9, 0x0, 0xab, 0xb6, &(0x7f0000001680)="4949bde2e8161d43cd878c19f0a3bb35835a72ad698ab1220c465a2c3bb10f1b3f613d96ee54d50fc204b41f7eeff1a130ffdd64ba0254d2d31d5170501dcb58cdcce47fba7def1da4f438c62e27f0879f4014e77c7bceac775e1406eb66cd71ff7452ab4a519973d64233004dec3fb4d8f9a1f2e7907012d024edf8bdf7edb06ec96dde97b8cbe06f55099a6c95bd9fcfba6d2f5e5e99179ece4acc2beb2d132adc08749bf8d15c8f8b71", &(0x7f0000001740)="843dbff1167951285cc5511997e18a5257c7addf91408163428ba5243836a133ab9f5cdafbd380549dca1eb34ce11f0845a1c0611865a984a296d939c04c26d31fc0ca54ee894dd57bd42df0a070cf0cb6eb6a8622add839355950405b762d7bc80c4e9ed4d1c6fe392045aed7dd709e3da441b3bc2167e2940d45158730a161edb4937b5a1fac600a5c7f862ff0de3a19c84d294e5b4e88e1f19256a0a4b11c39648a3e3576589509fb703f1f69bc662f696f95c794", 0x2, 0x0, 0x1}, 0x50) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001880)={r6, 0x6, 0x8}, 0xc) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000018c0), 0x101c00, 0x0) r7 = openat$cgroup_freezer_state(r0, &(0x7f0000001900), 0x2, 0x0) write$cgroup_freezer_state(r7, &(0x7f0000001940)='THAWED\x00', 0x7) (async) mkdir(&(0x7f0000001980)='./file0\x00', 0x1a0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001ac0)={@map, 0x26, 0x0, 0x800, &(0x7f00000019c0)=[0x0], 0x1, 0x0, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001a40)=[0x0], &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async) r9 = openat$cgroup_subtree(r5, &(0x7f0000001b00), 0x2, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001b40)={r6, 0x800, 0x18}, 0xc) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000001b80), 0x8000, 0x0) write$cgroup_subtree(r9, &(0x7f0000001bc0)={[{0x2b, 'hugetlb'}, {0x2d, 'net_cls'}, {0x2b, 'net_cls'}, {0x2b, 'devices'}]}, 0x24) (async, rerun: 32) openat$tun(0xffffffffffffff9c, &(0x7f0000001c00), 0x1b1000, 0x0) (async, rerun: 32) r10 = gettid() (async, rerun: 64) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001cc0)={{r4}, &(0x7f0000001c40), &(0x7f0000001c80)='%ps \x00'}, 0x20) (rerun: 64) write$cgroup_pid(r1, &(0x7f0000001d00)=r10, 0x12) sendmsg$tipc(r4, &(0x7f00000034c0)={0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000001d40)="614935b051fb13f5c32f87d994506640a48b351bee47e1b878f1ad02c9042acb0f59799db5ca6b7bedc0f51973b403d1ed848765eb6df858bf10ce9e1b615b9420e155602361a1aa1d390a3d8e5495c038c1c07263fc8ce81ea7ad8c5b752ec6566db9b9959483aebf", 0x69}, {&(0x7f0000001dc0)="f7c75c085581a568382f3aa2e6f28648007c2b4f0c5ad93888058fedfc48d7365709b750803d56dbb18889e9fec4ca0b01a61b5cc23655c60a3ffda8f9c78d459198205ccc8e6b311c33f51078ecfa8dc50e16228119e71dc7951e855ad9c9af491cdc668003aa13b3d65d9dff58c53a2bf2d3c45a52266cc2fbace7a1eae4b6e98e30d6786f540534d679ce4416f0fef75e49b18ae017bac31ff5324bf2ab8e5c847b0231f6602a2c83ca0a93505eace23345495e085452ba5b8cc8b559c5ee7ef33acc8e5fea8d413ce9390d8dee5bbffb", 0xd2}, {&(0x7f0000001ec0)="2ab9f0b323be2151c53a536b44afbd4d5564a4fbba11ca469000e9a45ba775ab0116947dd9427c483431fdde2ee3955763b27154ec944be6e03862", 0x3b}, {&(0x7f0000001f00)="02f802a132f13ae6b004ee5048d4db30dd460ee4233a63d8fccc4fa919a13c390374fbcff7d80e348fd6d49c027ad6e60fc4536f24f89f67cf7d79678cf4ba5c6280d1840fc79ae1", 0x48}, {&(0x7f0000001f80)="42d85c3a1e9d7b6504238d0145843e87ec32a53984b413d7119bc46314d541373bab8b33c680cc4ae0913d7b5402a4dac6916cbf38106871562fa903f4ef9b5613f2c67b0c91d2a86d8c939aa2f28c5cff24290f495d4462152943b4fbf32d6c8f9dec2b3277c36ac0f37f1bcc87cf31298bd02a1d4dd20ab1cf75b8e05b78f04be81a3350a10260e4de75a5", 0x8c}, {&(0x7f0000002040)="79f15460d8ae11078205b6a00eafd4fa", 0x10}, {&(0x7f0000002080)="390a9c4b00e01d04db5f91ba6df637fa0208faf3eed100673bc068810cdcfaab166cd0358780678da0ea93a6c1d28d6baa2f6f51be9b6e0885db0df536d68d376d36fd71c5356d33f464f652368460f778a89c3c7c7d0d04b97c4d2782dc4c5e5451c2b1e3263abc3f023cc8a47bd44354888a2af8559d8c291dee42cc16be443b5c8905f26ab3c3244d4c129a0c433d51a79089b6", 0x95}, {&(0x7f0000002140)="d03b234ec93120582a8d1c049ed4a372629f136cdc96e4d800dc9e8eabbac53422b120fccc550b49400675ca61ee76c800a151fb4cf3a7bb8fc0f08ccaead783ee2b026e71b4e7131a000096bc2710e5a6ee87257169ef434764e5db81191ba7fd6bd89b3bbc074dd9dcdae00768ad32396a194225597b4dc87e54fa545533d75f6828471433e4b5ee3cd58852d85e42a425f9760ffa37b9a74faf0c5f41701bb15f0be46bfb26f8b059edbda6223f6ac296a6548536c0319314aba973dcc9eb0d36e13f8767813f265b3df49f2eee61f14dc83308ba3fb45d9c54bbb485592bf625b241b7f4c3a91e8465", 0xeb}, {&(0x7f0000002240)="79d8f00119ba91752f5f817460fd00c1628bd159dd22e7360ebe1337b654dd2647098a380aa1c830be141286f09dd522e36a0d445008f91e6e40121f7a19f4afdd533568365e84b988b182c5bb89a2738a3a2c14769333889e33ef5641bdd7ab7b14fe432ea748384554d2521169071356bae99add227c845bb5bf54f5b784efa6ae42a05e64f73be0315c223a1e421c92f0e6345e47afb4f66879faf617651548b2f22ceff7783ebfb5df0c8aa79304a7d3fa848072665be352edf8f1b26d431fe6c001a71b5e5d5086d15f6af440acd8e079716ba023f0cbf93c2f", 0xdc}, {&(0x7f0000002340)="90e1a44a9ff14e35be628448204f2cc59f962a2159ced410026655202ed2dc3b1c13f9168acb731344606dd88dd6246ca7e4feb4fef64f911ead9d957fe626326df557efc8ac13a7472e8766af7333d2ea2a0086d7608c7e148f1366d538d4c30fdf236c490cf483ce61c2c99c49726f913c067023aa037442fdc30d0bcaadf35536af887827109f77c5", 0x8a}], 0xa, &(0x7f00000024c0)="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", 0x1000, 0x8010}, 0x4000044) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000037c0)={r4, 0xe0, &(0x7f00000036c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000003500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000003540)=[0x0], &(0x7f0000003580)=[0x0, 0x0], 0x0, 0x8d, &(0x7f00000035c0)=[{}], 0x8, 0x10, &(0x7f0000003600), &(0x7f0000003640), 0x8, 0x83, 0x8, 0x8, &(0x7f0000003680)}}, 0x10) (rerun: 64) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000003800)={@ifindex=r11, r4, 0x32, 0x2000, 0x0, @prog_fd=r4, r8}, 0x20) (async) mkdirat$cgroup(r3, &(0x7f0000003840)='syz0\x00', 0x1ff) 2.33121ms ago: executing program 3 (id=8513): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async, rerun: 32) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_ext={0x1c, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffff81}, @ldst={0x2, 0x0, 0x0, 0x0, 0xb, 0xffffffffffffffc0, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0xc, 0x6, 0x2, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40000009}], &(0x7f00000001c0)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x6, 0x0, 0x8}, 0x10, 0x2f00e, r1, 0x2, &(0x7f0000000600)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r0], &(0x7f0000000640)=[{0x2, 0x2, 0x6, 0x4}, {0x1, 0x2, 0xd, 0x6}], 0x10, 0x7fffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) close(0xffffffffffffffff) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000ec0)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='rss_stat\x00'}, 0x29) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x0, 0xfff, 0x0, 0x0, r5, 0x1}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001ac0)={0x0}, 0x10) unlink(0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYRESHEX=r8, @ANYRESOCT, @ANYRES16=r6, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 0s ago: executing program 2 (id=8366): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1a, 0x0, &(0x7f0000000780), &(0x7f0000000700)='syzkaller\x00', 0x7fffffff, 0x6d, &(0x7f0000000800)=""/109, 0x41000, 0x22, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x2, 0xc0a2, 0x8}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000740)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0], 0x0, 0x10, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000001bc0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000001b80)='GPL\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) sendmsg$unix(r8, &(0x7f00000006c0)={&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000004c0)="7d0018d675fac106840685e64e4fb254ab2dae0a152ece1c17eb66d827e552432c12a1d284de9e3b6af8cacf888a410eba1b77d4eec6f7fb108f249e4b47ddd315a484d90fc2d589c8bf0ff7801935aa06124ac03b26e73412eb3c4095fb3ba7d859544fe39591b7b9b5b916b5ce3f7f20b938005166a46542aa8b58362ddef25a1df99711e62ee827156341ea75ed5f11033c686e4677f19ffd14ad97f7c4d7b068cf83555a8c7eeead0f7eb8aae33469b9c69d90cc7a0035e3867ba6b7cbaa6fda7b6a43ba7d1ce3918247492a73c71daaa746", 0xd4}, {&(0x7f0000000600)="006e92ee88cf402ebf8134e24d78c4762102fdde3a237c5ce8e43b4a9ab257e6b9445790b059773cce9d78a687b173a6e19192772ca8d4cb16228ff3a690b3fdf3e9cc0abfd9b037913ee1dc608ea96851049eff9b647b8d223c9f6ac82a1535c8e089da5eefa854173c9ab8abdaae3d6db10e7433c0d951ce7406d00a2df619be001d459475d1d7f4bf9b9476db29ce3396fdf4cdcbaa00b41e6937105277781bb299908327486a3a55", 0xaa}], 0x2, 0x0, 0x0, 0x8000}, 0x40080) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) kernel console output (not intermixed with test programs): 6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 667.138565][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 667.150634][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 667.160355][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 667.170598][ T891] bridge0: port 1(bridge_slave_0) entered blocking state [ 667.183429][ T891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 667.196982][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 667.207206][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 667.215776][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 667.225163][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 667.237523][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 667.249536][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 667.259737][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 667.270777][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 667.283543][ T891] bridge0: port 1(bridge_slave_0) entered blocking state [ 667.294502][ T891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 667.305785][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 667.316716][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 667.328478][ T891] bridge0: port 2(bridge_slave_1) entered blocking state [ 667.337892][ T891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 667.348047][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 667.359568][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 667.369738][ T891] bridge0: port 2(bridge_slave_1) entered blocking state [ 667.378174][ T891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 667.402636][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 667.410553][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 667.420312][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 667.434833][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 667.446637][ T891] bridge0: port 1(bridge_slave_0) entered blocking state [ 667.454911][ T891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 667.464386][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 667.473963][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 667.483444][ T891] bridge0: port 2(bridge_slave_1) entered blocking state [ 667.491843][ T891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 667.500776][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 667.511744][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 667.520758][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 667.532042][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 667.566397][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 667.579524][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 667.594048][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 667.606254][ T891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 667.631988][T19719] device veth0_vlan entered promiscuous mode [ 667.653760][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 667.669657][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 667.681308][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 667.695182][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 667.703736][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 667.712897][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 667.721736][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 667.740811][T19717] device veth0_vlan entered promiscuous mode [ 667.756383][T19719] device veth1_macvtap entered promiscuous mode [ 667.770306][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 667.779851][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 667.791792][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 667.802861][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 667.812969][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 667.823110][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 667.836646][T19716] device veth0_vlan entered promiscuous mode [ 667.855320][T19716] device veth1_macvtap entered promiscuous mode [ 667.863064][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 667.874394][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 667.883542][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 667.894020][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 667.904235][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 667.914853][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 667.925755][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 667.935135][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 667.950358][T19720] device veth0_vlan entered promiscuous mode [ 667.966390][T19717] device veth1_macvtap entered promiscuous mode [ 667.974151][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 667.983903][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 667.993766][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 668.004623][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 668.014333][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 668.025075][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 668.036037][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 668.045946][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 668.057582][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 668.071470][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 668.084183][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 668.096437][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 668.105598][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 668.129924][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 668.142643][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 668.156281][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 668.166969][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 668.179264][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 668.188189][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 668.201468][T19718] device veth0_vlan entered promiscuous mode [ 668.230108][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 668.240245][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 668.266332][T19720] device veth1_macvtap entered promiscuous mode [ 668.280927][T19718] device veth1_macvtap entered promiscuous mode [ 668.292340][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 668.312885][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 668.326542][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 668.338142][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 668.349927][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 668.360254][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 668.370821][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 668.380941][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 668.514488][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 668.528826][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 668.558287][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 668.571232][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 668.607316][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 668.618549][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 668.629774][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 668.639116][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 669.456160][T19783] device syzkaller0 entered promiscuous mode [ 669.483196][T19803] device pim6reg1 entered promiscuous mode [ 670.433252][ T452] device bridge_slave_1 left promiscuous mode [ 670.461816][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.483077][ T452] device bridge_slave_0 left promiscuous mode [ 670.496866][T19860] syz.4.5394[19860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 670.496943][T19860] syz.4.5394[19860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 670.511376][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.538042][ T452] device bridge_slave_1 left promiscuous mode [ 670.545615][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.555240][ T452] device bridge_slave_0 left promiscuous mode [ 670.563566][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.575164][ T452] device bridge_slave_1 left promiscuous mode [ 670.584558][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.601596][ T452] device bridge_slave_0 left promiscuous mode [ 670.619830][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.630485][ T452] device bridge_slave_1 left promiscuous mode [ 670.639825][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.662352][ T452] device bridge_slave_0 left promiscuous mode [ 670.671425][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.684034][ T452] device veth1_macvtap left promiscuous mode [ 670.691002][ T452] device veth0_vlan left promiscuous mode [ 670.698306][ T452] device veth1_macvtap left promiscuous mode [ 670.705150][ T452] device veth0_vlan left promiscuous mode [ 670.713547][ T452] device veth1_macvtap left promiscuous mode [ 670.723655][ T452] device veth1_macvtap left promiscuous mode [ 670.730865][ T452] device veth0_vlan left promiscuous mode [ 671.296334][T19863] device sit0 entered promiscuous mode [ 672.850743][T19883] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.862972][T19883] bridge0: port 1(bridge_slave_0) entered disabled state [ 674.508904][T19923] device syzkaller0 entered promiscuous mode [ 674.634834][T19944] device wg2 entered promiscuous mode [ 674.989377][T19988] syz.0.5429[19988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 674.989474][T19988] syz.0.5429[19988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.026508][T19990] syz.3.5430[19990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.070394][T19990] syz.3.5430[19990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.166804][T19992] device syzkaller0 entered promiscuous mode [ 675.255693][T19998] device pim6reg1 entered promiscuous mode [ 675.695039][T20031] device pim6reg1 entered promiscuous mode [ 675.775168][T20031] device syzkaller0 entered promiscuous mode [ 675.799023][T20038] device syzkaller0 entered promiscuous mode [ 675.920668][T20044] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.930297][T20044] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.168433][T20073] tap0: tun_chr_ioctl cmd 1074025677 [ 676.185539][T20073] tap0: linktype set to 774 [ 676.215462][T20066] tap0: tun_chr_ioctl cmd 1074812117 [ 676.880168][T20158] device wg2 left promiscuous mode [ 676.965104][T18130] syzkaller0: tun_net_xmit 76 [ 676.971056][T18130] syzkaller0: tun_net_xmit 48 [ 677.269121][T20203] syz.1.5490[20203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.269199][T20203] syz.1.5490[20203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 678.054650][T20211] device syzkaller0 entered promiscuous mode [ 679.566242][T20289] device veth0_vlan left promiscuous mode [ 679.598537][T20289] device veth0_vlan entered promiscuous mode [ 680.264867][T20330] device syzkaller0 entered promiscuous mode [ 681.123518][T20417] device veth0_vlan left promiscuous mode [ 681.167580][T20417] device veth0_vlan entered promiscuous mode [ 682.407651][T20469] ¯Ê®¸}p: renamed from pim6reg1 [ 682.700896][T20483] device pim6reg1 entered promiscuous mode [ 682.938404][T20504] device pim6reg1 entered promiscuous mode [ 684.010406][T20583] device sit0 entered promiscuous mode [ 684.333459][T20588] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.342686][T20588] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.388392][T20597] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.397205][T20597] bridge0: port 2(bridge_slave_1) entered forwarding state [ 684.406424][T20597] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.415333][T20597] bridge0: port 1(bridge_slave_0) entered forwarding state [ 684.460137][T20597] device bridge0 entered promiscuous mode [ 684.614204][T20606] device veth0_vlan left promiscuous mode [ 684.665048][T20606] device veth0_vlan entered promiscuous mode [ 684.712653][T20616] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.721737][T20616] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.765203][T20626] device bridge_slave_1 left promiscuous mode [ 684.811913][T20626] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.823610][T20626] device bridge_slave_0 left promiscuous mode [ 684.877950][T20626] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.070053][T20643] ªªªªªª: renamed from vlan0 [ 685.092983][T20647] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.102742][T20647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 685.111063][T20647] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.120565][T20647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 685.143890][T20647] device bridge0 entered promiscuous mode [ 685.470893][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 685.480566][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 685.765572][T20703] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.774439][T20703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 685.787168][T20703] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.798649][T20703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 685.813288][T20703] device bridge0 entered promiscuous mode [ 685.855119][T20693] device pim6reg1 entered promiscuous mode [ 686.375532][T20751] device sit0 left promiscuous mode [ 686.471679][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 686.635410][T20771] device pim6reg1 entered promiscuous mode [ 686.707365][T20783] device pim6reg1 entered promiscuous mode [ 687.964681][T20903] device sit0 left promiscuous mode [ 688.113244][T20912] syz.4.5676[20912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.113326][T20912] syz.4.5676[20912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.166032][T20909] device syzkaller0 entered promiscuous mode [ 733.972655][T21001] bridge0: port 1(bridge_slave_0) entered blocking state [ 733.979831][T21001] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.988096][T21001] device bridge_slave_0 entered promiscuous mode [ 733.995824][T21001] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.003920][T21001] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.012015][T21001] device bridge_slave_1 entered promiscuous mode [ 734.046742][T21000] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.054060][T21000] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.062219][T21000] device bridge_slave_0 entered promiscuous mode [ 734.069788][T21000] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.079218][T21000] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.089079][T21000] device bridge_slave_1 entered promiscuous mode [ 734.117514][T21003] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.129272][T21003] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.141312][T21003] device bridge_slave_0 entered promiscuous mode [ 734.168306][T21003] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.177903][T21003] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.189800][T21003] device bridge_slave_1 entered promiscuous mode [ 734.201282][T21002] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.210221][T21002] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.220053][T21002] device bridge_slave_0 entered promiscuous mode [ 734.228974][T21002] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.237504][T21002] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.245627][T21002] device bridge_slave_1 entered promiscuous mode [ 734.315923][T21004] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.332175][T21004] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.348074][T21004] device bridge_slave_0 entered promiscuous mode [ 734.358959][T21004] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.366717][T21004] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.377585][T21004] device bridge_slave_1 entered promiscuous mode [ 734.529793][T21002] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.538819][T21002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.548480][T21002] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.556489][T21002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 734.572881][T21000] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.584667][T21000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.595237][T21000] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.604052][T21000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 734.633068][T21003] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.642999][T21003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.652365][T21003] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.662045][T21003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 734.682965][T21001] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.693614][T21001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.703513][T21001] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.712965][T21001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 734.730911][T21004] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.743243][T21004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.753753][T21004] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.765077][T21004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 734.826343][ T324] device bridge_slave_1 left promiscuous mode [ 734.836145][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.849430][ T324] device bridge_slave_0 left promiscuous mode [ 734.859251][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.870068][ T324] device veth1_macvtap left promiscuous mode [ 734.951985][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 734.961433][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 734.973437][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 734.985708][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 734.999677][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 735.010088][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 735.022442][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 735.033922][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 735.045543][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 735.058902][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 735.070885][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 735.086387][T18123] bridge0: port 2(bridge_slave_1) entered disabled state [ 735.098610][T18123] bridge0: port 1(bridge_slave_0) entered disabled state [ 735.109848][T18123] bridge0: port 2(bridge_slave_1) entered disabled state [ 735.134116][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 735.146214][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 735.156654][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 735.169207][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 735.181412][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 735.197295][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 735.208999][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 735.217583][T18124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 735.229746][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 735.239569][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 735.262058][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 735.274031][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 735.284791][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 735.296412][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 735.308431][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 735.319731][T18123] bridge0: port 1(bridge_slave_0) entered blocking state [ 735.332289][T18123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 735.342745][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 735.351924][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 735.362883][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 735.373973][T18123] bridge0: port 2(bridge_slave_1) entered blocking state [ 735.385882][T18123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 735.401917][T21000] device veth0_vlan entered promiscuous mode [ 735.420582][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 735.431513][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 735.449439][T18131] bridge0: port 2(bridge_slave_1) entered blocking state [ 735.460542][T18131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 735.496750][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 735.508232][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 735.517897][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 735.529771][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 735.542327][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 735.555024][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 735.565757][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 735.577006][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 735.601949][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 735.620534][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 735.631079][ T433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 735.649399][T21004] device veth0_vlan entered promiscuous mode [ 735.664685][T21000] device veth1_macvtap entered promiscuous mode [ 735.674804][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 735.685447][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 735.694643][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 735.704727][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 735.714959][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 735.731188][T21003] device veth0_vlan entered promiscuous mode [ 735.747123][T21002] device veth0_vlan entered promiscuous mode [ 735.763063][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 735.772460][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 735.782759][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 735.794077][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 735.804916][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 735.815699][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 735.824439][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 735.834064][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 735.842672][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 735.853574][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 735.867833][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 735.879899][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 735.891530][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 735.899974][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 735.909909][T21001] device veth0_vlan entered promiscuous mode [ 735.947125][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 735.966964][T21002] device veth1_macvtap entered promiscuous mode [ 735.977318][T21004] device veth1_macvtap entered promiscuous mode [ 735.990685][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 736.002836][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 736.017987][T21001] device veth1_macvtap entered promiscuous mode [ 736.027729][T21003] device veth1_macvtap entered promiscuous mode [ 736.039312][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 736.051491][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 736.065298][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 736.079106][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 736.092070][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 736.104719][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 736.114896][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 736.153100][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 736.164217][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 736.177157][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 736.186276][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 736.199900][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 736.212095][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 736.222763][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 736.233041][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 736.243485][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 736.253157][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 736.264393][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 736.277767][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 740.063842][T21083] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 740.090388][T21083] device syzkaller0 entered promiscuous mode [ 740.138095][T21087] ref_ctr_offset mismatch. inode: 0x1d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x7602 [ 740.786631][ T324] device bridge_slave_1 left promiscuous mode [ 740.800928][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.818129][ T324] device bridge_slave_0 left promiscuous mode [ 740.840441][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.859940][ T324] device bridge_slave_1 left promiscuous mode [ 740.878498][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.905523][ T324] device bridge_slave_0 left promiscuous mode [ 740.913070][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.923773][ T324] device bridge_slave_1 left promiscuous mode [ 740.930563][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.939794][ T324] device bridge_slave_0 left promiscuous mode [ 740.946973][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.965745][ T324] device veth1_macvtap left promiscuous mode [ 740.974784][ T324] device veth0_vlan left promiscuous mode [ 740.983144][ T324] device veth1_macvtap left promiscuous mode [ 740.990263][ T324] device veth0_vlan left promiscuous mode [ 740.997391][ T324] device veth1_macvtap left promiscuous mode [ 741.004688][ T324] device veth0_vlan left promiscuous mode [ 741.011363][ T324] device veth1_macvtap left promiscuous mode [ 741.860951][T21126] ref_ctr_offset mismatch. inode: 0x21 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x7602 [ 741.905317][T21127] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 741.952600][T21127] device syzkaller0 entered promiscuous mode [ 743.471802][T21174] ref_ctr_offset mismatch. inode: 0x5c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x7602 [ 743.865816][T21181] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 743.876512][T21181] device syzkaller0 entered promiscuous mode [ 746.044369][T21261] syz.3.5769[21261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 746.044451][T21261] syz.3.5769[21261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 747.785874][T21324] syz.1.5777[21324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 747.811966][T21324] syz.1.5777[21324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 748.022091][T21324] syz.1.5777[21324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 748.072713][T21324] syz.1.5777[21324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 749.100013][T21400] device syzkaller0 entered promiscuous mode [ 749.147817][T21402] tap0: tun_chr_ioctl cmd 1074812117 [ 749.400559][T21447] ÿÿÿÿÿÿ: renamed from vlan1 [ 750.071380][T21499] bridge0: port 2(bridge_slave_1) entered disabled state [ 750.079236][T21499] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.215091][T21499] device bridge_slave_1 left promiscuous mode [ 750.242971][T21499] bridge0: port 2(bridge_slave_1) entered disabled state [ 750.266769][T21499] device bridge_slave_0 left promiscuous mode [ 750.285867][T21499] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.369170][T21515] device pim6reg1 entered promiscuous mode [ 750.748515][T21533] device syzkaller0 entered promiscuous mode [ 751.885406][T21566] cgroup: fork rejected by pids controller in /syz1 [ 752.781274][T21605] bridge0: port 1(bridge_slave_0) entered blocking state [ 752.797999][T21605] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.820865][T21605] device bridge_slave_0 entered promiscuous mode [ 752.841255][T21605] bridge0: port 2(bridge_slave_1) entered blocking state [ 752.873629][T21605] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.927238][T21605] device bridge_slave_1 entered promiscuous mode [ 752.994818][T21635] device sit0 entered promiscuous mode [ 753.478972][T18118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 753.518617][T18118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 753.647856][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 753.660830][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 753.673445][T18125] bridge0: port 1(bridge_slave_0) entered blocking state [ 753.681920][T18125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 753.691323][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 753.701252][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 753.710756][T18125] bridge0: port 2(bridge_slave_1) entered blocking state [ 753.718281][T18125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 753.752284][T18118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 753.776063][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 753.789352][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 753.808713][T21687] bridge0: port 2(bridge_slave_1) entered disabled state [ 753.817651][T21687] bridge0: port 1(bridge_slave_0) entered disabled state [ 753.840733][T21683] device sit0 entered promiscuous mode [ 753.935098][T21687] bridge0: port 2(bridge_slave_1) entered blocking state [ 753.943085][T21687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 753.951145][T21687] bridge0: port 1(bridge_slave_0) entered blocking state [ 753.961637][T21687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 753.995956][T21687] device bridge0 entered promiscuous mode [ 754.065649][T18130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 754.378680][T21605] device veth0_vlan entered promiscuous mode [ 754.459630][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 754.470411][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 754.496864][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 754.508912][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 754.520137][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 754.533235][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 754.584463][T21605] device veth1_macvtap entered promiscuous mode [ 754.645149][T18119] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 754.667003][T18119] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 754.708457][T18119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 754.730106][T18119] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 754.813459][T18119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 754.840595][T21734] device sit0 left promiscuous mode [ 754.864837][T21736] device pim6reg1 entered promiscuous mode [ 754.888020][T21738] device sit0 entered promiscuous mode [ 755.110878][ T324] device bridge_slave_1 left promiscuous mode [ 755.120114][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 755.132609][ T324] device bridge_slave_0 left promiscuous mode [ 755.142494][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 755.153914][ T324] device veth1_macvtap left promiscuous mode [ 755.376736][T21752] device syzkaller0 entered promiscuous mode [ 755.400858][T21768] device pim6reg1 entered promiscuous mode [ 755.584407][T21781] : renamed from ipvlan1 [ 757.269644][T21854] device syzkaller0 entered promiscuous mode [ 758.168146][T21912] device syzkaller0 entered promiscuous mode [ 758.276573][T21921] device sit0 entered promiscuous mode [ 758.669451][T21952] syz.4.5942[21952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 758.669520][T21952] syz.4.5942[21952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 759.129755][T21984] device veth0_vlan left promiscuous mode [ 759.206466][T21984] device veth0_vlan entered promiscuous mode [ 759.317950][T21993] device syzkaller0 entered promiscuous mode [ 759.700562][T22052] device syzkaller0 entered promiscuous mode [ 760.362405][T22130] tap0: tun_chr_ioctl cmd 1074025677 [ 760.386910][T22130] tap0: linktype set to 821 [ 760.462566][T22137] device syzkaller0 entered promiscuous mode [ 760.646470][T22154] device veth0_vlan left promiscuous mode [ 760.659371][T22154] device veth0_vlan entered promiscuous mode [ 760.684788][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 760.697652][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 760.716640][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 760.758064][T22159] device syzkaller0 entered promiscuous mode [ 761.243520][T22192] device sit0 left promiscuous mode [ 761.330963][T22192] device sit0 entered promiscuous mode [ 762.291141][T22258] device pim6reg1 entered promiscuous mode [ 762.637749][T22276] syz.2.6032[22276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.637837][T22276] syz.2.6032[22276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 763.040304][T22303] device pim6reg1 entered promiscuous mode [ 763.817357][T22342] syz.1.6053[22342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 763.817437][T22342] syz.1.6053[22342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 763.897733][T22356] device syzkaller0 entered promiscuous mode [ 764.078894][T22350] bridge0: port 1(bridge_slave_0) entered blocking state [ 764.140250][T22350] bridge0: port 1(bridge_slave_0) entered disabled state [ 764.158895][T22350] device bridge_slave_0 entered promiscuous mode [ 764.177562][T22350] bridge0: port 2(bridge_slave_1) entered blocking state [ 764.198050][T22350] bridge0: port 2(bridge_slave_1) entered disabled state [ 764.230197][T22350] device bridge_slave_1 entered promiscuous mode [ 764.454856][T22387] bridge_slave_0: mtu greater than device maximum [ 764.803827][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 764.930701][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 764.939721][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 764.950345][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 764.959213][T18126] bridge0: port 1(bridge_slave_0) entered blocking state [ 764.968794][T18126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 764.979796][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 765.000906][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 765.016871][T18126] bridge0: port 2(bridge_slave_1) entered blocking state [ 765.024313][T18126] bridge0: port 2(bridge_slave_1) entered forwarding state [ 765.033515][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 765.058030][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 765.070748][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 765.081989][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 765.092638][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 765.118820][T22413] device bridge0 left promiscuous mode [ 765.138229][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 765.160553][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 765.230481][T22350] device veth0_vlan entered promiscuous mode [ 765.284654][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 765.305272][T18125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 765.340964][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 765.365889][T18126] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 765.435650][T22350] device veth1_macvtap entered promiscuous mode [ 765.456319][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 765.473021][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 765.485651][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 765.536988][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 765.555109][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 765.576686][T22465] device sit0 left promiscuous mode [ 765.584048][ T24] audit: type=1400 audit(1723754166.350:180): avc: denied { read } for pid=22459 comm="syz.1.6087" name="cgroup.subtree_control" dev="cgroup2" ino=470 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 765.617631][ T24] audit: type=1400 audit(1723754166.350:181): avc: denied { ioctl } for pid=22459 comm="syz.1.6087" path="" dev="cgroup2" ino=470 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 765.650437][ T2156] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 765.663434][ T2156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 765.793151][T22473] device pim6reg1 entered promiscuous mode [ 765.974491][ T324] device bridge_slave_1 left promiscuous mode [ 765.988643][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 766.036798][ T324] device bridge_slave_0 left promiscuous mode [ 766.069102][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 766.099809][ T324] device veth1_macvtap left promiscuous mode [ 766.452187][T22514] syz.4.6102[22514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 766.452261][T22514] syz.4.6102[22514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 766.453160][T22515] syz.4.6102[22515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 766.548200][T22515] syz.4.6102[22515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 766.738631][T22534] device sit0 entered promiscuous mode [ 767.320047][T22557] FAULT_INJECTION: forcing a failure. [ 767.320047][T22557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 767.335915][T22557] CPU: 1 PID: 22557 Comm: syz.4.6114 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 767.350396][T22557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 767.360847][T22557] Call Trace: [ 767.365254][T22557] dump_stack_lvl+0x1e2/0x24b [ 767.370435][T22557] ? bfq_pos_tree_add_move+0x43b/0x43b [ 767.376700][T22557] ? shmem_getpage_gfp+0x2226/0x2480 [ 767.384724][T22557] dump_stack+0x15/0x17 [ 767.389443][T22557] should_fail+0x3c6/0x510 [ 767.394171][T22557] should_fail_usercopy+0x1a/0x20 [ 767.400913][T22557] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 767.408536][T22557] ? shmem_getpage+0xa0/0xa0 [ 767.415052][T22557] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 767.423171][T22557] ? memzero_page+0x100/0x100 [ 767.429025][T22557] generic_perform_write+0x34c/0x570 [ 767.434973][T22557] ? grab_cache_page_write_begin+0xa0/0xa0 [ 767.443962][T22557] ? file_remove_privs+0x570/0x570 [ 767.450711][T22557] ? __kasan_check_write+0x14/0x20 [ 767.456732][T22557] __generic_file_write_iter+0x23c/0x560 [ 767.464117][T22557] ? generic_write_checks+0x3b9/0x470 [ 767.470863][T22557] generic_file_write_iter+0xaf/0x1c0 [ 767.478776][T22557] vfs_write+0xb4c/0xe70 [ 767.485877][T22557] ? kernel_write+0x3d0/0x3d0 [ 767.495063][T22557] ? mutex_trylock+0xa0/0xa0 [ 767.502759][T22557] ? __fdget_pos+0x2e7/0x3a0 [ 767.507910][T22557] ? ksys_write+0x77/0x2c0 [ 767.513441][T22557] ksys_write+0x199/0x2c0 [ 767.519861][T22557] ? __ia32_sys_read+0x90/0x90 [ 767.526277][T22557] ? debug_smp_processor_id+0x17/0x20 [ 767.534395][T22557] __x64_sys_write+0x7b/0x90 [ 767.541018][T22557] do_syscall_64+0x34/0x70 [ 767.549400][T22557] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 767.558654][T22557] RIP: 0033:0x7fcfaa2369b9 [ 767.566244][T22557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 767.591915][T22557] RSP: 002b:00007fcfa8eb4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 767.602715][T22557] RAX: ffffffffffffffda RBX: 00007fcfaa3d2f80 RCX: 00007fcfaa2369b9 [ 767.612736][T22557] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000008 [ 767.623332][T22557] RBP: 00007fcfa8eb4090 R08: 0000000000000000 R09: 0000000000000000 [ 767.633316][T22557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 767.642386][T22557] R13: 0000000000000000 R14: 00007fcfaa3d2f80 R15: 00007ffd3c796dc8 [ 767.802717][T22578] syz.0.6120[22578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.802804][T22578] syz.0.6120[22578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 768.265647][T22597] bridge0: port 2(bridge_slave_1) entered disabled state [ 768.294144][T22597] bridge0: port 1(bridge_slave_0) entered disabled state [ 768.408160][T22619] FAULT_INJECTION: forcing a failure. [ 768.408160][T22619] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 768.423312][T22619] CPU: 1 PID: 22619 Comm: syz.2.6132 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 768.436406][T22619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 768.449345][T22619] Call Trace: [ 768.452856][T22619] dump_stack_lvl+0x1e2/0x24b [ 768.458813][T22619] ? bfq_pos_tree_add_move+0x43b/0x43b [ 768.465322][T22619] ? shmem_getpage_gfp+0x2226/0x2480 [ 768.471687][T22619] dump_stack+0x15/0x17 [ 768.476345][T22619] should_fail+0x3c6/0x510 [ 768.481792][T22619] should_fail_usercopy+0x1a/0x20 [ 768.488103][T22619] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 768.496691][T22619] ? shmem_getpage+0xa0/0xa0 [ 768.502446][T22619] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 768.509436][T22619] ? memzero_page+0x100/0x100 [ 768.514699][T22619] generic_perform_write+0x34c/0x570 [ 768.522161][T22619] ? grab_cache_page_write_begin+0xa0/0xa0 [ 768.529475][T22619] ? file_remove_privs+0x570/0x570 [ 768.541958][T22619] ? __kasan_check_write+0x14/0x20 [ 768.550662][T22619] __generic_file_write_iter+0x23c/0x560 [ 768.558746][T22619] ? generic_write_checks+0x3b9/0x470 [ 768.567803][T22619] generic_file_write_iter+0xaf/0x1c0 [ 768.574704][T22619] vfs_write+0xb4c/0xe70 [ 768.580464][T22619] ? kernel_write+0x3d0/0x3d0 [ 768.587145][T22619] ? mutex_trylock+0xa0/0xa0 [ 768.594879][T22619] ? __fdget_pos+0x2e7/0x3a0 [ 768.600042][T22619] ? ksys_write+0x77/0x2c0 [ 768.606729][T22619] ksys_write+0x199/0x2c0 [ 768.612951][T22619] ? __ia32_sys_read+0x90/0x90 [ 768.619500][T22619] ? debug_smp_processor_id+0x17/0x20 [ 768.626414][T22619] __x64_sys_write+0x7b/0x90 [ 768.631797][T22619] do_syscall_64+0x34/0x70 [ 768.637300][T22619] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 768.643504][T22619] RIP: 0033:0x7ff1d399f9b9 [ 768.648353][T22619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 768.672387][T22619] RSP: 002b:00007ff1d261d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 768.682951][T22619] RAX: ffffffffffffffda RBX: 00007ff1d3b3bf80 RCX: 00007ff1d399f9b9 [ 768.694288][T22619] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000008 [ 768.707260][T22619] RBP: 00007ff1d261d090 R08: 0000000000000000 R09: 0000000000000000 [ 768.717071][T22619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 768.726946][T22616] device syzkaller0 entered promiscuous mode [ 768.728064][T22619] R13: 0000000000000000 R14: 00007ff1d3b3bf80 R15: 00007ffc7530e9f8 [ 768.934509][T22645] device pim6reg1 entered promiscuous mode [ 817.023442][T22784] device pim6reg1 entered promiscuous mode [ 817.099753][T22816] device syzkaller0 entered promiscuous mode [ 817.230432][T22821] device syzkaller0 entered promiscuous mode [ 818.204725][T22867] device pim6reg1 entered promiscuous mode [ 818.916540][T22943] device syzkaller0 entered promiscuous mode [ 819.288272][T22982] device syzkaller0 entered promiscuous mode [ 820.285370][T23031] device syzkaller0 entered promiscuous mode [ 820.299017][T23034] device sit0 left promiscuous mode [ 820.346290][T23034] device sit0 entered promiscuous mode [ 821.235906][T23100] device syzkaller0 entered promiscuous mode [ 821.623863][T23124] device pim6reg1 entered promiscuous mode [ 823.377574][T23213] device pim6reg1 entered promiscuous mode [ 823.428933][T23231] device syzkaller0 entered promiscuous mode [ 824.513575][T23293] device sit0 entered promiscuous mode [ 825.089529][T23294] device syzkaller0 entered promiscuous mode [ 825.840806][T23353] device pim6reg1 entered promiscuous mode [ 826.017134][T23370] syz.1.6330[23370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 826.017212][T23370] syz.1.6330[23370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 826.497065][T23388] device syzkaller0 entered promiscuous mode [ 826.538966][T23393] device bond_slave_1 entered promiscuous mode [ 829.148408][T23617] device dummy0 entered promiscuous mode [ 829.160471][T23623] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.168642][T23623] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.398284][T23664] device syzkaller0 entered promiscuous mode [ 829.489998][T23683] device pim6reg1 entered promiscuous mode [ 829.942084][T23726] device wg2 entered promiscuous mode [ 831.808280][T23821] device syzkaller0 entered promiscuous mode [ 832.214490][T23843] device veth1_macvtap left promiscuous mode [ 832.255003][T23843] device macsec0 entered promiscuous mode [ 832.303571][T23849] device pim6reg1 entered promiscuous mode [ 832.362357][T23843] device veth1_macvtap entered promiscuous mode [ 832.772308][T23881] device veth1_macvtap left promiscuous mode [ 832.778634][T23881] device macsec0 entered promiscuous mode [ 833.702502][T23922] device wg0 entered promiscuous mode [ 834.527245][T23976] device pim6reg1 entered promiscuous mode [ 835.190721][T24032] device sit0 entered promiscuous mode [ 835.254635][T24037] syz.4.6516[24037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 835.254710][T24037] syz.4.6516[24037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 835.815427][T24069] device sit0 left promiscuous mode [ 836.218054][T24095] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.226447][T24095] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.399082][T24109] device pim6reg1 entered promiscuous mode [ 837.495162][T24205] device pim6reg1 entered promiscuous mode [ 837.687053][T24218] device syzkaller0 entered promiscuous mode [ 837.736242][T24218] syzkaller0: tun_net_xmit 1280 [ 837.761839][T24218] syzkaller0: create flow: hash 1996386343 index 2 [ 838.042809][T24235] device pim6reg1 entered promiscuous mode [ 838.083901][T24228] syzkaller0: delete flow: hash 1996386343 index 2 [ 838.371451][T24250] device pim6reg1 entered promiscuous mode [ 838.608679][T24256] device sit0 left promiscuous mode [ 838.720686][T24271] device syzkaller0 entered promiscuous mode [ 839.267198][T24309] device sit0 entered promiscuous mode [ 839.612723][T24326] device syzkaller0 entered promiscuous mode [ 839.627188][T24328] device sit0 entered promiscuous mode [ 843.443153][T24491] device veth0_vlan left promiscuous mode [ 843.472664][T24491] device veth0_vlan entered promiscuous mode [ 843.528276][ T2915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 843.550845][ T2915] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 843.565225][ T2915] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 843.908334][T24544] device veth0_vlan left promiscuous mode [ 843.957692][T24544] device veth0_vlan entered promiscuous mode [ 843.994867][ T2935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 844.028801][ T2935] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 844.062138][ T2935] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 844.358864][T24563] device syzkaller0 entered promiscuous mode [ 844.554336][T24601] device veth0_vlan left promiscuous mode [ 844.582261][T24601] device veth0_vlan entered promiscuous mode [ 844.617844][ T462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 844.628428][ T462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 844.641673][ T462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 844.694598][T24607] device sit0 left promiscuous mode [ 844.755870][T24615] device sit0 entered promiscuous mode [ 844.830462][T24623] syz.2.6687[24623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 844.830542][T24623] syz.2.6687[24623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 844.879189][T24623] device syzkaller0 entered promiscuous mode [ 846.326182][T24721] device syzkaller0 entered promiscuous mode [ 846.404069][T24742] syz.4.6720[24742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 846.404131][T24742] syz.4.6720[24742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 846.489000][T24750] device veth1_macvtap left promiscuous mode [ 846.640915][T24763] device veth1_macvtap left promiscuous mode [ 846.648121][T24763] device macsec0 left promiscuous mode [ 846.927890][T24782] device veth0_vlan left promiscuous mode [ 846.963769][T24782] device veth0_vlan entered promiscuous mode [ 847.051227][ T462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 847.080831][ T462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 847.184385][ T462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 848.003881][T24838] syz.4.6750[24838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 848.004000][T24838] syz.4.6750[24838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 848.615072][T24884] device syzkaller0 entered promiscuous mode [ 848.843316][T24898] device veth0_vlan left promiscuous mode [ 848.897229][T24898] device veth0_vlan entered promiscuous mode [ 850.790720][T25061] syz.0.6815[25061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 850.790796][T25061] syz.0.6815[25061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 851.065451][T25063] syz.0.6815[25063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 851.121955][T25063] syz.0.6815[25063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 851.186695][T25071] device veth1_macvtap left promiscuous mode [ 851.228890][T25077] device syzkaller0 entered promiscuous mode [ 851.378900][T25092] device pim6reg1 entered promiscuous mode [ 851.492899][T25104] device syzkaller0 entered promiscuous mode [ 851.636852][T25106] device syzkaller0 entered promiscuous mode [ 852.611450][T25180] device pim6reg1 entered promiscuous mode [ 853.915981][T25246] device syzkaller0 entered promiscuous mode [ 856.365435][T25363] syz.2.6905[25363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.365523][T25363] syz.2.6905[25363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.633668][T25367] syz.2.6905[25367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.763121][T25367] syz.2.6905[25367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 857.042169][T25388] device pim6reg1 entered promiscuous mode [ 857.385419][T25394] device syzkaller0 entered promiscuous mode [ 857.536064][T25417] device veth0_vlan left promiscuous mode [ 857.572050][T25417] device veth0_vlan entered promiscuous mode [ 857.610245][T18127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 857.629372][T18127] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 857.668824][T18127] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 857.857894][T25429] sock: sock_set_timeout: `syz.3.6921' (pid 25429) tries to set negative timeout [ 858.176069][T25454] device sit0 left promiscuous mode [ 858.648590][T25473] device pim6reg1 entered promiscuous mode [ 860.667049][T25556] device syzkaller0 entered promiscuous mode [ 860.720486][T25562] device veth1_macvtap entered promiscuous mode [ 860.733175][T25562] device macsec0 entered promiscuous mode [ 860.746285][T18134] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 860.870464][T25579] device pim6reg1 entered promiscuous mode [ 861.318287][T25593] device syzkaller0 entered promiscuous mode [ 861.707821][T25631] device sit0 entered promiscuous mode [ 861.776821][T25651] device pim6reg1 entered promiscuous mode [ 861.906971][T25678] device dummy0 entered promiscuous mode [ 862.711704][T25725] device sit0 left promiscuous mode [ 863.478428][T25762] bridge0: port 3(veth0_to_batadv) entered blocking state [ 863.649567][T25762] bridge0: port 3(veth0_to_batadv) entered disabled state [ 863.786576][T25762] device veth0_to_batadv entered promiscuous mode [ 863.942461][T25753] device veth0_to_batadv left promiscuous mode [ 864.033572][T25753] bridge0: port 3(veth0_to_batadv) entered disabled state [ 866.034313][T25893] device veth0_vlan left promiscuous mode [ 866.126126][T25893] device veth0_vlan entered promiscuous mode [ 866.198984][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 866.243854][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 866.302228][ T1088] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 867.604645][T25975] bridge0: port 2(bridge_slave_1) entered blocking state [ 867.612304][T25975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 867.620899][T25975] bridge0: port 1(bridge_slave_0) entered blocking state [ 867.628673][T25975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 867.639292][T25975] device bridge0 entered promiscuous mode [ 867.654479][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 867.997081][T25998] device syzkaller0 entered promiscuous mode [ 868.863739][T26074] device pim6reg1 entered promiscuous mode [ 869.312641][T26101] device syzkaller0 entered promiscuous mode [ 869.479009][T26109] device sit0 left promiscuous mode [ 869.931475][T26119] device sit0 entered promiscuous mode [ 870.175677][T26134] device sit0 left promiscuous mode [ 870.273738][T26145] ÿÿÿÿÿÿ: renamed from vlan1 [ 872.378036][T26237] device syzkaller0 entered promiscuous mode [ 872.585074][T26253] device pim6reg1 entered promiscuous mode [ 876.722861][T26438] FAULT_INJECTION: forcing a failure. [ 876.722861][T26438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 876.744694][T26438] CPU: 1 PID: 26438 Comm: syz.3.7193 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 876.759812][T26438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 876.774611][T26438] Call Trace: [ 876.778874][T26438] dump_stack_lvl+0x1e2/0x24b [ 876.787038][T26438] ? bfq_pos_tree_add_move+0x43b/0x43b [ 876.795171][T26438] ? shmem_getpage_gfp+0x2226/0x2480 [ 876.803093][T26438] dump_stack+0x15/0x17 [ 876.808386][T26438] should_fail+0x3c6/0x510 [ 876.813919][T26438] should_fail_usercopy+0x1a/0x20 [ 876.819876][T26438] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 876.827557][T26438] ? shmem_getpage+0xa0/0xa0 [ 876.834021][T26438] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 876.843436][T26438] ? memzero_page+0x100/0x100 [ 876.848831][T26438] generic_perform_write+0x34c/0x570 [ 876.855548][T26438] ? grab_cache_page_write_begin+0xa0/0xa0 [ 876.862018][T26438] ? file_remove_privs+0x570/0x570 [ 876.867910][T26438] ? __kasan_check_write+0x14/0x20 [ 876.873400][T26438] __generic_file_write_iter+0x23c/0x560 [ 876.880185][T26438] ? generic_write_checks+0x3b9/0x470 [ 876.887491][T26438] generic_file_write_iter+0xaf/0x1c0 [ 876.893889][T26438] vfs_write+0xb4c/0xe70 [ 876.898543][T26438] ? kernel_write+0x3d0/0x3d0 [ 876.903457][T26438] ? mutex_trylock+0xa0/0xa0 [ 876.909410][T26438] ? __fdget_pos+0x2e7/0x3a0 [ 876.914916][T26438] ? ksys_write+0x77/0x2c0 [ 876.920123][T26438] ksys_write+0x199/0x2c0 [ 876.926211][T26438] ? __ia32_sys_read+0x90/0x90 [ 876.931827][T26438] ? debug_smp_processor_id+0x17/0x20 [ 876.940233][T26438] __x64_sys_write+0x7b/0x90 [ 876.946111][T26438] do_syscall_64+0x34/0x70 [ 876.951034][T26438] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 876.958848][T26438] RIP: 0033:0x7f9452d989b9 [ 876.963763][T26438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 876.992029][T26438] RSP: 002b:00007f9451a16038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 877.001475][T26438] RAX: ffffffffffffffda RBX: 00007f9452f34f80 RCX: 00007f9452d989b9 [ 877.014554][T26438] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 877.026107][T26438] RBP: 00007f9451a16090 R08: 0000000000000000 R09: 0000000000000000 [ 877.035961][T26438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 877.044608][T26438] R13: 0000000000000000 R14: 00007f9452f34f80 R15: 00007ffdc7344a28 [ 877.359435][T26459] device syzkaller0 entered promiscuous mode [ 877.507400][T26464] device syzkaller0 entered promiscuous mode [ 877.698230][T26483] syz.0.7207[26483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 877.698358][T26483] syz.0.7207[26483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 877.859084][ T24] audit: type=1400 audit(1723754278.630:182): avc: denied { setattr } for pid=26488 comm="syz.3.7209" path="pipe:[89747]" dev="pipefs" ino=89747 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 878.032146][T26493] FAULT_INJECTION: forcing a failure. [ 878.032146][T26493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 878.051523][T26493] CPU: 1 PID: 26493 Comm: syz.3.7210 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 878.066696][T26493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 878.080763][T26493] Call Trace: [ 878.085309][T26493] dump_stack_lvl+0x1e2/0x24b [ 878.092061][T26493] ? bfq_pos_tree_add_move+0x43b/0x43b [ 878.099019][T26493] ? shmem_getpage_gfp+0x2226/0x2480 [ 878.107383][T26493] dump_stack+0x15/0x17 [ 878.112156][T26493] should_fail+0x3c6/0x510 [ 878.118796][T26493] should_fail_usercopy+0x1a/0x20 [ 878.125808][T26493] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 878.133229][T26493] ? shmem_getpage+0xa0/0xa0 [ 878.138921][T26493] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 878.146693][T26493] ? memzero_page+0x100/0x100 [ 878.152329][T26493] generic_perform_write+0x34c/0x570 [ 878.158597][T26493] ? grab_cache_page_write_begin+0xa0/0xa0 [ 878.166036][T26493] ? file_remove_privs+0x570/0x570 [ 878.172871][T26493] ? __kasan_check_write+0x14/0x20 [ 878.179656][T26493] __generic_file_write_iter+0x23c/0x560 [ 878.186169][T26493] ? generic_write_checks+0x3b9/0x470 [ 878.192817][T26493] generic_file_write_iter+0xaf/0x1c0 [ 878.199835][T26493] vfs_write+0xb4c/0xe70 [ 878.205939][T26493] ? kernel_write+0x3d0/0x3d0 [ 878.211089][T26493] ? mutex_trylock+0xa0/0xa0 [ 878.216278][T26493] ? __fdget_pos+0x2e7/0x3a0 [ 878.221039][T26493] ? ksys_write+0x77/0x2c0 [ 878.226101][T26493] ksys_write+0x199/0x2c0 [ 878.230611][T26493] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 878.237577][T26493] ? __ia32_sys_read+0x90/0x90 [ 878.242756][T26493] __x64_sys_write+0x7b/0x90 [ 878.247976][T26493] do_syscall_64+0x34/0x70 [ 878.252929][T26493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 878.259784][T26493] RIP: 0033:0x7f9452d989b9 [ 878.266271][T26493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 878.296421][T26493] RSP: 002b:00007f9451a16038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 878.307190][T26493] RAX: ffffffffffffffda RBX: 00007f9452f34f80 RCX: 00007f9452d989b9 [ 878.318022][T26493] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 878.329805][T26493] RBP: 00007f9451a16090 R08: 0000000000000000 R09: 0000000000000000 [ 878.339253][T26493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 878.347840][T26493] R13: 0000000000000000 R14: 00007f9452f34f80 R15: 00007ffdc7344a28 [ 878.757954][T26513] device veth1_macvtap left promiscuous mode [ 879.644737][T26545] FAULT_INJECTION: forcing a failure. [ 879.644737][T26545] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 879.660146][T26545] CPU: 1 PID: 26545 Comm: syz.1.7227 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 879.674689][T26545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 879.686552][T26545] Call Trace: [ 879.691731][T26545] dump_stack_lvl+0x1e2/0x24b [ 879.697423][T26545] ? bfq_pos_tree_add_move+0x43b/0x43b [ 879.705834][T26545] ? shmem_getpage_gfp+0x2226/0x2480 [ 879.713381][T26545] dump_stack+0x15/0x17 [ 879.718141][T26545] should_fail+0x3c6/0x510 [ 879.723270][T26545] should_fail_usercopy+0x1a/0x20 [ 879.728382][T26545] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 879.735684][T26545] ? shmem_getpage+0xa0/0xa0 [ 879.741860][T26545] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 879.749450][T26545] ? memzero_page+0x100/0x100 [ 879.755611][T26545] generic_perform_write+0x34c/0x570 [ 879.761618][T26545] ? grab_cache_page_write_begin+0xa0/0xa0 [ 879.769790][T26545] ? file_remove_privs+0x570/0x570 [ 879.777388][T26545] ? __kasan_check_write+0x14/0x20 [ 879.783086][T26545] __generic_file_write_iter+0x23c/0x560 [ 879.791864][T26545] ? generic_write_checks+0x3b9/0x470 [ 879.798931][T26545] generic_file_write_iter+0xaf/0x1c0 [ 879.808110][T26545] vfs_write+0xb4c/0xe70 [ 879.813217][T26545] ? kernel_write+0x3d0/0x3d0 [ 879.818247][T26545] ? mutex_trylock+0xa0/0xa0 [ 879.823434][T26545] ? __fdget_pos+0x2e7/0x3a0 [ 879.829082][T26545] ? ksys_write+0x77/0x2c0 [ 879.833893][T26545] ksys_write+0x199/0x2c0 [ 879.838797][T26545] ? __ia32_sys_read+0x90/0x90 [ 879.845004][T26545] ? debug_smp_processor_id+0x17/0x20 [ 879.851905][T26545] __x64_sys_write+0x7b/0x90 [ 879.857053][T26545] do_syscall_64+0x34/0x70 [ 879.861842][T26545] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 879.867931][T26545] RIP: 0033:0x7f3fcc4089b9 [ 879.872457][T26545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 879.894824][T26545] RSP: 002b:00007f3fcb086038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 879.904412][T26545] RAX: ffffffffffffffda RBX: 00007f3fcc5a4f80 RCX: 00007f3fcc4089b9 [ 879.916057][T26545] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 879.925927][T26545] RBP: 00007f3fcb086090 R08: 0000000000000000 R09: 0000000000000000 [ 879.937634][T26545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 879.948918][T26545] R13: 0000000000000000 R14: 00007f3fcc5a4f80 R15: 00007ffdd0e41688 [ 880.623771][ T24] audit: type=1400 audit(1723754281.400:183): avc: denied { create } for pid=26580 comm="syz.0.7241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 882.302935][T26712] device pim6reg1 entered promiscuous mode [ 882.408275][T26718] syz.4.7278[26718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 882.408411][T26718] syz.4.7278[26718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 882.501239][T26720] device veth1_macvtap entered promiscuous mode [ 882.562491][T26720] device macsec0 entered promiscuous mode [ 882.698644][ T2940] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 883.918702][T26796] device pim6reg1 entered promiscuous mode [ 885.483031][T26849] syzkaller0: tun_chr_ioctl cmd 35106 [ 885.713438][T26862] FAULT_INJECTION: forcing a failure. [ 885.713438][T26862] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 885.732776][T26862] CPU: 1 PID: 26862 Comm: syz.3.7316 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 885.749634][T26862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 885.763488][T26862] Call Trace: [ 885.767406][T26862] dump_stack_lvl+0x1e2/0x24b [ 885.772580][T26862] ? bfq_pos_tree_add_move+0x43b/0x43b [ 885.778912][T26862] ? shmem_getpage_gfp+0x2226/0x2480 [ 885.787713][T26862] dump_stack+0x15/0x17 [ 885.794773][T26862] should_fail+0x3c6/0x510 [ 885.800535][T26862] should_fail_usercopy+0x1a/0x20 [ 885.807557][T26862] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 885.815035][T26862] ? shmem_getpage+0xa0/0xa0 [ 885.820306][T26862] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 885.826964][T26862] ? memzero_page+0x100/0x100 [ 885.832098][T26862] generic_perform_write+0x34c/0x570 [ 885.838891][T26862] ? grab_cache_page_write_begin+0xa0/0xa0 [ 885.847293][T26862] ? file_remove_privs+0x570/0x570 [ 885.853133][T26862] ? __kasan_check_write+0x14/0x20 [ 885.859264][T26862] __generic_file_write_iter+0x23c/0x560 [ 885.868694][T26862] ? generic_write_checks+0x3b9/0x470 [ 885.874283][T26862] generic_file_write_iter+0xaf/0x1c0 [ 885.880959][T26862] vfs_write+0xb4c/0xe70 [ 885.885893][T26862] ? kernel_write+0x3d0/0x3d0 [ 885.892961][T26862] ? mutex_trylock+0xa0/0xa0 [ 885.899794][T26862] ? __fdget_pos+0x2e7/0x3a0 [ 885.905535][T26862] ? ksys_write+0x77/0x2c0 [ 885.910536][T26862] ksys_write+0x199/0x2c0 [ 885.915828][T26862] ? __ia32_sys_read+0x90/0x90 [ 885.920894][T26862] ? debug_smp_processor_id+0x17/0x20 [ 885.927401][T26862] __x64_sys_write+0x7b/0x90 [ 885.932562][T26862] do_syscall_64+0x34/0x70 [ 885.937509][T26862] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 885.944323][T26862] RIP: 0033:0x7f9452d989b9 [ 885.949535][T26862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 885.972798][T26862] RSP: 002b:00007f9451a16038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 885.982443][T26862] RAX: ffffffffffffffda RBX: 00007f9452f34f80 RCX: 00007f9452d989b9 [ 885.990905][T26862] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 886.000716][T26862] RBP: 00007f9451a16090 R08: 0000000000000000 R09: 0000000000000000 [ 886.010433][T26862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 886.021001][T26862] R13: 0000000000000000 R14: 00007f9452f34f80 R15: 00007ffdc7344a28 [ 886.789189][T26911] FAULT_INJECTION: forcing a failure. [ 886.789189][T26911] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 886.804708][T26911] CPU: 0 PID: 26911 Comm: syz.0.7327 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 886.819363][T26911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 886.829362][T26911] Call Trace: [ 886.832827][T26911] dump_stack_lvl+0x1e2/0x24b [ 886.837856][T26911] ? bfq_pos_tree_add_move+0x43b/0x43b [ 886.845801][T26911] ? shmem_getpage_gfp+0x2226/0x2480 [ 886.853561][T26911] dump_stack+0x15/0x17 [ 886.858439][T26911] should_fail+0x3c6/0x510 [ 886.863711][T26911] should_fail_usercopy+0x1a/0x20 [ 886.870234][T26911] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 886.876928][T26911] ? shmem_getpage+0xa0/0xa0 [ 886.885122][T26911] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 886.893547][T26911] ? memzero_page+0x100/0x100 [ 886.898974][T26911] generic_perform_write+0x34c/0x570 [ 886.906550][T26911] ? grab_cache_page_write_begin+0xa0/0xa0 [ 886.912956][T26911] ? file_remove_privs+0x570/0x570 [ 886.920050][T26911] ? __kasan_check_write+0x14/0x20 [ 886.927893][T26911] __generic_file_write_iter+0x23c/0x560 [ 886.934851][T26911] ? generic_write_checks+0x3b9/0x470 [ 886.941050][T26911] generic_file_write_iter+0xaf/0x1c0 [ 886.947225][T26911] vfs_write+0xb4c/0xe70 [ 886.951625][T26911] ? kernel_write+0x3d0/0x3d0 [ 886.957723][T26911] ? mutex_trylock+0xa0/0xa0 [ 886.963751][T26911] ? __fdget_pos+0x2e7/0x3a0 [ 886.968730][T26911] ? ksys_write+0x77/0x2c0 [ 886.973807][T26911] ksys_write+0x199/0x2c0 [ 886.978105][T26911] ? __ia32_sys_read+0x90/0x90 [ 886.983255][T26911] ? debug_smp_processor_id+0x17/0x20 [ 886.990020][T26911] __x64_sys_write+0x7b/0x90 [ 886.996696][T26911] do_syscall_64+0x34/0x70 [ 887.002599][T26911] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 887.010731][T26911] RIP: 0033:0x7fb8994009b9 [ 887.015595][T26911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 887.039868][T26911] RSP: 002b:00007fb89807e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 887.048796][T26911] RAX: ffffffffffffffda RBX: 00007fb89959cf80 RCX: 00007fb8994009b9 [ 887.058149][T26911] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 887.067473][T26911] RBP: 00007fb89807e090 R08: 0000000000000000 R09: 0000000000000000 [ 887.076691][T26911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 887.085497][T26911] R13: 0000000000000000 R14: 00007fb89959cf80 R15: 00007ffcd9e50fa8 [ 887.199713][T26913] device syzkaller0 entered promiscuous mode [ 887.559254][T26940] FAULT_INJECTION: forcing a failure. [ 887.559254][T26940] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 887.577051][T26940] CPU: 1 PID: 26940 Comm: syz.1.7338 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 887.593955][T26940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 887.607521][T26940] Call Trace: [ 887.611625][T26940] dump_stack_lvl+0x1e2/0x24b [ 887.617717][T26940] ? bfq_pos_tree_add_move+0x43b/0x43b [ 887.623954][T26940] ? shmem_getpage_gfp+0x2226/0x2480 [ 887.630910][T26940] dump_stack+0x15/0x17 [ 887.638019][T26940] should_fail+0x3c6/0x510 [ 887.642916][T26940] should_fail_usercopy+0x1a/0x20 [ 887.648729][T26940] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 887.654981][T26940] ? shmem_getpage+0xa0/0xa0 [ 887.659746][T26940] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 887.666742][T26940] ? memzero_page+0x100/0x100 [ 887.672546][T26940] generic_perform_write+0x34c/0x570 [ 887.679056][T26940] ? grab_cache_page_write_begin+0xa0/0xa0 [ 887.685173][T26940] ? file_remove_privs+0x570/0x570 [ 887.690374][T26940] ? __kasan_check_write+0x14/0x20 [ 887.695952][T26940] __generic_file_write_iter+0x23c/0x560 [ 887.703361][T26940] ? generic_write_checks+0x3b9/0x470 [ 887.710959][T26940] generic_file_write_iter+0xaf/0x1c0 [ 887.716829][T26940] vfs_write+0xb4c/0xe70 [ 887.722789][T26940] ? kernel_write+0x3d0/0x3d0 [ 887.728261][T26940] ? mutex_trylock+0xa0/0xa0 [ 887.733616][T26940] ? __fdget_pos+0x2e7/0x3a0 [ 887.738875][T26940] ? ksys_write+0x77/0x2c0 [ 887.744542][T26940] ksys_write+0x199/0x2c0 [ 887.750027][T26940] ? __ia32_sys_read+0x90/0x90 [ 887.755478][T26940] ? debug_smp_processor_id+0x17/0x20 [ 887.762000][T26940] __x64_sys_write+0x7b/0x90 [ 887.767721][T26940] do_syscall_64+0x34/0x70 [ 887.772585][T26940] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 887.778442][T26940] RIP: 0033:0x7f3fcc4089b9 [ 887.784443][T26940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 887.810090][T26940] RSP: 002b:00007f3fcb086038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 887.823256][T26940] RAX: ffffffffffffffda RBX: 00007f3fcc5a4f80 RCX: 00007f3fcc4089b9 [ 887.834523][T26940] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 887.843967][T26940] RBP: 00007f3fcb086090 R08: 0000000000000000 R09: 0000000000000000 [ 887.853886][T26940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 887.864167][T26940] R13: 0000000000000000 R14: 00007f3fcc5a4f80 R15: 00007ffdd0e41688 [ 888.037712][T26950] bridge_slave_0: mtu greater than device maximum [ 888.431900][ T24] audit: type=1400 audit(1723754289.200:184): avc: denied { create } for pid=26967 comm="syz.3.7346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 888.617806][T26979] FAULT_INJECTION: forcing a failure. [ 888.617806][T26979] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 888.634052][T26979] CPU: 0 PID: 26979 Comm: syz.0.7350 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 888.646026][T26979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 888.659916][T26979] Call Trace: [ 888.664737][T26979] dump_stack_lvl+0x1e2/0x24b [ 888.673938][T26979] ? bfq_pos_tree_add_move+0x43b/0x43b [ 888.681750][T26979] ? shmem_getpage_gfp+0x2226/0x2480 [ 888.688004][T26979] dump_stack+0x15/0x17 [ 888.693462][T26979] should_fail+0x3c6/0x510 [ 888.700603][T26979] should_fail_usercopy+0x1a/0x20 [ 888.706822][T26979] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 888.714826][T26979] ? shmem_getpage+0xa0/0xa0 [ 888.721077][T26979] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 888.727373][T26979] ? memzero_page+0x100/0x100 [ 888.732447][T26979] generic_perform_write+0x34c/0x570 [ 888.738350][T26979] ? grab_cache_page_write_begin+0xa0/0xa0 [ 888.745507][T26979] ? file_remove_privs+0x570/0x570 [ 888.752050][T26979] ? __kasan_check_write+0x14/0x20 [ 888.759286][T26979] __generic_file_write_iter+0x23c/0x560 [ 888.766489][T26979] ? generic_write_checks+0x3b9/0x470 [ 888.774890][T26979] generic_file_write_iter+0xaf/0x1c0 [ 888.783526][T26979] vfs_write+0xb4c/0xe70 [ 888.790783][T26979] ? kernel_write+0x3d0/0x3d0 [ 888.797449][T26979] ? mutex_trylock+0xa0/0xa0 [ 888.804084][T26979] ? __fdget_pos+0x2e7/0x3a0 [ 888.809660][T26979] ? ksys_write+0x77/0x2c0 [ 888.816707][T26979] ksys_write+0x199/0x2c0 [ 888.822587][T26979] ? __ia32_sys_read+0x90/0x90 [ 888.828695][T26979] ? debug_smp_processor_id+0x17/0x20 [ 888.833993][T26979] __x64_sys_write+0x7b/0x90 [ 888.839138][T26979] do_syscall_64+0x34/0x70 [ 888.843886][T26979] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 888.850689][T26979] RIP: 0033:0x7fb8994009b9 [ 888.855057][T26979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 888.877142][T26979] RSP: 002b:00007fb89807e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 888.886029][T26979] RAX: ffffffffffffffda RBX: 00007fb89959cf80 RCX: 00007fb8994009b9 [ 888.894122][T26979] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 888.903406][T26979] RBP: 00007fb89807e090 R08: 0000000000000000 R09: 0000000000000000 [ 888.913679][T26979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 888.924336][T26979] R13: 0000000000000000 R14: 00007fb89959cf80 R15: 00007ffcd9e50fa8 [ 889.075443][T26992] bridge0: port 3(veth0_to_batadv) entered blocking state [ 889.087763][T26992] bridge0: port 3(veth0_to_batadv) entered disabled state [ 889.111380][T26992] device veth0_to_batadv entered promiscuous mode [ 889.127475][T26992] bridge0: port 3(veth0_to_batadv) entered blocking state [ 889.135583][T26992] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 889.148716][T26999] device veth0_to_batadv left promiscuous mode [ 889.156375][T26999] bridge0: port 3(veth0_to_batadv) entered disabled state [ 889.401213][T27009] device bridge_slave_1 left promiscuous mode [ 889.434893][T27009] bridge0: port 2(bridge_slave_1) entered disabled state [ 889.470043][T27009] device bridge_slave_0 left promiscuous mode [ 889.506482][T27009] bridge0: port 1(bridge_slave_0) entered disabled state [ 889.928105][T27018] FAULT_INJECTION: forcing a failure. [ 889.928105][T27018] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 889.944783][T27018] CPU: 1 PID: 27018 Comm: syz.1.7363 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 889.958344][T27018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 889.970039][T27018] Call Trace: [ 889.973483][T27018] dump_stack_lvl+0x1e2/0x24b [ 889.978991][T27018] ? bfq_pos_tree_add_move+0x43b/0x43b [ 889.985462][T27018] ? shmem_getpage_gfp+0x2226/0x2480 [ 889.991131][T27018] dump_stack+0x15/0x17 [ 889.996618][T27018] should_fail+0x3c6/0x510 [ 890.001558][T27018] should_fail_usercopy+0x1a/0x20 [ 890.007818][T27018] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 890.014667][T27018] ? shmem_getpage+0xa0/0xa0 [ 890.020331][T27018] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 890.027513][T27018] ? memzero_page+0x100/0x100 [ 890.033421][T27018] generic_perform_write+0x34c/0x570 [ 890.038948][T27018] ? grab_cache_page_write_begin+0xa0/0xa0 [ 890.045544][T27018] ? file_remove_privs+0x570/0x570 [ 890.051531][T27018] ? __kasan_check_write+0x14/0x20 [ 890.056985][T27018] __generic_file_write_iter+0x23c/0x560 [ 890.063318][T27018] ? generic_write_checks+0x3b9/0x470 [ 890.069250][T27018] generic_file_write_iter+0xaf/0x1c0 [ 890.077660][T27018] vfs_write+0xb4c/0xe70 [ 890.086792][T27018] ? kernel_write+0x3d0/0x3d0 [ 890.093556][T27018] ? mutex_trylock+0xa0/0xa0 [ 890.100407][T27018] ? __fdget_pos+0x2e7/0x3a0 [ 890.105463][T27018] ? ksys_write+0x77/0x2c0 [ 890.109836][T27018] ksys_write+0x199/0x2c0 [ 890.114003][T27018] ? __ia32_sys_read+0x90/0x90 [ 890.120212][T27018] ? debug_smp_processor_id+0x17/0x20 [ 890.125852][T27018] __x64_sys_write+0x7b/0x90 [ 890.130886][T27018] do_syscall_64+0x34/0x70 [ 890.136569][T27018] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 890.144385][T27018] RIP: 0033:0x7f3fcc4089b9 [ 890.150227][T27018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 890.175622][T27018] RSP: 002b:00007f3fcb086038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 890.184892][T27018] RAX: ffffffffffffffda RBX: 00007f3fcc5a4f80 RCX: 00007f3fcc4089b9 [ 890.194043][T27018] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 890.203665][T27018] RBP: 00007f3fcb086090 R08: 0000000000000000 R09: 0000000000000000 [ 890.212415][T27018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 890.221418][T27018] R13: 0000000000000000 R14: 00007f3fcc5a4f80 R15: 00007ffdd0e41688 [ 890.650634][T27086] FAULT_INJECTION: forcing a failure. [ 890.650634][T27086] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 890.666288][T27086] CPU: 0 PID: 27086 Comm: syz.0.7377 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 890.678097][T27086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 890.688873][T27086] Call Trace: [ 890.692304][T27086] dump_stack_lvl+0x1e2/0x24b [ 890.698455][T27086] ? bfq_pos_tree_add_move+0x43b/0x43b [ 890.707487][T27086] ? shmem_getpage_gfp+0x2226/0x2480 [ 890.717141][T27086] dump_stack+0x15/0x17 [ 890.723259][T27086] should_fail+0x3c6/0x510 [ 890.731953][T27086] should_fail_usercopy+0x1a/0x20 [ 890.739096][T27086] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 890.749172][T27086] ? shmem_getpage+0xa0/0xa0 [ 890.755882][T27086] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 890.762753][T27086] ? memzero_page+0x100/0x100 [ 890.769247][T27086] generic_perform_write+0x34c/0x570 [ 890.775846][T27086] ? grab_cache_page_write_begin+0xa0/0xa0 [ 890.785860][T27086] ? file_remove_privs+0x570/0x570 [ 890.793697][T27086] ? __kasan_check_write+0x14/0x20 [ 890.801776][T27086] __generic_file_write_iter+0x23c/0x560 [ 890.809730][T27086] ? generic_write_checks+0x3b9/0x470 [ 890.820335][T27086] generic_file_write_iter+0xaf/0x1c0 [ 890.826426][T27086] vfs_write+0xb4c/0xe70 [ 890.833058][T27086] ? kernel_write+0x3d0/0x3d0 [ 890.840629][T27086] ? mutex_trylock+0xa0/0xa0 [ 890.846920][T27086] ? __fdget_pos+0x2e7/0x3a0 [ 890.854278][T27086] ? ksys_write+0x77/0x2c0 [ 890.858897][T27086] ksys_write+0x199/0x2c0 [ 890.865861][T27086] ? __ia32_sys_read+0x90/0x90 [ 890.873560][T27086] ? debug_smp_processor_id+0x17/0x20 [ 890.880759][T27086] __x64_sys_write+0x7b/0x90 [ 890.887813][T27086] do_syscall_64+0x34/0x70 [ 890.893763][T27086] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 890.900359][T27086] RIP: 0033:0x7fb8994009b9 [ 890.905680][T27086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 890.936624][T27086] RSP: 002b:00007fb89807e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 890.948465][T27086] RAX: ffffffffffffffda RBX: 00007fb89959cf80 RCX: 00007fb8994009b9 [ 890.960932][T27086] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 890.974012][T27086] RBP: 00007fb89807e090 R08: 0000000000000000 R09: 0000000000000000 [ 890.984051][T27086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 890.997378][T27086] R13: 0000000000000000 R14: 00007fb89959cf80 R15: 00007ffcd9e50fa8 [ 891.767377][T27129] FAULT_INJECTION: forcing a failure. [ 891.767377][T27129] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 891.789020][T27129] CPU: 1 PID: 27129 Comm: syz.2.7389 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 891.814719][T27129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 891.833159][T27129] Call Trace: [ 891.837900][T27129] dump_stack_lvl+0x1e2/0x24b [ 891.845613][T27129] ? bfq_pos_tree_add_move+0x43b/0x43b [ 891.856601][T27129] ? shmem_getpage_gfp+0x2226/0x2480 [ 891.863479][T27129] dump_stack+0x15/0x17 [ 891.868387][T27129] should_fail+0x3c6/0x510 [ 891.873140][T27129] should_fail_usercopy+0x1a/0x20 [ 891.879398][T27129] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 891.885660][T27129] ? shmem_getpage+0xa0/0xa0 [ 891.891043][T27129] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 891.897976][T27129] ? memzero_page+0x100/0x100 [ 891.903803][T27129] generic_perform_write+0x34c/0x570 [ 891.909886][T27129] ? grab_cache_page_write_begin+0xa0/0xa0 [ 891.915844][T27129] ? file_remove_privs+0x570/0x570 [ 891.922364][T27129] ? __kasan_check_write+0x14/0x20 [ 891.930156][T27129] __generic_file_write_iter+0x23c/0x560 [ 891.937180][T27129] ? generic_write_checks+0x3b9/0x470 [ 891.943404][T27129] generic_file_write_iter+0xaf/0x1c0 [ 891.949984][T27129] vfs_write+0xb4c/0xe70 [ 891.955025][T27129] ? kernel_write+0x3d0/0x3d0 [ 891.960427][T27129] ? mutex_trylock+0xa0/0xa0 [ 891.966284][T27129] ? __fdget_pos+0x2e7/0x3a0 [ 891.972795][T27129] ? ksys_write+0x77/0x2c0 [ 891.977567][T27129] ksys_write+0x199/0x2c0 [ 891.983283][T27129] ? __ia32_sys_read+0x90/0x90 [ 891.989367][T27129] ? debug_smp_processor_id+0x17/0x20 [ 892.002444][T27129] __x64_sys_write+0x7b/0x90 [ 892.008394][T27129] do_syscall_64+0x34/0x70 [ 892.013946][T27129] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 892.020162][T27129] RIP: 0033:0x7ff1d399f9b9 [ 892.024683][T27129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 892.046948][T27129] RSP: 002b:00007ff1d261d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 892.056401][T27129] RAX: ffffffffffffffda RBX: 00007ff1d3b3bf80 RCX: 00007ff1d399f9b9 [ 892.066290][T27129] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 892.075620][T27129] RBP: 00007ff1d261d090 R08: 0000000000000000 R09: 0000000000000000 [ 892.085317][T27129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 892.094947][T27129] R13: 0000000000000000 R14: 00007ff1d3b3bf80 R15: 00007ffc7530e9f8 [ 893.112440][T27183] FAULT_INJECTION: forcing a failure. [ 893.112440][T27183] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 893.128785][T27183] CPU: 1 PID: 27183 Comm: syz.0.7401 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 893.145097][T27183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 893.158727][T27183] Call Trace: [ 893.162913][T27183] dump_stack_lvl+0x1e2/0x24b [ 893.169459][T27183] ? bfq_pos_tree_add_move+0x43b/0x43b [ 893.176783][T27183] ? shmem_getpage_gfp+0x2226/0x2480 [ 893.182941][T27183] dump_stack+0x15/0x17 [ 893.188608][T27183] should_fail+0x3c6/0x510 [ 893.195565][T27183] should_fail_usercopy+0x1a/0x20 [ 893.202528][T27183] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 893.210383][T27183] ? shmem_getpage+0xa0/0xa0 [ 893.217354][T27183] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 893.225787][T27183] ? memzero_page+0x100/0x100 [ 893.231556][T27183] generic_perform_write+0x34c/0x570 [ 893.239515][T27183] ? grab_cache_page_write_begin+0xa0/0xa0 [ 893.248097][T27183] ? file_remove_privs+0x570/0x570 [ 893.254065][T27183] ? __kasan_check_write+0x14/0x20 [ 893.260851][T27183] __generic_file_write_iter+0x23c/0x560 [ 893.270932][T27183] ? generic_write_checks+0x3b9/0x470 [ 893.278263][T27183] generic_file_write_iter+0xaf/0x1c0 [ 893.286868][T27183] vfs_write+0xb4c/0xe70 [ 893.293243][T27183] ? kernel_write+0x3d0/0x3d0 [ 893.301758][T27183] ? mutex_trylock+0xa0/0xa0 [ 893.308279][T27183] ? __fdget_pos+0x2e7/0x3a0 [ 893.313993][T27183] ? ksys_write+0x77/0x2c0 [ 893.325440][T27183] ksys_write+0x199/0x2c0 [ 893.334568][T27183] ? __ia32_sys_read+0x90/0x90 [ 893.348972][T27183] ? debug_smp_processor_id+0x17/0x20 [ 893.355735][T27183] __x64_sys_write+0x7b/0x90 [ 893.360256][T27183] do_syscall_64+0x34/0x70 [ 893.364697][T27183] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 893.371558][T27183] RIP: 0033:0x7fb8994009b9 [ 893.378622][T27183] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 893.404931][T27183] RSP: 002b:00007fb89807e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 893.415940][T27183] RAX: ffffffffffffffda RBX: 00007fb89959cf80 RCX: 00007fb8994009b9 [ 893.425805][T27183] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 893.436741][T27183] RBP: 00007fb89807e090 R08: 0000000000000000 R09: 0000000000000000 [ 893.447153][T27183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 893.458989][T27183] R13: 0000000000000000 R14: 00007fb89959cf80 R15: 00007ffcd9e50fa8 [ 893.926439][T27191] bridge0: port 1(bridge_slave_0) entered blocking state [ 893.941649][T27191] bridge0: port 1(bridge_slave_0) entered disabled state [ 893.960524][T27191] device bridge_slave_0 entered promiscuous mode [ 894.012155][T27191] bridge0: port 2(bridge_slave_1) entered blocking state [ 894.050727][T27191] bridge0: port 2(bridge_slave_1) entered disabled state [ 894.091697][T27191] device bridge_slave_1 entered promiscuous mode [ 894.366321][T27191] bridge0: port 2(bridge_slave_1) entered blocking state [ 894.376153][T27191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 894.384929][T27191] bridge0: port 1(bridge_slave_0) entered blocking state [ 894.394328][T27191] bridge0: port 1(bridge_slave_0) entered forwarding state [ 894.433094][ T460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 894.448508][ T460] bridge0: port 1(bridge_slave_0) entered disabled state [ 894.497611][ T460] bridge0: port 2(bridge_slave_1) entered disabled state [ 894.560014][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 894.612375][ T2947] bridge0: port 1(bridge_slave_0) entered blocking state [ 894.620975][ T2947] bridge0: port 1(bridge_slave_0) entered forwarding state [ 894.633509][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 894.645819][ T2947] bridge0: port 2(bridge_slave_1) entered blocking state [ 894.653807][ T2947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 894.683188][ T2156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 894.736388][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 894.752007][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 894.821290][ T2156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 894.874371][ T2156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 894.937661][T27191] device veth0_vlan entered promiscuous mode [ 894.968556][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 894.979594][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 895.007686][T27191] device veth1_macvtap entered promiscuous mode [ 895.016178][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 895.025575][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 895.104942][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 895.116304][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 895.128352][ T2947] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 895.187474][T27248] device veth0_vlan left promiscuous mode [ 895.215454][T27248] device veth0_vlan entered promiscuous mode [ 895.285384][T18132] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 895.339815][T18132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 895.394661][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 895.406402][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 896.002395][ C0] Illegal XDP return value 16128, expect packet loss! [ 897.377850][T27323] ªªªªªª: renamed from vlan0 [ 897.464078][T27334] device pim6reg1 entered promiscuous mode [ 899.219389][T27372] syz.4.7458[27372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 899.219461][T27372] syz.4.7458[27372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 899.252782][T27375] FAULT_INJECTION: forcing a failure. [ 899.252782][T27375] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 899.285488][T27375] CPU: 0 PID: 27375 Comm: syz.2.7459 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 899.300823][T27375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 899.312556][T27375] Call Trace: [ 899.316615][T27375] dump_stack_lvl+0x1e2/0x24b [ 899.321724][T27375] ? bfq_pos_tree_add_move+0x43b/0x43b [ 899.329873][T27375] ? shmem_getpage_gfp+0x2226/0x2480 [ 899.339260][T27375] dump_stack+0x15/0x17 [ 899.346952][T27375] should_fail+0x3c6/0x510 [ 899.352691][T27375] should_fail_usercopy+0x1a/0x20 [ 899.359010][T27375] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 899.368199][T27375] ? shmem_getpage+0xa0/0xa0 [ 899.374052][T27375] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 899.381246][T27375] ? memzero_page+0x100/0x100 [ 899.388882][T27375] generic_perform_write+0x34c/0x570 [ 899.397848][T27375] ? grab_cache_page_write_begin+0xa0/0xa0 [ 899.405863][T27375] ? file_remove_privs+0x570/0x570 [ 899.414095][T27375] ? __kasan_check_write+0x14/0x20 [ 899.420601][T27375] __generic_file_write_iter+0x23c/0x560 [ 899.427870][T27375] ? generic_write_checks+0x3b9/0x470 [ 899.433574][T27375] generic_file_write_iter+0xaf/0x1c0 [ 899.440282][T27375] vfs_write+0xb4c/0xe70 [ 899.446045][T27375] ? kernel_write+0x3d0/0x3d0 [ 899.452048][T27375] ? mutex_trylock+0xa0/0xa0 [ 899.458721][T27375] ? __fdget_pos+0x2e7/0x3a0 [ 899.466264][T27375] ? ksys_write+0x77/0x2c0 [ 899.473209][T27375] ksys_write+0x199/0x2c0 [ 899.478569][T27375] ? __ia32_sys_read+0x90/0x90 [ 899.485632][T27375] ? debug_smp_processor_id+0x17/0x20 [ 899.499367][T27375] __x64_sys_write+0x7b/0x90 [ 899.508178][T27375] do_syscall_64+0x34/0x70 [ 899.514272][T27375] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 899.522584][T27375] RIP: 0033:0x7ff1d399f9b9 [ 899.531199][T27375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 899.561029][T27375] RSP: 002b:00007ff1d261d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 899.572979][T27375] RAX: ffffffffffffffda RBX: 00007ff1d3b3bf80 RCX: 00007ff1d399f9b9 [ 899.583028][T27375] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 899.594857][T27375] RBP: 00007ff1d261d090 R08: 0000000000000000 R09: 0000000000000000 [ 899.607844][T27375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 899.619772][T27375] R13: 0000000000000000 R14: 00007ff1d3b3bf80 R15: 00007ffc7530e9f8 [ 900.313498][T27422] FAULT_INJECTION: forcing a failure. [ 900.313498][T27422] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 900.339102][T27422] CPU: 1 PID: 27422 Comm: syz.2.7471 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 900.353419][T27422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 900.365412][T27422] Call Trace: [ 900.369661][T27422] dump_stack_lvl+0x1e2/0x24b [ 900.375608][T27422] ? bfq_pos_tree_add_move+0x43b/0x43b [ 900.382300][T27422] ? shmem_getpage_gfp+0x2226/0x2480 [ 900.387999][T27422] dump_stack+0x15/0x17 [ 900.392688][T27422] should_fail+0x3c6/0x510 [ 900.398328][T27422] should_fail_usercopy+0x1a/0x20 [ 900.404775][T27422] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 900.412112][T27422] ? shmem_getpage+0xa0/0xa0 [ 900.416599][T27422] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 900.422485][T27422] ? memzero_page+0x100/0x100 [ 900.427206][T27422] generic_perform_write+0x34c/0x570 [ 900.433017][T27422] ? grab_cache_page_write_begin+0xa0/0xa0 [ 900.439710][T27422] ? file_remove_privs+0x570/0x570 [ 900.445181][T27422] ? __kasan_check_write+0x14/0x20 [ 900.450712][T27422] __generic_file_write_iter+0x23c/0x560 [ 900.458216][T27422] ? generic_write_checks+0x3b9/0x470 [ 900.465199][T27422] generic_file_write_iter+0xaf/0x1c0 [ 900.470598][T27422] vfs_write+0xb4c/0xe70 [ 900.476285][T27422] ? kernel_write+0x3d0/0x3d0 [ 900.482239][T27422] ? mutex_trylock+0xa0/0xa0 [ 900.488247][T27422] ? __fdget_pos+0x2e7/0x3a0 [ 900.494150][T27422] ? ksys_write+0x77/0x2c0 [ 900.499326][T27422] ksys_write+0x199/0x2c0 [ 900.504075][T27422] ? __ia32_sys_read+0x90/0x90 [ 900.510661][T27422] ? debug_smp_processor_id+0x17/0x20 [ 900.516815][T27422] __x64_sys_write+0x7b/0x90 [ 900.522409][T27422] do_syscall_64+0x34/0x70 [ 900.528754][T27422] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 900.537571][T27422] RIP: 0033:0x7ff1d399f9b9 [ 900.543834][T27422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 900.571635][T27422] RSP: 002b:00007ff1d261d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 900.586364][T27422] RAX: ffffffffffffffda RBX: 00007ff1d3b3bf80 RCX: 00007ff1d399f9b9 [ 900.598474][T27422] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 900.610165][T27422] RBP: 00007ff1d261d090 R08: 0000000000000000 R09: 0000000000000000 [ 900.621217][T27422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 900.633389][T27422] R13: 0000000000000000 R14: 00007ff1d3b3bf80 R15: 00007ffc7530e9f8 [ 900.675183][T27423] device wg2 entered promiscuous mode [ 901.247718][T27434] device syzkaller0 entered promiscuous mode [ 901.779669][T27493] device veth0_vlan left promiscuous mode [ 901.831473][T27493] device veth0_vlan entered promiscuous mode [ 901.928270][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 901.982945][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 902.152717][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 902.626338][T27511] device syzkaller0 entered promiscuous mode [ 902.899702][T27547] device pim6reg1 entered promiscuous mode [ 904.293741][T27637] FAULT_INJECTION: forcing a failure. [ 904.293741][T27637] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 904.323543][T27637] CPU: 0 PID: 27637 Comm: syz.4.7526 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 904.341436][T27637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 904.359617][T27637] Call Trace: [ 904.366659][T27637] dump_stack_lvl+0x1e2/0x24b [ 904.373281][T27637] ? bfq_pos_tree_add_move+0x43b/0x43b [ 904.379532][T27637] ? shmem_getpage_gfp+0x2226/0x2480 [ 904.388485][T27637] dump_stack+0x15/0x17 [ 904.393070][T27637] should_fail+0x3c6/0x510 [ 904.398631][T27637] should_fail_usercopy+0x1a/0x20 [ 904.403972][T27637] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 904.411801][T27637] ? shmem_getpage+0xa0/0xa0 [ 904.416461][T27637] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 904.422984][T27637] ? memzero_page+0x100/0x100 [ 904.428223][T27637] generic_perform_write+0x34c/0x570 [ 904.435170][T27637] ? grab_cache_page_write_begin+0xa0/0xa0 [ 904.442463][T27637] ? file_remove_privs+0x570/0x570 [ 904.448413][T27637] ? __kasan_check_write+0x14/0x20 [ 904.454303][T27637] __generic_file_write_iter+0x23c/0x560 [ 904.461632][T27637] ? generic_write_checks+0x3b9/0x470 [ 904.467262][T27637] generic_file_write_iter+0xaf/0x1c0 [ 904.473413][T27637] vfs_write+0xb4c/0xe70 [ 904.479310][T27637] ? kernel_write+0x3d0/0x3d0 [ 904.484948][T27637] ? mutex_trylock+0xa0/0xa0 [ 904.490889][T27637] ? __fdget_pos+0x2e7/0x3a0 [ 904.498704][T27637] ? ksys_write+0x77/0x2c0 [ 904.504483][T27637] ksys_write+0x199/0x2c0 [ 904.509832][T27637] ? __ia32_sys_read+0x90/0x90 [ 904.515721][T27637] ? debug_smp_processor_id+0x17/0x20 [ 904.523476][T27637] __x64_sys_write+0x7b/0x90 [ 904.529611][T27637] do_syscall_64+0x34/0x70 [ 904.535193][T27637] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 904.543104][T27637] RIP: 0033:0x7feab6b139b9 [ 904.548837][T27637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 904.576959][T27637] RSP: 002b:00007feab5791038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 904.590507][T27637] RAX: ffffffffffffffda RBX: 00007feab6caff80 RCX: 00007feab6b139b9 [ 904.601134][T27637] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 904.611859][T27637] RBP: 00007feab5791090 R08: 0000000000000000 R09: 0000000000000000 [ 904.623927][T27637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 904.636273][T27637] R13: 0000000000000000 R14: 00007feab6caff80 R15: 00007ffeb5901c98 [ 905.141316][T27674] FAULT_INJECTION: forcing a failure. [ 905.141316][T27674] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 905.159309][T27674] CPU: 0 PID: 27674 Comm: syz.3.7540 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 905.174944][T27674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 905.189983][T27674] Call Trace: [ 905.195401][T27674] dump_stack_lvl+0x1e2/0x24b [ 905.203260][T27674] ? bfq_pos_tree_add_move+0x43b/0x43b [ 905.209558][T27674] ? shmem_getpage_gfp+0x2226/0x2480 [ 905.215478][T27674] dump_stack+0x15/0x17 [ 905.220150][T27674] should_fail+0x3c6/0x510 [ 905.226175][T27674] should_fail_usercopy+0x1a/0x20 [ 905.232581][T27674] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 905.240276][T27674] ? shmem_getpage+0xa0/0xa0 [ 905.246692][T27674] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 905.253550][T27674] ? memzero_page+0x100/0x100 [ 905.260448][T27674] generic_perform_write+0x34c/0x570 [ 905.266584][T27674] ? grab_cache_page_write_begin+0xa0/0xa0 [ 905.273360][T27674] ? file_remove_privs+0x570/0x570 [ 905.279249][T27674] ? __kasan_check_write+0x14/0x20 [ 905.286952][T27674] __generic_file_write_iter+0x23c/0x560 [ 905.293367][T27674] ? generic_write_checks+0x3b9/0x470 [ 905.301172][T27674] generic_file_write_iter+0xaf/0x1c0 [ 905.308372][T27674] vfs_write+0xb4c/0xe70 [ 905.314234][T27674] ? kernel_write+0x3d0/0x3d0 [ 905.323630][T27674] ? mutex_trylock+0xa0/0xa0 [ 905.330344][T27674] ? __fdget_pos+0x2e7/0x3a0 [ 905.338102][T27674] ? ksys_write+0x77/0x2c0 [ 905.345545][T27674] ksys_write+0x199/0x2c0 [ 905.350273][T27674] ? __ia32_sys_read+0x90/0x90 [ 905.355628][T27674] ? debug_smp_processor_id+0x17/0x20 [ 905.361782][T27674] __x64_sys_write+0x7b/0x90 [ 905.367302][T27674] do_syscall_64+0x34/0x70 [ 905.373717][T27674] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 905.381957][T27674] RIP: 0033:0x7f9452d989b9 [ 905.390397][T27674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 905.418205][T27674] RSP: 002b:00007f9451a16038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 905.430760][T27674] RAX: ffffffffffffffda RBX: 00007f9452f34f80 RCX: 00007f9452d989b9 [ 905.442292][T27674] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 905.452479][T27674] RBP: 00007f9451a16090 R08: 0000000000000000 R09: 0000000000000000 [ 905.465211][T27674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 905.477498][T27674] R13: 0000000000000000 R14: 00007f9452f34f80 R15: 00007ffdc7344a28 [ 905.979552][T27682] device syzkaller0 entered promiscuous mode [ 906.375101][T27701] device veth1_macvtap left promiscuous mode [ 906.799239][T27683] bridge0: port 1(bridge_slave_0) entered blocking state [ 906.833564][T27683] bridge0: port 1(bridge_slave_0) entered disabled state [ 906.848253][T27683] device bridge_slave_0 entered promiscuous mode [ 906.920443][T27683] bridge0: port 2(bridge_slave_1) entered blocking state [ 906.945679][T27683] bridge0: port 2(bridge_slave_1) entered disabled state [ 906.953283][T27683] device bridge_slave_1 entered promiscuous mode [ 907.155016][T27722] FAULT_INJECTION: forcing a failure. [ 907.155016][T27722] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 907.171739][T27722] CPU: 1 PID: 27722 Comm: syz.0.7555 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 907.185342][T27722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 907.197716][T27722] Call Trace: [ 907.201366][T27722] dump_stack_lvl+0x1e2/0x24b [ 907.207014][T27722] ? bfq_pos_tree_add_move+0x43b/0x43b [ 907.213125][T27722] ? shmem_getpage_gfp+0x2226/0x2480 [ 907.219130][T27722] dump_stack+0x15/0x17 [ 907.223865][T27722] should_fail+0x3c6/0x510 [ 907.228559][T27722] should_fail_usercopy+0x1a/0x20 [ 907.235025][T27722] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 907.241882][T27722] ? shmem_getpage+0xa0/0xa0 [ 907.247477][T27722] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 907.254379][T27722] ? memzero_page+0x100/0x100 [ 907.259690][T27722] generic_perform_write+0x34c/0x570 [ 907.265478][T27722] ? grab_cache_page_write_begin+0xa0/0xa0 [ 907.271882][T27722] ? file_remove_privs+0x570/0x570 [ 907.277647][T27722] ? __kasan_check_write+0x14/0x20 [ 907.283812][T27722] __generic_file_write_iter+0x23c/0x560 [ 907.291304][T27722] ? generic_write_checks+0x3b9/0x470 [ 907.297462][T27722] generic_file_write_iter+0xaf/0x1c0 [ 907.304451][T27722] vfs_write+0xb4c/0xe70 [ 907.310620][T27722] ? kernel_write+0x3d0/0x3d0 [ 907.317795][T27722] ? mutex_trylock+0xa0/0xa0 [ 907.325489][T27722] ? __fdget_pos+0x2e7/0x3a0 [ 907.331913][T27722] ? ksys_write+0x77/0x2c0 [ 907.337794][T27722] ksys_write+0x199/0x2c0 [ 907.344029][T27722] ? __ia32_sys_read+0x90/0x90 [ 907.349800][T27722] ? debug_smp_processor_id+0x17/0x20 [ 907.355673][T27722] __x64_sys_write+0x7b/0x90 [ 907.360725][T27722] do_syscall_64+0x34/0x70 [ 907.366283][T27722] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 907.373054][T27722] RIP: 0033:0x7fb8994009b9 [ 907.378350][T27722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 907.402917][T27722] RSP: 002b:00007fb89807e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 907.414173][T27722] RAX: ffffffffffffffda RBX: 00007fb89959cf80 RCX: 00007fb8994009b9 [ 907.423655][T27722] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 907.433842][T27722] RBP: 00007fb89807e090 R08: 0000000000000000 R09: 0000000000000000 [ 907.443238][T27722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 907.451893][T27722] R13: 0000000000000000 R14: 00007fb89959cf80 R15: 00007ffcd9e50fa8 [ 907.757861][T18129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 907.792020][T18129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 907.822631][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 907.835985][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 907.854064][T18123] bridge0: port 1(bridge_slave_0) entered blocking state [ 907.863255][T18123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 907.885282][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 907.895563][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 907.908327][T18123] bridge0: port 2(bridge_slave_1) entered blocking state [ 907.917180][T18123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 907.949298][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 907.964397][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 908.024669][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 908.035781][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 908.171091][T27736] device pim6reg1 entered promiscuous mode [ 908.184285][T27683] device veth0_vlan entered promiscuous mode [ 908.194751][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 908.206786][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 908.218305][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 908.229232][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 908.242876][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 908.253437][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 909.912070][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 909.923610][T18123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 909.950913][T27683] device veth1_macvtap entered promiscuous mode [ 910.039453][T27762] device veth0_vlan left promiscuous mode [ 910.057042][T27762] device veth0_vlan entered promiscuous mode [ 910.090482][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 910.121969][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 910.154096][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 910.163932][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 910.173279][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 910.183144][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 910.193947][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 910.203915][T18117] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 910.673499][T27774] FAULT_INJECTION: forcing a failure. [ 910.673499][T27774] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 910.690787][T27774] CPU: 0 PID: 27774 Comm: syz.3.7567 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 910.706951][T27774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 910.724075][T27774] Call Trace: [ 910.730167][T27774] dump_stack_lvl+0x1e2/0x24b [ 910.737918][T27776] device pim6reg1 entered promiscuous mode [ 910.743374][T27774] ? bfq_pos_tree_add_move+0x43b/0x43b [ 910.743389][T27774] ? shmem_getpage_gfp+0x2226/0x2480 [ 910.743411][T27774] dump_stack+0x15/0x17 [ 910.743422][T27774] should_fail+0x3c6/0x510 [ 910.743433][T27774] should_fail_usercopy+0x1a/0x20 [ 910.743446][T27774] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 910.743457][T27774] ? shmem_getpage+0xa0/0xa0 [ 910.743468][T27774] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 910.743479][T27774] ? memzero_page+0x100/0x100 [ 910.743578][T27774] generic_perform_write+0x34c/0x570 [ 910.743609][T27774] ? grab_cache_page_write_begin+0xa0/0xa0 [ 910.743621][T27774] ? file_remove_privs+0x570/0x570 [ 910.743635][T27774] ? __kasan_check_write+0x14/0x20 [ 910.743647][T27774] __generic_file_write_iter+0x23c/0x560 [ 910.743659][T27774] ? generic_write_checks+0x3b9/0x470 [ 910.743673][T27774] generic_file_write_iter+0xaf/0x1c0 [ 910.743685][T27774] vfs_write+0xb4c/0xe70 [ 910.743700][T27774] ? kernel_write+0x3d0/0x3d0 [ 910.743715][T27774] ? mutex_trylock+0xa0/0xa0 [ 910.743730][T27774] ? __fdget_pos+0x2e7/0x3a0 [ 910.743739][T27774] ? ksys_write+0x77/0x2c0 [ 910.743749][T27774] ksys_write+0x199/0x2c0 [ 910.743761][T27774] ? __ia32_sys_read+0x90/0x90 [ 910.743775][T27774] ? debug_smp_processor_id+0x17/0x20 [ 910.743785][T27774] __x64_sys_write+0x7b/0x90 [ 910.743794][T27774] do_syscall_64+0x34/0x70 [ 910.743807][T27774] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 910.743818][T27774] RIP: 0033:0x7f9452d989b9 [ 910.743832][T27774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 910.743839][T27774] RSP: 002b:00007f9451a16038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 910.743854][T27774] RAX: ffffffffffffffda RBX: 00007f9452f34f80 RCX: 00007f9452d989b9 [ 910.743862][T27774] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000009 [ 910.743869][T27774] RBP: 00007f9451a16090 R08: 0000000000000000 R09: 0000000000000000 [ 910.744313][T27774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 910.744325][T27774] R13: 0000000000000000 R14: 00007f9452f34f80 R15: 00007ffdc7344a28 [ 911.213305][T27779] device veth0_vlan left promiscuous mode [ 911.231043][T27779] device veth0_vlan entered promiscuous mode [ 911.496597][T27799] device pim6reg1 entered promiscuous mode [ 911.633997][T27808] bridge0: port 3(veth0_vlan) entered blocking state [ 911.642730][T27808] bridge0: port 3(veth0_vlan) entered disabled state [ 911.653238][T27808] bridge0: port 3(veth0_vlan) entered blocking state [ 911.666337][T27808] bridge0: port 3(veth0_vlan) entered forwarding state [ 914.756152][T27884] bridge0: port 3(veth0_vlan) entered disabled state [ 914.907663][T27884] device syzkaller0 entered promiscuous mode [ 916.822168][T27955] device pim6reg1 entered promiscuous mode [ 916.864555][T27933] bridge0: port 1(bridge_slave_0) entered blocking state [ 916.884702][T27933] bridge0: port 1(bridge_slave_0) entered disabled state [ 916.906817][T27933] device bridge_slave_0 entered promiscuous mode [ 916.971736][T27933] bridge0: port 2(bridge_slave_1) entered blocking state [ 917.005738][T27933] bridge0: port 2(bridge_slave_1) entered disabled state [ 917.022710][T27933] device bridge_slave_1 entered promiscuous mode [ 917.230614][T27933] bridge0: port 2(bridge_slave_1) entered blocking state [ 917.241004][T27933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 917.249242][T27933] bridge0: port 1(bridge_slave_0) entered blocking state [ 917.257907][T27933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 917.484539][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 917.502539][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 917.534824][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 917.562092][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 917.604505][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 917.654927][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 917.724887][T27980] device syzkaller0 entered promiscuous mode [ 917.754556][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 917.907979][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 917.920885][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 917.931357][T27933] device veth0_vlan entered promiscuous mode [ 917.958929][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 917.968396][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 917.981246][T27933] device veth1_macvtap entered promiscuous mode [ 918.038700][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 918.052061][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 918.063831][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 918.131307][T27997] device veth0_vlan left promiscuous mode [ 918.150979][T27997] device veth0_vlan entered promiscuous mode [ 918.301342][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 918.317681][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 918.331399][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 918.341884][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 920.183633][T28102] device veth1_macvtap left promiscuous mode [ 920.628058][T28130] device syzkaller0 entered promiscuous mode [ 921.595243][T28183] device veth1_macvtap left promiscuous mode [ 922.669404][T28236] device syzkaller0 entered promiscuous mode [ 922.703766][T28240] syz.3.7687[28240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 922.703924][T28240] syz.3.7687[28240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 923.239348][T28257] syz.3.7691[28257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 923.311741][T28257] syz.3.7691[28257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 923.356662][T28257] syz.3.7691[28257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 923.494093][T28257] syz.3.7691[28257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 924.250421][T28312] device pim6reg1 entered promiscuous mode [ 927.605610][T28424] device sit0 entered promiscuous mode [ 928.045871][T28453] bridge0: port 2(bridge_slave_1) entered disabled state [ 928.055727][T28453] bridge0: port 1(bridge_slave_0) entered disabled state [ 928.067557][T28453] device bridge0 left promiscuous mode [ 928.078707][T28453] device bridge_slave_1 left promiscuous mode [ 928.088051][T28453] bridge0: port 2(bridge_slave_1) entered disabled state [ 928.123202][T28453] device bridge_slave_0 left promiscuous mode [ 928.165764][T28453] bridge0: port 1(bridge_slave_0) entered disabled state [ 931.948323][T28691] device pim6reg1 entered promiscuous mode [ 932.940714][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 932.963331][ T2902] bridge0: port 3(veth0_vlan) entered blocking state [ 932.971955][ T2902] bridge0: port 3(veth0_vlan) entered forwarding state [ 932.996965][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 933.011150][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 933.848460][T28808] device veth0_vlan left promiscuous mode [ 933.860044][T28808] device veth0_vlan entered promiscuous mode [ 933.928096][T18120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 933.949673][T18120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 933.965089][T18120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 934.069150][ T9] device bridge_slave_1 left promiscuous mode [ 934.089427][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 934.141459][ T9] device bridge_slave_0 left promiscuous mode [ 934.155785][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 934.184617][ T9] device veth1_macvtap left promiscuous mode [ 934.322672][T28824] device pim6reg1 entered promiscuous mode [ 934.358154][T28843] device sit0 entered promiscuous mode [ 934.943888][T28862] device pim6reg1 entered promiscuous mode [ 935.453548][T28891] syz.3.7874[28891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 935.453658][T28891] syz.3.7874[28891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 935.784657][T28886] device syzkaller0 entered promiscuous mode [ 936.050592][T28909] device syzkaller0 entered promiscuous mode [ 936.583624][T28945] device pim6reg1 entered promiscuous mode [ 937.485788][T28987] device pim6reg1 entered promiscuous mode [ 937.610409][T28998] device pim6reg1 entered promiscuous mode [ 940.464024][T29135] device pim6reg1 entered promiscuous mode [ 940.570295][T29146] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 940.580107][T29146] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 940.597057][T29146] syzkaller0: linktype set to 65535 [ 941.479464][T29204] device syzkaller0 entered promiscuous mode [ 942.375249][T29258] device syzkaller0 entered promiscuous mode [ 943.195993][T29309] device vxcan1 entered promiscuous mode [ 943.736913][T29343] device pim6reg1 entered promiscuous mode [ 945.729628][T29450] device syzkaller0 entered promiscuous mode [ 947.339747][T29544] device pim6reg1 entered promiscuous mode [ 947.734385][T29552] device syzkaller0 entered promiscuous mode [ 951.473060][T29745] syz.4.8103[29745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 951.473118][T29745] syz.4.8103[29745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 951.623789][T29764] device sit0 left promiscuous mode [ 951.802790][T29770] device sit0 entered promiscuous mode [ 952.029737][T29771] device veth0_vlan left promiscuous mode [ 952.044669][T29771] device veth0_vlan entered promiscuous mode [ 952.337223][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 952.347721][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 952.356484][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 953.066809][T29806] device dummy0 entered promiscuous mode [ 953.229835][T29819] syz.0.8122[29819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 953.229902][T29819] syz.0.8122[29819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 953.770704][T29865] device wg2 left promiscuous mode [ 956.601120][T30040] bridge0: port 2(bridge_slave_1) entered disabled state [ 956.608731][T30040] bridge0: port 1(bridge_slave_0) entered disabled state [ 959.191214][T30120] bridge0: port 3(gretap0) entered blocking state [ 959.239018][T30120] bridge0: port 3(gretap0) entered disabled state [ 959.256409][T30120] device gretap0 entered promiscuous mode [ 959.506521][T30137] device sit0 entered promiscuous mode [ 960.651423][T30212] device veth1_macvtap entered promiscuous mode [ 960.681163][T30212] device macsec0 entered promiscuous mode [ 960.816388][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 963.930707][T30371] device veth0_vlan left promiscuous mode [ 963.973305][T30371] device veth0_vlan entered promiscuous mode [ 964.066805][ T9026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 964.177254][ T9026] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 964.414660][ T9026] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 967.115604][T30477] device veth0_vlan left promiscuous mode [ 967.138959][T30477] device veth0_vlan entered promiscuous mode [ 967.312271][ T1089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 967.364332][ T1089] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 967.402131][ T1089] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 972.221228][T30678] device sit0 left promiscuous mode [ 972.233702][T30680] syz.4.8361[30680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 972.233779][T30680] syz.4.8361[30680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 981.024922][T30939] device veth0_vlan left promiscuous mode [ 981.058188][T30939] device veth0_vlan entered promiscuous mode [ 981.087050][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 981.116787][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 981.130733][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 984.896522][T31011] ªªªªªª: renamed from vlan0 [ 987.092393][T31054] bridge0: port 3(veth0_vlan) entered disabled state [ 988.872399][T31092] syz.1.8469[31092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 988.872499][T31092] syz.1.8469[31092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 990.499072][T31101] bridge_slave_0: mtu greater than device maximum [ 994.629317][T31163] device wg2 entered promiscuous mode [ 994.819993][ T4420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 994.828789][ T4420] bridge0: port 3(veth0_vlan) entered blocking state [ 994.836381][ T4420] bridge0: port 3(veth0_vlan) entered forwarding state [ 994.879892][ T4420] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 994.891057][ T4420] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 995.262213][T31178] device veth1_macvtap left promiscuous mode [ 995.291658][T31178] device macsec0 left promiscuous mode [ 997.537848][ T24] audit: type=1400 audit(1723754398.310:185): avc: denied { create } for pid=31212 comm="syz.1.8502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 999.569871][T31220] ªªªªªª: renamed from vlan0 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=8366 state=3 status=67 (errno 32: Broken pipe) [ 1001.699197][T31249] device sit0 left promiscuous mode [ 1003.522874][ T324] bridge0: port 3(veth0_vlan) entered disabled state [ 1003.533471][ T324] device bridge_slave_1 left promiscuous mode [ 1003.543060][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.553817][ T324] device bridge_slave_0 left promiscuous mode [ 1003.562898][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.577155][ T324] device bridge_slave_1 left promiscuous mode [ 1003.586482][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.598605][ T324] device bridge_slave_0 left promiscuous mode [ 1003.608413][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.622953][ T324] device veth0_vlan left promiscuous mode