last executing test programs: 4.481851783s ago: executing program 1 (id=7878): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\a\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000400)='signal_generate\x00', r1}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 4.292996757s ago: executing program 1 (id=7881): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0x99, &(0x7f0000000480)=""/153}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000404000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f00000006c0), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000e8ffffff0000000018fb7d71248fac670000181f0000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r3, 0x58, &(0x7f0000000040)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) 4.181705289s ago: executing program 1 (id=7883): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000001000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="000000b70200001400200006000000000000000000bf09000000000000550901000000000095000000000000000000b7020000000000008500000084000000b70000000000000095000000000000000000000088bd2eeec07c9bef9f29dd49198b75ad24ec73f5"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) 4.043183622s ago: executing program 1 (id=7887): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x8000, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000540)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="022f92961714f2098d448527596d00000fc3bd5ba7a93deb0867092cbabf2ed013248a61249c77f2", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r6, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r3}, 0x20) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[], 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x94) r9 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r8}, 0x8) close(r9) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r7, 0x4) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r8, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 3.768539937s ago: executing program 1 (id=7890): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xf4240, 0x0, &(0x7f0000001680)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x1c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000000}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 3.62776939s ago: executing program 2 (id=7893): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x14, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000003cdc000000006112a4000000000095000000e4000000bade1c96c439edd539d225d14e23"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004020000080000d0f49153b946376100", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='rxrpc_improper_term\x00', r0, 0x0, 0x3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r3}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[], 0x0, 0x56}, 0x28) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r5, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r6}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xf, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xbb7, 0x0, 0x0, 0x0, 0xff}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000500)='GPL\x00', 0x3, 0x88, &(0x7f0000000700)=""/136, 0x40f00, 0x10, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x3, 0x10, 0x7, 0x7fff}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r8, r7, r2, r5, r2], &(0x7f0000000900), 0x10, 0x4}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0500000005000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000ca3ab423820000f96d9ea86eaf2c2885ec000000d800000000"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00'}, 0x10) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) r12 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/mnt\x00') ioctl$TUNSETIFF(r12, 0xb701, 0x0) 3.433688244s ago: executing program 1 (id=7895): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x28) syz_clone(0x22020000, &(0x7f0000000000), 0x0, &(0x7f0000000240), &(0x7f0000000280), 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000100) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x323, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffeffffffffffffe, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0x20}, 0x1f00) socketpair$unix(0x1, 0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00086c00db5b6861589bcfe8875a060300000023000000"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x100000000000000) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) 3.125963659s ago: executing program 2 (id=7898): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) (async) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000c40), 0x12) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) (async) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) 2.907132244s ago: executing program 0 (id=7899): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r3, &(0x7f0000000380)={'full', 0x20, 0x9, 0x20, 0xe2b}, 0x2f) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0x12c4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYRES32=r0], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYRESHEX=r1], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1d, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='ext4_journal_start\x00', r7, 0x0, 0x8}, 0x18) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r5, 0x0, 0x20000000}, 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x47, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x11, 0x4}, 0x0, 0x0, 0xea0c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)=@generic={&(0x7f00000014c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r8}, 0x18) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000740)='fsi_master_gpio_cmd_abs_addr\x00', r9}, 0x18) 1.787580196s ago: executing program 0 (id=7902): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000000000000000000500fcff00000000000000000000000000cec8599683422a7ed719e62b1ebe66a5749cc96fccb058051166c358d717f6bf7cf3e621a8bac82f6670e4fca83ecb432f8c130904611d67016e894c9fee48e0dd5b5251bc96bedd4b8666b220d9d107d39df3efa831257b2b3c3d16fb0309"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r2, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0x1000, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x10, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="470000fdffffff000008000000000000"], &(0x7f00000003c0)='GPL\x00', 0x2, 0x1000, &(0x7f0000000980)=""/4096, 0x41100, 0x43, '\x00', r6, @fallback=0x11, r5, 0x8, &(0x7f0000000540)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0xe, 0x7ff, 0x1}, 0x10, r7, r4, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1) r8 = gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0xff}, 0x180b1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3, 0x80000000}, {0x60, 0x8}, {}, {0x2}, {0x6, 0x0, 0x0, 0x10000000}]}) 1.52575058s ago: executing program 0 (id=7908): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x58000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x9}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000640)={&(0x7f0000000080)=@id={0x1e, 0x3, 0x3, {0x4e22}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)}], 0x4}, 0x8010) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000000000e77b4b9689333c9a0038416bab1500000000000000000000000000fdc927c586b40b029f6dff2812e8560640cc11384134bf287c12973a15d2359f4f7520d92f582309d86240ef1644cf", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b000000000000005ef1ffff00800000a0010000", @ANYRES32, @ANYBLOB="0000000000000000000200000000000447c232b29ca7e32fd8857470c57570379a651b018b3c88420079e9300efb3620ffaf5832084df238d05920fcca3a562867e5522ab1e50f2eff6823d404a61cd813689ffe80cf59f8b2e05cbe03af4f5aa59499bcf84dc54286f33d5dd9b5c8caea0462eba800cdbe9535", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="09c3", @ANYRES32=r5, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0100000004000000030000000800"/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x5}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000181000"/28, @ANYRES32=r6, @ANYBLOB="00000000000000007900000000000000180000000000000000000000000000009500000000000000d50a0000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 1.109072869s ago: executing program 0 (id=7913): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e40)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='timer_start\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e40)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x2}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='timer_start\x00', r1}, 0x18) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) (async) 1.06264066s ago: executing program 4 (id=7915): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x7, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext={0xff, 0x3}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f00000028c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000001c0)={&(0x7f0000000380)="4e2f44a49dde29e401e3dd9e91e55736f5513a164ef9f5ec826eabb5e72202a0e7319bab8d22dda85dfd1af2b840f77363771f91ea32a8f391755198e9e357e60ef358b3e6a317db4a0326279b06ed0c285371e7a3ddb6b6854f257fc0368159b53e5269fdee816b5f71e36efca5d37ff7f5ca24565172b20aaf1eb6250331cda933839918b0ef979eea942332", &(0x7f0000000600)=""/149, &(0x7f0000000180)="af3d7f18acb12f47df44f29ade276a98337424e17f149f2516cf573cd3846ec27d", &(0x7f0000000800)="552ef7d53e58962c86006fdd5d99269940889f0fe3fb9d1206e27650fd547e6daa67c961082932a1262767d55207d00f95720673a60408a5618a44dfab55fcb00175f7654440cea12f57a8a5649b741f31e1b37fc9f38e295d1ba81290dfe1450b4a4b6e2473433410ed4d2dd218a358", 0x8, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x9}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8982, &(0x7f0000000080)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5, 0xffffffffffffffff}, 0x0, &(0x7f0000000580)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r9, 0x4004743d, 0x110e22fff6) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000001780)=""/4096) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r10}, 0x10) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="09000000070000000000010003b1e90439971309ff54d40adff7bd3d6e004331bd0621da5d32e9009297a48f8c5ea7f785dead9b1e523b8a2e5028c8514763c865ece093e4ab95a1b35ca539d1a37969153af7980202522045096cef2a06671fa535a54ac047f7f64fc1e9195a4ed15bd209b95ddbee4ca80ed9a7bafdf5094a7f84a6a884dfb0e85004b0117cc8d8fee38b69e73824034ba939a0d3eab8e5056de80fe916c2337030ba44b4ecf2714f3db9c4dc64", @ANYRESOCT=r2, @ANYRESDEC=r7, @ANYRESDEC, @ANYRES16=0x0, @ANYRESHEX=0x0, @ANYRES16, @ANYBLOB="99b32ef59bb49a41f06b8a51fe521e942f6ace39c1cb5c31476cee4415620145d744dfc16391688ff46b430b5bf651f3efea294981d7d1c04987eecdbb459688ea849700a7fbbd87acf56104e566ccf710116b2aca19b46dddbc97abf47df25b26bff9f1cead80c19d91c03b2a39291032961090ba3e606ae30108251ef335150935969606c06d97b0cfea073ece7d616e1e5d2414f1e969e3446245afbe66814fd6eded84fdb6aef67e41e4c8e777260e0890f5684c859cf9b9b262555c7661821ff3bbc980b42fc43051db0d832d4ad321be5d8d5d58459aed02df8c056ff80f8f439271cf5e9434823a52f760565e00dcf7"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0xffffffffffffff45, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r11}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 1.0393492s ago: executing program 0 (id=7916): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e20}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x40000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 891.809773ms ago: executing program 0 (id=7917): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5}, 0x94) unlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f00000003c0)='sock_exceed_buf_limit\x00', r1}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) write$cgroup_int(r3, &(0x7f00000001c0), 0xfffffdef) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffed7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8932, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000500)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000001c0), 0x12) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r11}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x7, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x50) 868.612613ms ago: executing program 4 (id=7918): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) 377.743903ms ago: executing program 3 (id=7919): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x8, 0x0}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x4004743d, 0x110e22fff6) write$cgroup_type(r5, &(0x7f0000000280), 0xfffffeed) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 276.878305ms ago: executing program 4 (id=7920): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) (async) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) (async) write$cgroup_type(r3, &(0x7f0000000280), 0x9) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x20, r2}, 0x18) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0x1, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, 0x0, 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0x4, 0x5, 0x4c, 0x6, 0x0, 0x4, 0x10, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x97, 0x2, @perf_bp={&(0x7f0000000680), 0x1}, 0x60c, 0x1f, 0x4, 0x5, 0xe385, 0x6, 0x2, 0x0, 0x9, 0x0, 0x7}, r7, 0x7, r8, 0xa) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x10, 0x0, 0x8, 0x9, 0x40, r5, 0xb, '\x00', r6, r8, 0x1, 0x2, 0x5}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x7, 0x0, r4, 0x2f, '\x00', r6, 0xffffffffffffffff, 0x1, 0x2, 0x3}, 0x50) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f00000009c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x18) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) 248.619776ms ago: executing program 3 (id=7921): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000005c0)='kfree_skb\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) close(r0) 239.266956ms ago: executing program 4 (id=7922): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0b00000000000000000000000000000018111e00", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xe, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r4}, 0x18) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan1\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="7a0af8ff75250000bfa100000000000007010000f9ffffffb702000005000000bf130000000000008500000006000000b7000000000000009500000000000000b2595285faa6ead0169191d54f8196217fc560e2fc91f6da4dad4fdc2eb1b5986fc4a3f611a7c8edd3aa5d6ee7ab10b1a297cf528666d1ddd73f3047d248df061222193165274bc7f2382f6cda4bfdd45be583823c0f09621f3c1c65ee19ee875daf45006a4c4ea5e15b2f9618d547244a22000000000000db453620ce7243d1aebdb638d91dbef661935839c77edf2d34b12cd48a0c20fb7dd843267e0331759f4ec6b5b0af58e604f4942eb613eff289027718a09f4886afc26abba34635d0e8b598a51bc742135a6e1d33fe226c944bc76be40d435aa8b5202db761014b1b999a12df6bee431a6681"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2c}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000180)=r7) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x143842, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r8, &(0x7f0000000280)=ANY=[@ANYBLOB="1e03d3ffbc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB="010000000013", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000200)={'vxcan1\x00', 0x112}) ioctl$TUNSETQUEUE(r10, 0x400454d9, &(0x7f0000000040)={'bridge0\x00', 0x400}) 230.506046ms ago: executing program 3 (id=7923): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000200000000dd9d21fe75bf6bfed786f78a91b1565b08b9095001f8aa49ac0be79234d4989afeec8dd3a926595b96e647e3"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x1c, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000001509010000000000b500f8ffffff000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000a36c00850000001700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'veth1_macvtap\x00', 0x10}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37516e404"], 0xfdef) 125.002528ms ago: executing program 3 (id=7924): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f00000002c0)="f6eb094549002060009b8538a4ba", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xe}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 114.615988ms ago: executing program 3 (id=7925): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x4, 0x0, 0x9, 0xf0, 0x0, 0xda8, 0x90008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x683, 0x1, @perf_bp={&(0x7f0000000380), 0xa}, 0x41, 0x0, 0x9df3, 0x9, 0x10000, 0xa8, 0x3ff, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r1, 0xb) (async) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x4, 0x0, 0x9, 0xf0, 0x0, 0xda8, 0x90008, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x683, 0x1, @perf_bp={&(0x7f0000000380), 0xa}, 0x41, 0x0, 0x9df3, 0x9, 0x10000, 0xa8, 0x3ff, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r1, 0xb) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x18) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000081000000bfa300000000000007030000f1feffff720af0fff8ffffff71a4f0ff0000000071108d00000000001d400500000000004704000001ed00000f030000000000006f44000000000000730a00fe000000007203000000000006b5000000000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f18564a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fe51bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccc99069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad24b89b6a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00e10000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c87852730a3bd7ac923fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca4856ff03b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d490cba8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e1461173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec860cde7c79f7b4d4e24c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b450100000001000000393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e80dc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6432399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c00400000000000f59dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ed1012fd7a8139166fd599c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67cf0216e2d81e6127bd9d7fab28800eaab2355992f8ce4cd38add4b272c0bee4076ca4847ffa691cf78fb7ec212bad3bef29f577ea7159b7f3025b3d977ff7c91024cf71126233cb80610eb37bd2d40ebdfed687f0b093e68f10b72146a0b749ee2105e2da94a288146abbbaf7c0b24fe0000000000000000f1a4f4de6a8d12dc9e71a20cbd412898586843b534d36e21379a8a06133c1babde9e5bd5b6afc5f684aada43ee560e800f58cb33b8483f6518abde7c86bd5d389c1b3c40fdd4bebe4adf87b1025ff57eb50984cc5bad9ea1c15484ea627c3c1501d612ed65939266e7332966f03e0376076e7c5dfe25f367dda7f69db89829b360dd2f59cbaad10f13e269eca792725bbacb96aa0a5c426ca76f84322661"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffa3}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb020000000000000000000c0000000c000000020000000000002800000004000000070000"], 0x0, 0x26}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r5, 0x8, 0x0, 0x0, 0x18, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r6, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r6, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 99.715378ms ago: executing program 2 (id=7926): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000000)={&(0x7f0000000340)="c7e483b457b3256148e9e331c3cb642083c7b42d7b10c0c956f9e0cbec062f20ec680b1dd43097a41f50527a609d07404c39bbd2744379fdd1006671bb1f0739b44796f4d06039047ceeb3a9e5bfffa24780723704b281974a78281687dfca4a10c78d7df7589d842ebebad2c3689a0a5beab47257da76fb6d66fc6d60bde49ca3a3edf2a1fc55855df7e2214de769c74d5b360b48d8529d239b423550d86d1ee4ef0001e76ad6af37b18607799744645b61ae2d882c19f9d09746aa7b44c5cd835b4f32b85f", &(0x7f0000000680)=""/73, &(0x7f0000000780)="1fb770a678a3eff75f10bf735be56d303c21c597c042418f64aa27e0eb189ed76064039f301270ecd70e8e36977f22925bf16925803efc65633d2c2aa348414b0610a0744faf1a0541901883d76651e8394dc5d80ec9a544639160503d875f68cc02d78f0b0c6aab1669aaa6e74a3ec740d4811b1b7b715aff5486c0018717d500ace4e0b4476f33e454b40d92c576a833fc4564bf8608b8e8c832dcc383f28da0ffaf133834ba25b4ed59ab89f437d3717d1001dffbcd0eed2cf5fe67835815c9ddb523", &(0x7f0000000880)="dd2ba712ed5026a25620d4ee940a3516f048efcde4c839dd35f655a629178848fb4e121f433dc0bdbdfc28f20b6c1a1dc15ff50bbf6fe00a8613000c276686eb9333843fed3b7938ae6e5f60367767ff8fac8fd172251a4283df245020a8adf78a5dd6b7813f39e9ea663e384d1ca904beba0e719206e8a8070bd980d82dfaf45719dfd2cf04cc62bca396389eafcfc19bca39cebcef334546789d5328b11b7805", 0x788, r0, 0x4}, 0x38) 81.262399ms ago: executing program 2 (id=7927): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x2000000000000040, &(0x7f00000002c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='hrtimer_start\x00', r0}, 0x18) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x8000200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@generic={&(0x7f0000000000)='./file0\x00', r1}, 0x18) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='\a-.\x00', @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800ddff00040000000000d2df1c071d9712000096ea54be144879623384932565a265b610aa7175440603a2a9913d245411fd4a1570ca0a4daa6d6628bc29f77688e42f908cf9601833b226d3b3bfc32b1429d1e819ff58ff37ff5aff1cc7ace016946f7468fba07fa7eaf29c9dc3d75803ab04c202f7ef2a8cbf920827fa6ee4574b5ce4ef179b3e8c383a9d057aa778d9d25d36e55ea7c60c21c85418f3bc0281fac338bb4cba6581ffd616824172845334c98b09f83bf4ac74da603e5692ce340ee74de1fb6da7b3e03a1aabbadd4f2730962239c45cf4be62a5e60f5c8440cf0444bad48b0126eb80e1b0a1205b5b90", @ANYRESOCT, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0xa00, 0xc8, 0x4, 0x0, 0xfffffffffffffe01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r2) socketpair(0x1, 0x801, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80x0, 0xf, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x98, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300007e000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24f1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x28, 0xe80, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1b, &(0x7f0000000000)={'vcan0\x00', @random='\x00\x00\\ \x00'}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x608041, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x20) (async) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x34}, 0x10) 54.681949ms ago: executing program 3 (id=7929): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 52.837049ms ago: executing program 4 (id=7930): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x7, 0x3, 0xff, 0x5, 0x0, 0x6150, 0x61000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0x7, 0x2, 0x4000, 0x0, 0x8, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000400)}, 0x20) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='kmem_cache_free\x00'}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.stat\x00', 0x0, 0x0) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) write$cgroup_int(r2, &(0x7f0000000200)=0x5, 0x12) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740), &(0x7f0000000840), 0xffffd6c0, r2, 0x0, 0xf2ff}, 0x38) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000018110000000000000000007ae434aa0cecce640000000000000000a4fc1196b3b5f4928b4d245b7e43d4a1ff4141c7dc155b369ad76d3019358d7a4ff08f1ecb57", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000300000085000000030000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0xfffffffffffffe95, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) (async) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 826µs ago: executing program 4 (id=7931): r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0xb5, 0xff, 0xff, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000300), 0x1}, 0x8b001, 0x0, 0x0, 0x6, 0x1ff, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0xc, &(0x7f0000000b40)=ANY=[@ANYBLOB="18000000000000fb44bfb1da38bb532a2574a178b41aee96000000000018110000", @ANYRESDEC=r0, @ANYRESHEX=r2], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='percpu_create_chunk\x00', r5}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[], 0x50) perf_event_open(0x0, 0x0, 0x8000, 0xffffffffffffffff, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000008000000060000000000000e010000000000000000000000010000060400000006000000000000000000000000005f005d8819de4d1ec8c0843d21"], &(0x7f00000001c0)=""/131, 0x44, 0x83, 0x1}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa2, 0x0, 0x0, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x2d, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="1e000000a01200000a000000fc69ab7703000000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=r7, @ANYBLOB], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_tracing={0x1a, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000002500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703377501010000850000000600000095000000000000009500"/96], &(0x7f0000000180)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', r7, 0x18, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xc4ca, 0xffffffffffffffff, 0x4, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000340)=[{0x5, 0x4, 0xa}, {0x2, 0x5, 0xe, 0xa}, {0x5, 0x2, 0xd, 0x8}, {0x2, 0x5, 0x6, 0x4}], 0x10, 0x7fff}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000600)={@map=r1, 0x1f, 0x0, 0x5, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000680), &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x48) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)=@generic={&(0x7f0000000200)='./file0\x00'}, 0x18) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x8000, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000480)={'team_slave_0\x00', 0x2000}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000080)) 0s ago: executing program 2 (id=7932): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bca2000000000000a602"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000240)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x1ff, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x63) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000000c0)}, 0x20040000) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r3, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000480)=r0}, 0x4c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={0x1, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000640), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xf, 0xfef, 0x7f, 0x32, 0x4000, r10, 0x0, '\x00', r11, r12, 0x0, 0x1, 0x1}, 0x50) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffff40}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x1, 0x14000, 0x81, 0x0, 0xffffffffffffffff, 0xac6f}, 0x50) r14 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r14, 0x40042408, r15) write$cgroup_subtree(r13, &(0x7f0000000000)=ANY=[], 0xe) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000200), &(0x7f00000003c0)=r7}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r2, &(0x7f0000000140), &(0x7f0000000240)=""/154}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) kernel console output (not intermixed with test programs): +0xac/0x110 [ 332.892107][T12436] __generic_file_write_iter+0x24b/0x480 [ 332.897720][T12436] ? generic_write_checks+0x3d4/0x480 [ 332.903100][T12436] generic_file_write_iter+0xa9/0x1d0 [ 332.908457][T12436] __kernel_write+0x55a/0x910 [ 332.913147][T12436] ? vfs_read+0xa10/0xa10 [ 332.917560][T12436] ? populate_vma_page_range+0xf0/0xf0 [ 332.923010][T12436] ? cgroup_freezing+0x86/0xb0 [ 332.927763][T12436] ? freezing_slow_path+0x10a/0x150 [ 332.932941][T12436] dump_emit+0x240/0x360 [ 332.937162][T12436] ? wait_for_dump_helpers+0x390/0x390 [ 332.942600][T12436] dump_user_range+0x6a/0x1a0 [ 332.947436][T12436] elf_core_dump+0x278a/0x2bc0 [ 332.952183][T12436] ? load_elf_binary+0x2890/0x2890 [ 332.957277][T12436] ? __fsnotify_parent+0x5ff/0x6c0 [ 332.962363][T12436] ? shmem_unused_huge_scan+0xa0/0xa0 [ 332.967722][T12436] ? do_truncate+0x1ad/0x210 [ 332.972289][T12436] ? putname+0xfe/0x150 [ 332.976431][T12436] ? __kasan_check_read+0x11/0x20 [ 332.981437][T12436] ? cgroup_freezing+0x86/0xb0 [ 332.986181][T12436] ? freezing_slow_path+0x10a/0x150 [ 332.991399][T12436] do_coredump+0x1ac9/0x27f0 [ 332.996062][T12436] ? simple_acl_create+0x1c0/0x1c0 [ 333.001174][T12436] ? debug_smp_processor_id+0x17/0x20 [ 333.006627][T12436] ? kmem_cache_free+0x100/0x2d0 [ 333.011556][T12436] ? ____kasan_slab_free+0x130/0x160 [ 333.016820][T12436] ? get_signal+0xb98/0x12e0 [ 333.021387][T12436] ? kmem_cache_free+0x100/0x2d0 [ 333.026302][T12436] get_signal+0xf23/0x12e0 [ 333.030700][T12436] arch_do_signal_or_restart+0xbf/0x10f0 [ 333.036309][T12436] ? __bad_area_nosemaphore+0x2b0/0x420 [ 333.041841][T12436] ? down_read_trylock+0x100/0x150 [ 333.047019][T12436] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 333.052630][T12436] ? bad_area+0x6a/0x80 [ 333.056765][T12436] exit_to_user_mode_loop+0xa2/0xe0 [ 333.061948][T12436] exit_to_user_mode_prepare+0x76/0xa0 [ 333.067382][T12436] irqentry_exit_to_user_mode+0x9/0x10 [ 333.072820][T12436] irqentry_exit+0x12/0x60 [ 333.077226][T12436] exc_page_fault+0x67/0xc0 [ 333.081741][T12436] ? asm_exc_page_fault+0x8/0x30 [ 333.086658][T12436] asm_exc_page_fault+0x1e/0x30 [ 333.091489][T12436] RIP: 0033:0x9c0a [ 333.095192][T12436] Code: Unable to access opcode bytes at RIP 0x9be0. [ 333.101842][T12436] RSP: 002b:00002000000000a8 EFLAGS: 00010217 [ 333.108016][T12436] RAX: 0000000000000000 RBX: 00007f30eb392090 RCX: 00007f30eb14aba9 [ 333.116103][T12436] RDX: 0000200000000240 RSI: 00002000000000a0 RDI: 0000000000200000 [ 333.124287][T12436] RBP: 00007f30eb1cde19 R08: 00002000000002c0 R09: 00002000000002c0 [ 333.132242][T12436] R10: 0000200000000280 R11: 0000000000000206 R12: 0000000000000000 [ 333.140196][T12436] R13: 00007f30eb392128 R14: 00007f30eb392090 R15: 00007ffd6f393348 [ 333.306184][T13043] FAULT_INJECTION: forcing a failure. [ 333.306184][T13043] name failslab, interval 1, probability 0, space 0, times 1 [ 333.357127][T13043] CPU: 1 PID: 13043 Comm: syz.2.3421 Tainted: G W syzkaller #0 [ 333.366191][T13043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 333.376467][T13043] Call Trace: [ 333.379854][T13043] __dump_stack+0x21/0x24 [ 333.384365][T13043] dump_stack_lvl+0x169/0x1d8 [ 333.389035][T13043] ? asm_sysvec_reschedule_ipi+0x12/0x20 [ 333.394750][T13043] ? show_regs_print_info+0x18/0x18 [ 333.400114][T13043] ? dump_stack+0x9/0x1c [ 333.404351][T13043] ? dump_stack_lvl+0x1/0x1d8 [ 333.409006][T13043] dump_stack+0x15/0x1c [ 333.413232][T13043] should_fail+0x3c1/0x510 [ 333.417633][T13043] ? btf_new_fd+0x113/0xa00 [ 333.422121][T13043] __should_failslab+0xa4/0xe0 [ 333.426959][T13043] should_failslab+0x9/0x20 [ 333.431459][T13043] kmem_cache_alloc_trace+0x3a/0x2e0 [ 333.436896][T13043] btf_new_fd+0x113/0xa00 [ 333.441288][T13043] bpf_btf_load+0x5e/0x70 [ 333.445611][T13043] __se_sys_bpf+0x48a/0x680 [ 333.450264][T13043] ? __x64_sys_bpf+0x90/0x90 [ 333.455020][T13043] ? debug_smp_processor_id+0x17/0x20 [ 333.460480][T13043] __x64_sys_bpf+0x7b/0x90 [ 333.464981][T13043] do_syscall_64+0x31/0x40 [ 333.469552][T13043] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 333.475593][T13043] RIP: 0033:0x7fb3299aaba9 [ 333.480079][T13043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 333.500716][T13043] RSP: 002b:00007fb328413038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 333.509116][T13043] RAX: ffffffffffffffda RBX: 00007fb329bf1fa0 RCX: 00007fb3299aaba9 [ 333.517251][T13043] RDX: 0000000000000028 RSI: 00002000000001c0 RDI: 0000000000000012 [ 333.525208][T13043] RBP: 00007fb328413090 R08: 0000000000000000 R09: 0000000000000000 [ 333.533166][T13043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.541208][T13043] R13: 00007fb329bf2038 R14: 00007fb329bf1fa0 R15: 00007fff97b2c408 [ 333.567285][T12436] memory: usage 307096kB, limit 307200kB, failcnt 17558 [ 333.585227][T12436] memory+swap: usage 424736kB, limit 9007199254740988kB, failcnt 0 [ 333.597775][T12436] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 333.608265][T12436] Memory cgroup stats for /syz0: [ 333.608372][T12436] anon 135168 [ 333.608372][T12436] file 306831360 [ 333.608372][T12436] kernel_stack 0 [ 333.608372][T12436] percpu 0 [ 333.608372][T12436] sock 0 [ 333.608372][T12436] shmem 303181824 [ 333.608372][T12436] file_mapped 3514368 [ 333.608372][T12436] file_dirty 0 [ 333.608372][T12436] file_writeback 0 [ 333.608372][T12436] anon_thp 0 [ 333.608372][T12436] inactive_anon 301776896 [ 333.608372][T12436] active_anon 8921088 [ 333.608372][T12436] inactive_file 3575808 [ 333.608372][T12436] active_file 57344 [ 333.608372][T12436] unevictable 0 [ 333.608372][T12436] slab_reclaimable 0 [ 333.608372][T12436] slab_unreclaimable 0 [ 333.608372][T12436] slab 0 [ 333.608372][T12436] workingset_refault_anon 0 [ 333.608372][T12436] workingset_refault_file 5907 [ 333.608372][T12436] workingset_activate_anon 0 [ 333.608372][T12436] workingset_activate_file 2442 [ 333.608372][T12436] workingset_restore_anon 0 [ 333.608372][T12436] workingset_restore_file 2376 [ 333.608531][T13045] device pim6reg1 entered promiscuous mode [ 333.613840][T12436] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.3261,pid=12436,uid=0 [ 333.729227][T12436] Memory cgroup out of memory: Killed process 12436 (syz.0.3261) total-vm:90100kB, anon-rss:1088kB, file-rss:31192kB, shmem-rss:0kB, UID:0 pgtables:168kB oom_score_adj:1000 [ 333.746960][ T27] oom_reaper: reaped process 12436 (syz.0.3261), now anon-rss:0kB, file-rss:32792kB, shmem-rss:0kB [ 333.788385][T12447] syz.0.3261 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 333.849360][T12447] CPU: 0 PID: 12447 Comm: syz.0.3261 Tainted: G W syzkaller #0 [ 333.858227][T12447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 333.868274][T12447] Call Trace: [ 333.871568][T12447] __dump_stack+0x21/0x24 [ 333.876021][T12447] dump_stack_lvl+0x169/0x1d8 [ 333.880782][T12447] ? show_regs_print_info+0x18/0x18 [ 333.886103][T12447] ? ___ratelimit+0x3d1/0x560 [ 333.890865][T12447] ? __kasan_check_write+0x14/0x20 [ 333.896145][T12447] ? _raw_spin_lock+0x8e/0xe0 [ 333.900844][T12447] dump_stack+0x15/0x1c [ 333.905117][T12447] dump_header+0xdd/0x650 [ 333.909436][T12447] oom_kill_process+0x1fa/0x2c0 [ 333.914260][T12447] out_of_memory+0x94a/0xd70 [ 333.918837][T12447] ? unregister_oom_notifier+0x20/0x20 [ 333.924284][T12447] ? mutex_lock_killable+0xd3/0xe0 [ 333.929478][T12447] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 333.935974][T12447] mem_cgroup_out_of_memory+0x260/0x310 [ 333.941510][T12447] ? mem_cgroup_oom_trylock+0x350/0x350 [ 333.947656][T12447] ? _raw_spin_lock+0x8e/0xe0 [ 333.952323][T12447] ? _raw_spin_trylock_bh+0x130/0x130 [ 333.957668][T12447] ? _raw_spin_unlock+0x4d/0x70 [ 333.962495][T12447] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 333.968033][T12447] ? _raw_spin_unlock_irq+0x4e/0x70 [ 333.973317][T12447] try_charge+0xf61/0x14e0 [ 333.977799][T12447] ? __memcg_kmem_charge+0x140/0x140 [ 333.983060][T12447] ? percpu_counter_add_batch+0x13c/0x160 [ 333.988762][T12447] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 333.994280][T12447] __mem_cgroup_charge+0x14c/0x6d0 [ 333.999367][T12447] shmem_add_to_page_cache+0x55e/0xe10 [ 334.004802][T12447] ? shmem_alloc_page+0x300/0x300 [ 334.009803][T12447] ? _raw_spin_lock_irqsave+0x110/0x110 [ 334.015324][T12447] ? find_lock_entry+0x4b/0x200 [ 334.020151][T12447] ? lru_cache_add+0x164/0x380 [ 334.024887][T12447] ? shmem_getpage_gfp+0x8f3/0x2110 [ 334.030069][T12447] shmem_getpage_gfp+0x8e8/0x2110 [ 334.035072][T12447] shmem_write_begin+0xce/0x1b0 [ 334.039902][T12447] generic_perform_write+0x2be/0x510 [ 334.045173][T12447] ? atime_needs_update+0x5b0/0x5b0 [ 334.050358][T12447] ? grab_cache_page_write_begin+0xb0/0xb0 [ 334.056195][T12447] ? file_remove_privs+0x580/0x580 [ 334.061284][T12447] ? __kasan_check_write+0x14/0x20 [ 334.066368][T12447] ? down_write+0xac/0x110 [ 334.070759][T12447] __generic_file_write_iter+0x24b/0x480 [ 334.076364][T12447] ? generic_write_checks+0x3d4/0x480 [ 334.081736][T12447] generic_file_write_iter+0xa9/0x1d0 [ 334.087093][T12447] __kernel_write+0x55a/0x910 [ 334.091756][T12447] ? vfs_read+0xa10/0xa10 [ 334.096075][T12447] ? populate_vma_page_range+0xf0/0xf0 [ 334.101603][T12447] ? cgroup_freezing+0x86/0xb0 [ 334.106345][T12447] ? freezing_slow_path+0x10a/0x150 [ 334.111515][T12447] dump_emit+0x240/0x360 [ 334.115734][T12447] ? wait_for_dump_helpers+0x390/0x390 [ 334.121165][T12447] ? dump_user_range+0x61/0x1a0 [ 334.125994][T12447] ? dump_user_range+0xbd/0x1a0 [ 334.130825][T12447] dump_user_range+0x6a/0x1a0 [ 334.135480][T12447] elf_core_dump+0x278a/0x2bc0 [ 334.140225][T12447] ? load_elf_binary+0x2890/0x2890 [ 334.145314][T12447] ? __fsnotify_parent+0x5ff/0x6c0 [ 334.150404][T12447] ? shmem_unused_huge_scan+0xa0/0xa0 [ 334.155759][T12447] ? do_truncate+0x1ad/0x210 [ 334.160326][T12447] ? putname+0xfe/0x150 [ 334.164459][T12447] ? __kasan_check_read+0x11/0x20 [ 334.169459][T12447] ? cgroup_freezing+0x86/0xb0 [ 334.174201][T12447] ? freezing_slow_path+0x10a/0x150 [ 334.179374][T12447] do_coredump+0x1ac9/0x27f0 [ 334.183942][T12447] ? simple_acl_create+0x1c0/0x1c0 [ 334.189062][T12447] ? debug_smp_processor_id+0x17/0x20 [ 334.194415][T12447] ? kmem_cache_free+0x100/0x2d0 [ 334.199329][T12447] ? ____kasan_slab_free+0x130/0x160 [ 334.204598][T12447] ? get_signal+0xb98/0x12e0 [ 334.209185][T12447] ? kmem_cache_free+0x100/0x2d0 [ 334.214107][T12447] get_signal+0xf23/0x12e0 [ 334.218514][T12447] arch_do_signal_or_restart+0xbf/0x10f0 [ 334.224218][T12447] ? __bad_area_nosemaphore+0x2b0/0x420 [ 334.229739][T12447] ? down_read_trylock+0x100/0x150 [ 334.234825][T12447] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 334.240443][T12447] ? bad_area+0x6a/0x80 [ 334.244757][T12447] exit_to_user_mode_loop+0xa2/0xe0 [ 334.249929][T12447] exit_to_user_mode_prepare+0x76/0xa0 [ 334.255371][T12447] irqentry_exit_to_user_mode+0x9/0x10 [ 334.260820][T12447] irqentry_exit+0x12/0x60 [ 334.265230][T12447] exc_page_fault+0x67/0xc0 [ 334.269718][T12447] ? asm_exc_page_fault+0x8/0x30 [ 334.274633][T12447] asm_exc_page_fault+0x1e/0x30 [ 334.279544][T12447] RIP: 0033:0x9c0a [ 334.283243][T12447] Code: Unable to access opcode bytes at RIP 0x9be0. [ 334.289899][T12447] RSP: 002b:00002000000000a8 EFLAGS: 00010217 [ 334.296115][T12447] RAX: 0000000000000000 RBX: 00007f30eb392090 RCX: 00007f30eb14aba9 [ 334.304065][T12447] RDX: 0000200000000240 RSI: 00002000000000a0 RDI: 0000000000200000 [ 334.312116][T12447] RBP: 00007f30eb1cde19 R08: 00002000000002c0 R09: 00002000000002c0 [ 334.320075][T12447] R10: 0000200000000280 R11: 0000000000000206 R12: 0000000000000000 [ 334.328027][T12447] R13: 00007f30eb392128 R14: 00007f30eb392090 R15: 00007ffd6f393348 [ 334.339350][T12447] memory: usage 284164kB, limit 307200kB, failcnt 18463 [ 334.346495][T12447] memory+swap: usage 395324kB, limit 9007199254740988kB, failcnt 0 [ 334.359043][T12447] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 334.366297][T12447] Memory cgroup stats for /syz0: [ 334.366743][T12447] anon 135168 [ 334.366743][T12447] file 283852800 [ 334.366743][T12447] kernel_stack 0 [ 334.366743][T12447] percpu 0 [ 334.366743][T12447] sock 0 [ 334.366743][T12447] shmem 283852800 [ 334.366743][T12447] file_mapped 135168 [ 334.366743][T12447] file_dirty 0 [ 334.366743][T12447] file_writeback 0 [ 334.366743][T12447] anon_thp 0 [ 334.366743][T12447] inactive_anon 282447872 [ 334.366743][T12447] active_anon 8380416 [ 334.366743][T12447] inactive_file 114688 [ 334.366743][T12447] active_file 57344 [ 334.366743][T12447] unevictable 0 [ 334.366743][T12447] slab_reclaimable 0 [ 334.366743][T12447] slab_unreclaimable 0 [ 334.366743][T12447] slab 0 [ 334.366743][T12447] workingset_refault_anon 0 [ 334.366743][T12447] workingset_refault_file 6072 [ 334.366743][T12447] workingset_activate_anon 0 [ 334.366743][T12447] workingset_activate_file 2475 [ 334.366743][T12447] workingset_restore_anon 0 [ 334.366743][T12447] workingset_restore_file 2376 [ 334.466772][T12447] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.3261,pid=12446,uid=0 [ 334.489835][T12447] Memory cgroup out of memory: Killed process 12446 (syz.0.3261) total-vm:90100kB, anon-rss:1088kB, file-rss:29096kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 335.090181][T13093] syz.3.3436[13093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.090269][T13093] syz.3.3436[13093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.137288][T13113] device veth0_vlan left promiscuous mode [ 336.170544][T13113] device veth0_vlan entered promiscuous mode [ 337.386056][T12467] syz.0.3261 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 337.471798][T12467] CPU: 1 PID: 12467 Comm: syz.0.3261 Tainted: G W syzkaller #0 [ 337.480746][T12467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 337.490794][T12467] Call Trace: [ 337.494134][T12467] __dump_stack+0x21/0x24 [ 337.499320][T12467] dump_stack_lvl+0x169/0x1d8 [ 337.503997][T12467] ? show_regs_print_info+0x18/0x18 [ 337.509180][T12467] ? ___ratelimit+0x3d1/0x560 [ 337.514047][T12467] ? _raw_spin_lock+0x8e/0xe0 [ 337.518949][T12467] dump_stack+0x15/0x1c [ 337.523149][T12467] dump_header+0xdd/0x650 [ 337.527454][T12467] oom_kill_process+0x1fa/0x2c0 [ 337.532293][T12467] out_of_memory+0x94a/0xd70 [ 337.536862][T12467] ? unregister_oom_notifier+0x20/0x20 [ 337.542303][T12467] ? mutex_lock_killable+0x8c/0xe0 [ 337.547407][T12467] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 337.554129][T12467] mem_cgroup_out_of_memory+0x260/0x310 [ 337.559653][T12467] ? mem_cgroup_oom_trylock+0x350/0x350 [ 337.565189][T12467] ? _raw_spin_lock+0x8e/0xe0 [ 337.569974][T12467] ? _raw_spin_trylock_bh+0x130/0x130 [ 337.575324][T12467] ? _raw_spin_unlock+0x4d/0x70 [ 337.580342][T12467] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 337.585878][T12467] ? _raw_spin_unlock_irq+0x4e/0x70 [ 337.591105][T12467] try_charge+0xf61/0x14e0 [ 337.595525][T12467] ? __memcg_kmem_charge+0x140/0x140 [ 337.600960][T12467] ? percpu_counter_add_batch+0x13c/0x160 [ 337.606732][T12467] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 337.612261][T12467] __mem_cgroup_charge+0x14c/0x6d0 [ 337.617364][T12467] shmem_add_to_page_cache+0x55e/0xe10 [ 337.622803][T12467] ? shmem_alloc_page+0x300/0x300 [ 337.627816][T12467] ? _raw_spin_lock_irqsave+0x110/0x110 [ 337.633481][T12467] ? find_lock_entry+0x4b/0x200 [ 337.638318][T12467] ? lru_cache_add+0x164/0x380 [ 337.643053][T12467] ? shmem_getpage_gfp+0x8f3/0x2110 [ 337.648278][T12467] shmem_getpage_gfp+0x8e8/0x2110 [ 337.653309][T12467] shmem_write_begin+0xce/0x1b0 [ 337.658138][T12467] generic_perform_write+0x2be/0x510 [ 337.663407][T12467] ? atime_needs_update+0x5b0/0x5b0 [ 337.668584][T12467] ? grab_cache_page_write_begin+0xb0/0xb0 [ 337.674362][T12467] ? file_remove_privs+0x580/0x580 [ 337.679443][T12467] ? __kasan_check_write+0x14/0x20 [ 337.684537][T12467] ? down_write+0xac/0x110 [ 337.689053][T12467] __generic_file_write_iter+0x24b/0x480 [ 337.694768][T12467] ? generic_write_checks+0x3d4/0x480 [ 337.700210][T12467] generic_file_write_iter+0xa9/0x1d0 [ 337.705765][T12467] __kernel_write+0x55a/0x910 [ 337.710423][T12467] ? vfs_read+0xa10/0xa10 [ 337.714817][T12467] ? populate_vma_page_range+0xf0/0xf0 [ 337.720249][T12467] ? cgroup_freezing+0x86/0xb0 [ 337.725074][T12467] ? freezing_slow_path+0x10a/0x150 [ 337.730243][T12467] dump_emit+0x240/0x360 [ 337.734459][T12467] ? wait_for_dump_helpers+0x390/0x390 [ 337.739900][T12467] dump_user_range+0x6a/0x1a0 [ 337.744645][T12467] elf_core_dump+0x278a/0x2bc0 [ 337.749383][T12467] ? load_elf_binary+0x2890/0x2890 [ 337.754464][T12467] ? __fsnotify_parent+0x5ff/0x6c0 [ 337.759551][T12467] ? shmem_unused_huge_scan+0xa0/0xa0 [ 337.764999][T12467] ? do_truncate+0x1ad/0x210 [ 337.769566][T12467] ? putname+0xfe/0x150 [ 337.773709][T12467] ? __kasan_check_read+0x11/0x20 [ 337.778888][T12467] ? cgroup_freezing+0x86/0xb0 [ 337.783765][T12467] ? freezing_slow_path+0x10a/0x150 [ 337.789056][T12467] do_coredump+0x1ac9/0x27f0 [ 337.794073][T12467] ? simple_acl_create+0x1c0/0x1c0 [ 337.799674][T12467] ? debug_smp_processor_id+0x17/0x20 [ 337.805191][T12467] ? kmem_cache_free+0x100/0x2d0 [ 337.810109][T12467] ? ____kasan_slab_free+0x130/0x160 [ 337.815391][T12467] ? get_signal+0xb98/0x12e0 [ 337.819954][T12467] ? kmem_cache_free+0x100/0x2d0 [ 337.824968][T12467] get_signal+0xf23/0x12e0 [ 337.829377][T12467] arch_do_signal_or_restart+0xbf/0x10f0 [ 337.834992][T12467] ? __bad_area_nosemaphore+0x2b0/0x420 [ 337.840539][T12467] ? down_read_trylock+0x100/0x150 [ 337.845643][T12467] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 337.851249][T12467] ? bad_area+0x6a/0x80 [ 337.855469][T12467] exit_to_user_mode_loop+0xa2/0xe0 [ 337.860735][T12467] exit_to_user_mode_prepare+0x76/0xa0 [ 337.866177][T12467] irqentry_exit_to_user_mode+0x9/0x10 [ 337.871617][T12467] irqentry_exit+0x12/0x60 [ 337.876055][T12467] exc_page_fault+0x67/0xc0 [ 337.880888][T12467] ? asm_exc_page_fault+0x8/0x30 [ 337.885803][T12467] asm_exc_page_fault+0x1e/0x30 [ 337.890625][T12467] RIP: 0033:0x9c0a [ 337.894338][T12467] Code: Unable to access opcode bytes at RIP 0x9be0. [ 337.900992][T12467] RSP: 002b:00002000000000a8 EFLAGS: 00010217 [ 337.907217][T12467] RAX: 0000000000000000 RBX: 00007f30eb392090 RCX: 00007f30eb14aba9 [ 337.915424][T12467] RDX: 0000200000000240 RSI: 00002000000000a0 RDI: 0000000000200000 [ 337.923952][T12467] RBP: 00007f30eb1cde19 R08: 00002000000002c0 R09: 00002000000002c0 [ 337.932133][T12467] R10: 0000200000000280 R11: 0000000000000206 R12: 0000000000000000 [ 337.940086][T12467] R13: 00007f30eb392128 R14: 00007f30eb392090 R15: 00007ffd6f393348 [ 337.959410][T12467] memory: usage 307200kB, limit 307200kB, failcnt 20450 [ 337.976933][T12467] memory+swap: usage 423940kB, limit 9007199254740988kB, failcnt 0 [ 338.009233][T12467] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 338.023026][T12467] Memory cgroup stats for /syz0: [ 338.023161][T12467] anon 270336 [ 338.023161][T12467] file 305750016 [ 338.023161][T12467] kernel_stack 0 [ 338.023161][T12467] percpu 0 [ 338.023161][T12467] sock 0 [ 338.023161][T12467] shmem 305614848 [ 338.023161][T12467] file_mapped 135168 [ 338.023161][T12467] file_dirty 0 [ 338.023161][T12467] file_writeback 0 [ 338.023161][T12467] anon_thp 0 [ 338.023161][T12467] inactive_anon 305717248 [ 338.023161][T12467] active_anon 8785920 [ 338.023161][T12467] inactive_file 102400 [ 338.023161][T12467] active_file 20480 [ 338.023161][T12467] unevictable 0 [ 338.023161][T12467] slab_reclaimable 0 [ 338.023161][T12467] slab_unreclaimable 0 [ 338.023161][T12467] slab 0 [ 338.023161][T12467] workingset_refault_anon 0 [ 338.023161][T12467] workingset_refault_file 7425 [ 338.023161][T12467] workingset_activate_anon 0 [ 338.023161][T12467] workingset_activate_file 3498 [ 338.023161][T12467] workingset_restore_anon 0 [ 338.023161][T12467] workingset_restore_file 2409 [ 338.118012][T12467] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.3261,pid=12467,uid=0 [ 338.133159][T12467] Memory cgroup out of memory: Killed process 12467 (syz.0.3261) total-vm:90100kB, anon-rss:1088kB, file-rss:31392kB, shmem-rss:0kB, UID:0 pgtables:160kB oom_score_adj:1000 [ 338.257308][T13153] FAULT_INJECTION: forcing a failure. [ 338.257308][T13153] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 338.379226][T13153] CPU: 1 PID: 13153 Comm: syz.1.3453 Tainted: G W syzkaller #0 [ 338.388282][T13153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 338.398590][T13153] Call Trace: [ 338.402050][T13153] __dump_stack+0x21/0x24 [ 338.406427][T13153] dump_stack_lvl+0x169/0x1d8 [ 338.411481][T13153] ? show_regs_print_info+0x18/0x18 [ 338.416668][T13153] dump_stack+0x15/0x1c [ 338.420899][T13153] should_fail+0x3c1/0x510 [ 338.425528][T13153] should_fail_usercopy+0x1a/0x20 [ 338.430541][T13153] _copy_from_user+0x20/0xd0 [ 338.435120][T13153] btf_new_fd+0x259/0xa00 [ 338.439440][T13153] bpf_btf_load+0x5e/0x70 [ 338.443761][T13153] __se_sys_bpf+0x48a/0x680 [ 338.448384][T13153] ? __x64_sys_bpf+0x90/0x90 [ 338.452967][T13153] ? debug_smp_processor_id+0x17/0x20 [ 338.458498][T13153] __x64_sys_bpf+0x7b/0x90 [ 338.462906][T13153] do_syscall_64+0x31/0x40 [ 338.467484][T13153] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 338.473366][T13153] RIP: 0033:0x7f3ac07d0ba9 [ 338.477778][T13153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 338.497980][T13153] RSP: 002b:00007f3abf239038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 338.506563][T13153] RAX: ffffffffffffffda RBX: 00007f3ac0a17fa0 RCX: 00007f3ac07d0ba9 [ 338.514701][T13153] RDX: 0000000000000028 RSI: 00002000000001c0 RDI: 0000000000000012 [ 338.522752][T13153] RBP: 00007f3abf239090 R08: 0000000000000000 R09: 0000000000000000 [ 338.530713][T13153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.538674][T13153] R13: 00007f3ac0a18038 R14: 00007f3ac0a17fa0 R15: 00007ffea95df118 [ 338.594889][T12110] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 338.645054][T12110] CPU: 1 PID: 12110 Comm: syz-executor Tainted: G W syzkaller #0 [ 338.654175][T12110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 338.664222][T12110] Call Trace: [ 338.667504][T12110] __dump_stack+0x21/0x24 [ 338.671824][T12110] dump_stack_lvl+0x169/0x1d8 [ 338.676488][T12110] ? show_regs_print_info+0x18/0x18 [ 338.681690][T12110] ? ___ratelimit+0x3d1/0x560 [ 338.686362][T12110] ? __kasan_check_write+0x14/0x20 [ 338.691482][T12110] ? _raw_spin_lock+0x8e/0xe0 [ 338.696146][T12110] dump_stack+0x15/0x1c [ 338.700291][T12110] dump_header+0xdd/0x650 [ 338.704706][T12110] oom_kill_process+0x1fa/0x2c0 [ 338.709554][T12110] out_of_memory+0x94a/0xd70 [ 338.714146][T12110] ? unregister_oom_notifier+0x20/0x20 [ 338.719768][T12110] ? mutex_lock_killable+0x8c/0xe0 [ 338.725313][T12110] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 338.731807][T12110] mem_cgroup_out_of_memory+0x260/0x310 [ 338.737329][T12110] ? mem_cgroup_oom_trylock+0x350/0x350 [ 338.742931][T12110] ? _raw_spin_lock+0x8e/0xe0 [ 338.747580][T12110] ? _raw_spin_trylock_bh+0x130/0x130 [ 338.753033][T12110] ? _raw_spin_unlock+0x4d/0x70 [ 338.757860][T12110] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 338.763390][T12110] ? _raw_spin_unlock_irq+0x4e/0x70 [ 338.768576][T12110] try_charge+0xf61/0x14e0 [ 338.773001][T12110] ? __memcg_kmem_charge+0x140/0x140 [ 338.778259][T12110] ? bpf_get_stack+0x31/0x40 [ 338.782831][T12110] ? bpf_prog_2ae546726a474a42+0x3d/0x23c [ 338.788552][T12110] ? bpf_get_stack_raw_tp+0x189/0x1c0 [ 338.793925][T12110] ? bpf_ringbuf_query+0xaf/0x130 [ 338.798927][T12110] ? bpf_trace_run4+0xda/0x240 [ 338.803696][T12110] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 338.809243][T12110] __mem_cgroup_charge+0x14c/0x6d0 [ 338.814347][T12110] __add_to_page_cache_locked+0x1e7/0x980 [ 338.820041][T12110] ? __traceiter_mm_page_alloc+0x3f/0x60 [ 338.825649][T12110] ? __alloc_pages_nodemask+0x5b4/0x5f0 [ 338.831255][T12110] ? put_page+0xd0/0xd0 [ 338.835476][T12110] ? workingset_activation+0x250/0x250 [ 338.841175][T12110] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 338.846817][T12110] ? find_get_entry+0x366/0x3c0 [ 338.851895][T12110] ? page_cache_prev_miss+0x210/0x270 [ 338.857279][T12110] add_to_page_cache_lru+0xa7/0x210 [ 338.862563][T12110] pagecache_get_page+0x704/0x930 [ 338.867577][T12110] filemap_fault+0x1ac7/0x2040 [ 338.872319][T12110] ? _raw_spin_trylock_bh+0x130/0x130 [ 338.877705][T12110] ? generic_file_read_iter+0x560/0x560 [ 338.883234][T12110] ? wait_consider_task+0x128f/0x28b0 [ 338.888599][T12110] ? filemap_allow_speculation+0x10/0x10 [ 338.894242][T12110] ? __kasan_check_write+0x14/0x20 [ 338.899347][T12110] ext4_filemap_fault+0x8a/0xa0 [ 338.904243][T12110] handle_pte_fault+0x1fa5/0x3750 [ 338.909262][T12110] handle_mm_fault+0xf3f/0x16a0 [ 338.914106][T12110] ? can_reuse_spf_vma+0xe0/0xe0 [ 338.919035][T12110] ? kernel_wait4+0x1fe/0x260 [ 338.923702][T12110] ? __kasan_check_write+0x14/0x20 [ 338.928790][T12110] ? down_read_trylock+0x100/0x150 [ 338.933896][T12110] ? __init_rwsem+0x1c0/0x1c0 [ 338.938549][T12110] ? find_vma+0x30/0x150 [ 338.942766][T12110] do_user_addr_fault+0x5a2/0xc80 [ 338.947766][T12110] ? do_kern_addr_fault+0x80/0x80 [ 338.952854][T12110] ? debug_smp_processor_id+0x17/0x20 [ 338.958218][T12110] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 338.964264][T12110] exc_page_fault+0x5a/0xc0 [ 338.968839][T12110] ? asm_exc_page_fault+0x8/0x30 [ 338.973760][T12110] asm_exc_page_fault+0x1e/0x30 [ 338.978682][T12110] RIP: 0033:0x7f30eb021be4 [ 338.983162][T12110] Code: 85 ed 09 00 00 48 b8 db 34 b6 d7 82 de 1b 43 48 f7 a4 24 98 00 00 00 48 8b 05 b8 fb e9 00 48 69 8c 24 90 00 00 00 e8 03 00 00 <8b> 78 08 48 8b 44 24 18 48 c1 ea 12 4c 8b 0d c9 fa e9 00 48 01 d1 [ 339.002742][T12110] RSP: 002b:00007ffd6f3936d0 EFLAGS: 00010206 [ 339.008787][T12110] RAX: 0000001b31124000 RBX: 000000000000008d RCX: 0000000000052850 [ 339.016735][T12110] RDX: 0000000008f5d997 RSI: 00007ffd6f393760 RDI: 00000000222e57dc [ 339.025001][T12110] RBP: 00007ffd6f39370c R08: 0000000000000152 R09: 00216c8afcb5b76e [ 339.033046][T12110] R10: 000000ae8b7268da R11: 000000000000fb08 R12: 0000000000001388 [ 339.040995][T12110] R13: 00000000000927c0 R14: 0000000000052536 R15: 00007ffd6f393760 [ 339.060313][T12110] memory: usage 307200kB, limit 307200kB, failcnt 21374 [ 339.067356][T12110] memory+swap: usage 424420kB, limit 9007199254740988kB, failcnt 0 [ 339.075549][T12110] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 339.089179][T12110] Memory cgroup stats for /syz0: [ 339.089299][T12110] anon 270336 [ 339.089299][T12110] file 306155520 [ 339.089299][T12110] kernel_stack 0 [ 339.089299][T12110] percpu 0 [ 339.089299][T12110] sock 0 [ 339.089299][T12110] shmem 306155520 [ 339.089299][T12110] file_mapped 135168 [ 339.089299][T12110] file_dirty 0 [ 339.089299][T12110] file_writeback 0 [ 339.089299][T12110] anon_thp 0 [ 339.089299][T12110] inactive_anon 306143232 [ 339.089299][T12110] active_anon 8380416 [ 339.089299][T12110] inactive_file 102400 [ 339.089299][T12110] active_file 16384 [ 339.089299][T12110] unevictable 0 [ 339.089299][T12110] slab_reclaimable 0 [ 339.089299][T12110] slab_unreclaimable 0 [ 339.089299][T12110] slab 0 [ 339.089299][T12110] workingset_refault_anon 0 [ 339.089299][T12110] workingset_refault_file 7953 [ 339.089299][T12110] workingset_activate_anon 0 [ 339.089299][T12110] workingset_activate_file 3960 [ 339.089299][T12110] workingset_restore_anon 0 [ 339.089299][T12110] workingset_restore_file 2838 [ 339.187361][T12110] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.3261,pid=12445,uid=0 [ 339.202755][T12110] Memory cgroup out of memory: Killed process 12445 (syz.0.3261) total-vm:90100kB, anon-rss:1088kB, file-rss:33308kB, shmem-rss:0kB, UID:0 pgtables:188kB oom_score_adj:1000 [ 339.220663][ T27] oom_reaper: reaped process 12445 (syz.0.3261), now anon-rss:0kB, file-rss:34524kB, shmem-rss:0kB [ 339.231650][T12447] syz.0.3261 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 339.241687][T12447] CPU: 1 PID: 12447 Comm: syz.0.3261 Tainted: G W syzkaller #0 [ 339.250880][T12447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 339.260937][T12447] Call Trace: [ 339.264221][T12447] __dump_stack+0x21/0x24 [ 339.268538][T12447] dump_stack_lvl+0x169/0x1d8 [ 339.273210][T12447] ? show_regs_print_info+0x18/0x18 [ 339.278402][T12447] ? ___ratelimit+0x3d1/0x560 [ 339.283084][T12447] ? __kasan_check_write+0x14/0x20 [ 339.288269][T12447] ? _raw_spin_lock+0x8e/0xe0 [ 339.292947][T12447] dump_stack+0x15/0x1c [ 339.297097][T12447] dump_header+0xdd/0x650 [ 339.301420][T12447] oom_kill_process+0x1fa/0x2c0 [ 339.306267][T12447] out_of_memory+0x94a/0xd70 [ 339.310845][T12447] ? unregister_oom_notifier+0x20/0x20 [ 339.316291][T12447] ? mutex_lock_killable+0xd3/0xe0 [ 339.321515][T12447] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 339.328095][T12447] mem_cgroup_out_of_memory+0x260/0x310 [ 339.333632][T12447] ? mem_cgroup_oom_trylock+0x350/0x350 [ 339.339169][T12447] ? _raw_spin_lock+0x8e/0xe0 [ 339.343833][T12447] ? _raw_spin_trylock_bh+0x130/0x130 [ 339.349191][T12447] ? _raw_spin_unlock+0x4d/0x70 [ 339.354033][T12447] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 339.359567][T12447] ? _raw_spin_unlock_irq+0x4e/0x70 [ 339.364766][T12447] try_charge+0xf61/0x14e0 [ 339.369181][T12447] ? __memcg_kmem_charge+0x140/0x140 [ 339.374637][T12447] ? percpu_counter_add_batch+0x13c/0x160 [ 339.380699][T12447] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 339.386327][T12447] __mem_cgroup_charge+0x14c/0x6d0 [ 339.391428][T12447] shmem_add_to_page_cache+0x55e/0xe10 [ 339.396883][T12447] ? shmem_alloc_page+0x300/0x300 [ 339.401905][T12447] ? _raw_spin_lock_irqsave+0x110/0x110 [ 339.407439][T12447] ? find_lock_entry+0x4b/0x200 [ 339.412303][T12447] ? lru_cache_add+0x164/0x380 [ 339.417051][T12447] ? shmem_getpage_gfp+0x8f3/0x2110 [ 339.422236][T12447] shmem_getpage_gfp+0x8e8/0x2110 [ 339.427257][T12447] shmem_write_begin+0xce/0x1b0 [ 339.432110][T12447] generic_perform_write+0x2be/0x510 [ 339.437386][T12447] ? atime_needs_update+0x5b0/0x5b0 [ 339.442580][T12447] ? grab_cache_page_write_begin+0xb0/0xb0 [ 339.448375][T12447] ? file_remove_privs+0x580/0x580 [ 339.453562][T12447] ? __kasan_check_write+0x14/0x20 [ 339.458663][T12447] ? down_write+0xac/0x110 [ 339.463435][T12447] __generic_file_write_iter+0x24b/0x480 [ 339.469145][T12447] ? generic_write_checks+0x3d4/0x480 [ 339.474527][T12447] generic_file_write_iter+0xa9/0x1d0 [ 339.479893][T12447] __kernel_write+0x55a/0x910 [ 339.484569][T12447] ? vfs_read+0xa10/0xa10 [ 339.488893][T12447] ? populate_vma_page_range+0xf0/0xf0 [ 339.494349][T12447] ? cgroup_freezing+0x86/0xb0 [ 339.499203][T12447] ? freezing_slow_path+0x10a/0x150 [ 339.504394][T12447] dump_emit+0x240/0x360 [ 339.508630][T12447] ? wait_for_dump_helpers+0x390/0x390 [ 339.514081][T12447] ? dump_user_range+0xaf/0x1a0 [ 339.518920][T12447] dump_user_range+0x6a/0x1a0 [ 339.523585][T12447] elf_core_dump+0x278a/0x2bc0 [ 339.528337][T12447] ? load_elf_binary+0x2890/0x2890 [ 339.533452][T12447] ? __fsnotify_parent+0x5ff/0x6c0 [ 339.538540][T12447] ? shmem_unused_huge_scan+0xa0/0xa0 [ 339.543896][T12447] ? do_truncate+0x1ad/0x210 [ 339.548486][T12447] ? putname+0xfe/0x150 [ 339.552625][T12447] ? __kasan_check_read+0x11/0x20 [ 339.557626][T12447] ? cgroup_freezing+0x86/0xb0 [ 339.562375][T12447] ? freezing_slow_path+0x10a/0x150 [ 339.567572][T12447] do_coredump+0x1ac9/0x27f0 [ 339.572158][T12447] ? simple_acl_create+0x1c0/0x1c0 [ 339.577269][T12447] ? debug_smp_processor_id+0x17/0x20 [ 339.582621][T12447] ? kmem_cache_free+0x100/0x2d0 [ 339.587532][T12447] ? ____kasan_slab_free+0x130/0x160 [ 339.592823][T12447] ? get_signal+0xb98/0x12e0 [ 339.597392][T12447] ? kmem_cache_free+0x100/0x2d0 [ 339.602304][T12447] get_signal+0xf23/0x12e0 [ 339.606703][T12447] arch_do_signal_or_restart+0xbf/0x10f0 [ 339.612314][T12447] ? __bad_area_nosemaphore+0x2b0/0x420 [ 339.617922][T12447] ? down_read_trylock+0x100/0x150 [ 339.623027][T12447] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 339.628652][T12447] ? bad_area+0x6a/0x80 [ 339.632907][T12447] exit_to_user_mode_loop+0xa2/0xe0 [ 339.638121][T12447] exit_to_user_mode_prepare+0x76/0xa0 [ 339.643594][T12447] irqentry_exit_to_user_mode+0x9/0x10 [ 339.649033][T12447] irqentry_exit+0x12/0x60 [ 339.653464][T12447] exc_page_fault+0x67/0xc0 [ 339.658019][T12447] ? asm_exc_page_fault+0x8/0x30 [ 339.663130][T12447] asm_exc_page_fault+0x1e/0x30 [ 339.668009][T12447] RIP: 0033:0x9c0a [ 339.671712][T12447] Code: Unable to access opcode bytes at RIP 0x9be0. [ 339.678617][T12447] RSP: 002b:00002000000000a8 EFLAGS: 00010217 [ 339.684662][T12447] RAX: 0000000000000000 RBX: 00007f30eb392090 RCX: 00007f30eb14aba9 [ 339.692872][T12447] RDX: 0000200000000240 RSI: 00002000000000a0 RDI: 0000000000200000 [ 339.700826][T12447] RBP: 00007f30eb1cde19 R08: 00002000000002c0 R09: 00002000000002c0 [ 339.708784][T12447] R10: 0000200000000280 R11: 0000000000000206 R12: 0000000000000000 [ 339.716731][T12447] R13: 00007f30eb392128 R14: 00007f30eb392090 R15: 00007ffd6f393348 [ 339.730720][T12447] memory: usage 282200kB, limit 307200kB, failcnt 21392 [ 339.737866][T12447] memory+swap: usage 390480kB, limit 9007199254740988kB, failcnt 0 [ 339.745874][T12447] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 339.752857][T12447] Memory cgroup stats for /syz0: [ 339.752979][T12447] anon 270336 [ 339.752979][T12447] file 281284608 [ 339.752979][T12447] kernel_stack 0 [ 339.752979][T12447] percpu 0 [ 339.752979][T12447] sock 0 [ 339.752979][T12447] shmem 281284608 [ 339.752979][T12447] file_mapped 135168 [ 339.752979][T12447] file_dirty 0 [ 339.752979][T12447] file_writeback 0 [ 339.752979][T12447] anon_thp 0 [ 339.752979][T12447] inactive_anon 280989696 [ 339.752979][T12447] active_anon 7974912 [ 339.752979][T12447] inactive_file 102400 [ 339.752979][T12447] active_file 16384 [ 339.752979][T12447] unevictable 0 [ 339.752979][T12447] slab_reclaimable 0 [ 339.752979][T12447] slab_unreclaimable 0 [ 339.752979][T12447] slab 0 [ 339.752979][T12447] workingset_refault_anon 0 [ 339.752979][T12447] workingset_refault_file 7953 [ 339.752979][T12447] workingset_activate_anon 0 [ 339.752979][T12447] workingset_activate_file 3960 [ 339.752979][T12447] workingset_restore_anon 0 [ 339.752979][T12447] workingset_restore_file 2838 [ 339.851401][T12447] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.3261,pid=12468,uid=0 [ 339.867386][T12447] Memory cgroup out of memory: Killed process 12468 (syz.0.3261) total-vm:90100kB, anon-rss:1088kB, file-rss:32800kB, shmem-rss:0kB, UID:0 pgtables:164kB oom_score_adj:1000 [ 340.589623][T13169] device wg2 entered promiscuous mode [ 340.632433][T12453] syz.0.3261 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 340.645746][T12453] CPU: 1 PID: 12453 Comm: syz.0.3261 Tainted: G W syzkaller #0 [ 340.654695][T12453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 340.664744][T12453] Call Trace: [ 340.668042][T12453] __dump_stack+0x21/0x24 [ 340.672378][T12453] dump_stack_lvl+0x169/0x1d8 [ 340.677051][T12453] ? show_regs_print_info+0x18/0x18 [ 340.682243][T12453] ? ___ratelimit+0x3d1/0x560 [ 340.686911][T12453] ? __kasan_check_write+0x14/0x20 [ 340.692011][T12453] ? _raw_spin_lock+0x8e/0xe0 [ 340.696686][T12453] dump_stack+0x15/0x1c [ 340.700972][T12453] dump_header+0xdd/0x650 [ 340.705306][T12453] oom_kill_process+0x1fa/0x2c0 [ 340.710153][T12453] out_of_memory+0x94a/0xd70 [ 340.714830][T12453] ? unregister_oom_notifier+0x20/0x20 [ 340.720313][T12453] ? mutex_lock_killable+0x8c/0xe0 [ 340.725491][T12453] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 340.732181][T12453] mem_cgroup_out_of_memory+0x260/0x310 [ 340.737813][T12453] ? mem_cgroup_oom_trylock+0x350/0x350 [ 340.743356][T12453] ? _raw_spin_lock+0x8e/0xe0 [ 340.748050][T12453] ? _raw_spin_trylock_bh+0x130/0x130 [ 340.753459][T12453] ? _raw_spin_unlock+0x4d/0x70 [ 340.758614][T12453] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 340.764157][T12453] ? _raw_spin_unlock_irq+0x4e/0x70 [ 340.769364][T12453] try_charge+0xf61/0x14e0 [ 340.773856][T12453] ? __memcg_kmem_charge+0x140/0x140 [ 340.779141][T12453] ? percpu_counter_add_batch+0x13c/0x160 [ 340.784864][T12453] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 340.790444][T12453] __mem_cgroup_charge+0x14c/0x6d0 [ 340.795544][T12453] shmem_add_to_page_cache+0x55e/0xe10 [ 340.801007][T12453] ? shmem_alloc_page+0x300/0x300 [ 340.806009][T12453] ? _raw_spin_lock_irqsave+0x110/0x110 [ 340.811540][T12453] ? find_lock_entry+0x4b/0x200 [ 340.816643][T12453] ? lru_cache_add+0x164/0x380 [ 340.821912][T12453] ? shmem_getpage_gfp+0x8f3/0x2110 [ 340.827299][T12453] shmem_getpage_gfp+0x8e8/0x2110 [ 340.832419][T12453] shmem_write_begin+0xce/0x1b0 [ 340.837258][T12453] generic_perform_write+0x2be/0x510 [ 340.842540][T12453] ? atime_needs_update+0x5b0/0x5b0 [ 340.847769][T12453] ? grab_cache_page_write_begin+0xb0/0xb0 [ 340.853559][T12453] ? file_remove_privs+0x580/0x580 [ 340.858653][T12453] ? __kasan_check_write+0x14/0x20 [ 340.863758][T12453] ? down_write+0xac/0x110 [ 340.868156][T12453] __generic_file_write_iter+0x24b/0x480 [ 340.873946][T12453] ? generic_write_checks+0x3d4/0x480 [ 340.879389][T12453] generic_file_write_iter+0xa9/0x1d0 [ 340.884957][T12453] __kernel_write+0x55a/0x910 [ 340.889621][T12453] ? vfs_read+0xa10/0xa10 [ 340.894019][T12453] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 340.900172][T12453] ? populate_vma_page_range+0xf0/0xf0 [ 340.905608][T12453] ? cgroup_freezing+0x86/0xb0 [ 340.910482][T12453] ? freezing_slow_path+0x10a/0x150 [ 340.915666][T12453] dump_emit+0x240/0x360 [ 340.919947][T12453] ? wait_for_dump_helpers+0x390/0x390 [ 340.925602][T12453] dump_user_range+0x6a/0x1a0 [ 340.930291][T12453] elf_core_dump+0x278a/0x2bc0 [ 340.935049][T12453] ? load_elf_binary+0x2890/0x2890 [ 340.940160][T12453] ? __fsnotify_parent+0x5ff/0x6c0 [ 340.945262][T12453] ? shmem_unused_huge_scan+0xa0/0xa0 [ 340.950627][T12453] ? do_truncate+0x1ad/0x210 [ 340.955196][T12453] ? putname+0xfe/0x150 [ 340.959410][T12453] ? __kasan_check_read+0x11/0x20 [ 340.964414][T12453] ? cgroup_freezing+0x86/0xb0 [ 340.969244][T12453] ? freezing_slow_path+0x10a/0x150 [ 340.974478][T12453] do_coredump+0x1ac9/0x27f0 [ 340.979078][T12453] ? simple_acl_create+0x1c0/0x1c0 [ 340.984169][T12453] ? debug_smp_processor_id+0x17/0x20 [ 340.989890][T12453] ? kmem_cache_free+0x100/0x2d0 [ 340.994808][T12453] ? ____kasan_slab_free+0x130/0x160 [ 341.000073][T12453] ? get_signal+0xb98/0x12e0 [ 341.004645][T12453] ? kmem_cache_free+0x100/0x2d0 [ 341.009680][T12453] get_signal+0xf23/0x12e0 [ 341.014077][T12453] arch_do_signal_or_restart+0xbf/0x10f0 [ 341.019738][T12453] ? __bad_area_nosemaphore+0x2b0/0x420 [ 341.025260][T12453] ? down_read_trylock+0x100/0x150 [ 341.030346][T12453] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 341.035961][T12453] ? bad_area+0x6a/0x80 [ 341.040118][T12453] exit_to_user_mode_loop+0xa2/0xe0 [ 341.045577][T12453] exit_to_user_mode_prepare+0x76/0xa0 [ 341.051228][T12453] irqentry_exit_to_user_mode+0x9/0x10 [ 341.056772][T12453] irqentry_exit+0x12/0x60 [ 341.061176][T12453] exc_page_fault+0x67/0xc0 [ 341.065744][T12453] ? asm_exc_page_fault+0x8/0x30 [ 341.070747][T12453] asm_exc_page_fault+0x1e/0x30 [ 341.075570][T12453] RIP: 0033:0x9c0a [ 341.079278][T12453] Code: Unable to access opcode bytes at RIP 0x9be0. [ 341.085926][T12453] RSP: 002b:00002000000000a8 EFLAGS: 00010217 [ 341.091965][T12453] RAX: 0000000000000000 RBX: 00007f30eb392090 RCX: 00007f30eb14aba9 [ 341.099914][T12453] RDX: 0000200000000240 RSI: 00002000000000a0 RDI: 0000000000200000 [ 341.107888][T12453] RBP: 00007f30eb1cde19 R08: 00002000000002c0 R09: 00002000000002c0 [ 341.115852][T12453] R10: 0000200000000280 R11: 0000000000000206 R12: 0000000000000000 [ 341.123954][T12453] R13: 00007f30eb392128 R14: 00007f30eb392090 R15: 00007ffd6f393348 [ 341.155860][T12453] memory: usage 307200kB, limit 307200kB, failcnt 23266 [ 341.164980][T12453] memory+swap: usage 426176kB, limit 9007199254740988kB, failcnt 0 [ 341.173201][T12453] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 341.195653][T12453] Memory cgroup stats for /syz0: [ 341.196252][T12453] anon 405504 [ 341.196252][T12453] file 307912704 [ 341.196252][T12453] kernel_stack 0 [ 341.196252][T12453] percpu 0 [ 341.196252][T12453] sock 0 [ 341.196252][T12453] shmem 307912704 [ 341.196252][T12453] file_mapped 135168 [ 341.196252][T12453] file_dirty 0 [ 341.196252][T12453] file_writeback 0 [ 341.196252][T12453] anon_thp 0 [ 341.196252][T12453] inactive_anon 306262016 [ 341.196252][T12453] active_anon 8110080 [ 341.196252][T12453] inactive_file 102400 [ 341.196252][T12453] active_file 106496 [ 341.196252][T12453] unevictable 0 [ 341.196252][T12453] slab_reclaimable 0 [ 341.196252][T12453] slab_unreclaimable 0 [ 341.196252][T12453] slab 0 [ 341.196252][T12453] workingset_refault_anon 0 [ 341.196252][T12453] workingset_refault_file 9009 [ 341.196252][T12453] workingset_activate_anon 0 [ 341.196252][T12453] workingset_activate_file 5016 [ 341.196252][T12453] workingset_restore_anon 0 [ 341.196252][T12453] workingset_restore_file 3564 [ 341.293624][T12453] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.3261,pid=12457,uid=0 [ 341.309247][T12453] Memory cgroup out of memory: Killed process 12457 (syz.0.3261) total-vm:90100kB, anon-rss:1080kB, file-rss:36384kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 341.792048][T13178] device wg2 entered promiscuous mode [ 342.032945][T13184] device syzkaller0 entered promiscuous mode [ 342.334824][T12453] syz.0.3261 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 342.349484][T12453] CPU: 0 PID: 12453 Comm: syz.0.3261 Tainted: G W syzkaller #0 [ 342.358335][T12453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 342.368382][T12453] Call Trace: [ 342.371664][T12453] __dump_stack+0x21/0x24 [ 342.376026][T12453] dump_stack_lvl+0x169/0x1d8 [ 342.380707][T12453] ? show_regs_print_info+0x18/0x18 [ 342.385894][T12453] ? ___ratelimit+0x3d1/0x560 [ 342.390761][T12453] ? __kasan_check_write+0x14/0x20 [ 342.395865][T12453] ? _raw_spin_lock+0x8e/0xe0 [ 342.400550][T12453] dump_stack+0x15/0x1c [ 342.404771][T12453] dump_header+0xdd/0x650 [ 342.409088][T12453] oom_kill_process+0x1fa/0x2c0 [ 342.413920][T12453] out_of_memory+0x94a/0xd70 [ 342.418494][T12453] ? unregister_oom_notifier+0x20/0x20 [ 342.424064][T12453] ? mutex_lock_killable+0x8c/0xe0 [ 342.429155][T12453] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 342.435721][T12453] mem_cgroup_out_of_memory+0x260/0x310 [ 342.441242][T12453] ? mem_cgroup_oom_trylock+0x350/0x350 [ 342.447128][T12453] ? _raw_spin_lock+0x8e/0xe0 [ 342.451787][T12453] ? _raw_spin_trylock_bh+0x130/0x130 [ 342.457237][T12453] ? _raw_spin_unlock+0x4d/0x70 [ 342.462367][T12453] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 342.468144][T12453] ? _raw_spin_unlock_irq+0x4e/0x70 [ 342.473323][T12453] try_charge+0xf61/0x14e0 [ 342.477716][T12453] ? __memcg_kmem_charge+0x140/0x140 [ 342.482978][T12453] ? percpu_counter_add_batch+0x13c/0x160 [ 342.488679][T12453] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 342.494217][T12453] __mem_cgroup_charge+0x14c/0x6d0 [ 342.499317][T12453] shmem_add_to_page_cache+0x55e/0xe10 [ 342.505042][T12453] ? shmem_alloc_page+0x300/0x300 [ 342.510394][T12453] ? _raw_spin_lock_irqsave+0x110/0x110 [ 342.515922][T12453] ? find_lock_entry+0x4b/0x200 [ 342.520834][T12453] ? lru_cache_add+0x164/0x380 [ 342.525571][T12453] ? shmem_getpage_gfp+0x8f3/0x2110 [ 342.530742][T12453] shmem_getpage_gfp+0x8e8/0x2110 [ 342.535754][T12453] shmem_write_begin+0xce/0x1b0 [ 342.540576][T12453] generic_perform_write+0x2be/0x510 [ 342.546122][T12453] ? atime_needs_update+0x5b0/0x5b0 [ 342.551308][T12453] ? grab_cache_page_write_begin+0xb0/0xb0 [ 342.557089][T12453] ? file_remove_privs+0x580/0x580 [ 342.562179][T12453] ? __kasan_check_write+0x14/0x20 [ 342.567262][T12453] ? down_write+0xac/0x110 [ 342.571678][T12453] __generic_file_write_iter+0x24b/0x480 [ 342.577286][T12453] ? generic_write_checks+0x3d4/0x480 [ 342.582751][T12453] generic_file_write_iter+0xa9/0x1d0 [ 342.588209][T12453] __kernel_write+0x55a/0x910 [ 342.593009][T12453] ? vfs_read+0xa10/0xa10 [ 342.597385][T12453] ? populate_vma_page_range+0xf0/0xf0 [ 342.602915][T12453] ? cgroup_freezing+0x86/0xb0 [ 342.607742][T12453] ? freezing_slow_path+0x10a/0x150 [ 342.612924][T12453] dump_emit+0x240/0x360 [ 342.617144][T12453] ? wait_for_dump_helpers+0x390/0x390 [ 342.622581][T12453] dump_user_range+0x6a/0x1a0 [ 342.627236][T12453] elf_core_dump+0x278a/0x2bc0 [ 342.631998][T12453] ? load_elf_binary+0x2890/0x2890 [ 342.637099][T12453] ? __fsnotify_parent+0x5ff/0x6c0 [ 342.642284][T12453] ? shmem_unused_huge_scan+0xa0/0xa0 [ 342.647728][T12453] ? do_truncate+0x1ad/0x210 [ 342.652294][T12453] ? putname+0xfe/0x150 [ 342.656425][T12453] ? __kasan_check_read+0x11/0x20 [ 342.661429][T12453] ? cgroup_freezing+0x86/0xb0 [ 342.666165][T12453] ? freezing_slow_path+0x10a/0x150 [ 342.671339][T12453] do_coredump+0x1ac9/0x27f0 [ 342.675909][T12453] ? simple_acl_create+0x1c0/0x1c0 [ 342.681017][T12453] ? debug_smp_processor_id+0x17/0x20 [ 342.686369][T12453] ? kmem_cache_free+0x100/0x2d0 [ 342.691373][T12453] ? ____kasan_slab_free+0x130/0x160 [ 342.696659][T12453] ? get_signal+0xb98/0x12e0 [ 342.701337][T12453] ? kmem_cache_free+0x100/0x2d0 [ 342.706352][T12453] get_signal+0xf23/0x12e0 [ 342.711099][T12453] arch_do_signal_or_restart+0xbf/0x10f0 [ 342.716798][T12453] ? __bad_area_nosemaphore+0x2b0/0x420 [ 342.722344][T12453] ? down_read_trylock+0x100/0x150 [ 342.727519][T12453] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 342.733123][T12453] ? bad_area+0x6a/0x80 [ 342.737255][T12453] exit_to_user_mode_loop+0xa2/0xe0 [ 342.742425][T12453] exit_to_user_mode_prepare+0x76/0xa0 [ 342.747891][T12453] irqentry_exit_to_user_mode+0x9/0x10 [ 342.753325][T12453] irqentry_exit+0x12/0x60 [ 342.757731][T12453] exc_page_fault+0x67/0xc0 [ 342.762215][T12453] ? asm_exc_page_fault+0x8/0x30 [ 342.767125][T12453] asm_exc_page_fault+0x1e/0x30 [ 342.771976][T12453] RIP: 0033:0x9c0a [ 342.775684][T12453] Code: Unable to access opcode bytes at RIP 0x9be0. [ 342.782351][T12453] RSP: 002b:00002000000000a8 EFLAGS: 00010217 [ 342.788403][T12453] RAX: 0000000000000000 RBX: 00007f30eb392090 RCX: 00007f30eb14aba9 [ 342.796349][T12453] RDX: 0000200000000240 RSI: 00002000000000a0 RDI: 0000000000200000 [ 342.804310][T12453] RBP: 00007f30eb1cde19 R08: 00002000000002c0 R09: 00002000000002c0 [ 342.812355][T12453] R10: 0000200000000280 R11: 0000000000000206 R12: 0000000000000000 [ 342.820309][T12453] R13: 00007f30eb392128 R14: 00007f30eb392090 R15: 00007ffd6f393348 [ 342.832912][T12453] memory: usage 307200kB, limit 307200kB, failcnt 24512 [ 342.840929][T12453] memory+swap: usage 424936kB, limit 9007199254740988kB, failcnt 0 [ 342.849081][T12453] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 342.856026][T12453] Memory cgroup stats for /syz0: [ 342.856157][T12453] anon 405504 [ 342.856157][T12453] file 306561024 [ 342.856157][T12453] kernel_stack 0 [ 342.856157][T12453] percpu 0 [ 342.856157][T12453] sock 0 [ 342.856157][T12453] shmem 306561024 [ 342.856157][T12453] file_mapped 0 [ 342.856157][T12453] file_dirty 0 [ 342.856157][T12453] file_writeback 0 [ 342.856157][T12453] anon_thp 0 [ 342.856157][T12453] inactive_anon 306597888 [ 342.856157][T12453] active_anon 7839744 [ 342.856157][T12453] inactive_file 196608 [ 342.856157][T12453] active_file 36864 [ 342.856157][T12453] unevictable 0 [ 342.856157][T12453] slab_reclaimable 0 [ 342.856157][T12453] slab_unreclaimable 0 [ 342.856157][T12453] slab 0 [ 342.856157][T12453] workingset_refault_anon 33 [ 342.856157][T12453] workingset_refault_file 9735 [ 342.856157][T12453] workingset_activate_anon 0 [ 342.856157][T12453] workingset_activate_file 5643 [ 342.856157][T12453] workingset_restore_anon 0 [ 342.856157][T12453] workingset_restore_file 4191 [ 342.955157][T12453] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.3261,pid=12476,uid=0 [ 343.023344][T12453] Memory cgroup out of memory: Killed process 12476 (syz.0.3261) total-vm:90100kB, anon-rss:1080kB, file-rss:34880kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 343.200509][T13206] device syzkaller0 entered promiscuous mode [ 343.866660][T12472] syz.0.3261 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 343.996948][T12472] CPU: 1 PID: 12472 Comm: syz.0.3261 Tainted: G W syzkaller #0 [ 344.005820][T12472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 344.015880][T12472] Call Trace: [ 344.019156][T12472] __dump_stack+0x21/0x24 [ 344.023462][T12472] dump_stack_lvl+0x169/0x1d8 [ 344.028115][T12472] ? show_regs_print_info+0x18/0x18 [ 344.033293][T12472] ? ___ratelimit+0x3d1/0x560 [ 344.038154][T12472] ? _raw_spin_lock+0x8e/0xe0 [ 344.042894][T12472] dump_stack+0x15/0x1c [ 344.047032][T12472] dump_header+0xdd/0x650 [ 344.051356][T12472] oom_kill_process+0x1fa/0x2c0 [ 344.056195][T12472] out_of_memory+0x94a/0xd70 [ 344.060786][T12472] ? unregister_oom_notifier+0x20/0x20 [ 344.066307][T12472] ? mutex_lock_killable+0x8c/0xe0 [ 344.071413][T12472] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 344.077904][T12472] mem_cgroup_out_of_memory+0x260/0x310 [ 344.083431][T12472] ? mem_cgroup_oom_trylock+0x350/0x350 [ 344.088952][T12472] ? _raw_spin_lock+0x8e/0xe0 [ 344.093605][T12472] ? _raw_spin_trylock_bh+0x130/0x130 [ 344.098948][T12472] ? _raw_spin_unlock+0x4d/0x70 [ 344.103779][T12472] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 344.109300][T12472] ? _raw_spin_unlock_irq+0x4e/0x70 [ 344.114496][T12472] try_charge+0xf61/0x14e0 [ 344.118902][T12472] ? __memcg_kmem_charge+0x140/0x140 [ 344.124177][T12472] ? percpu_counter_add_batch+0x13c/0x160 [ 344.129886][T12472] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 344.135412][T12472] __mem_cgroup_charge+0x14c/0x6d0 [ 344.140505][T12472] shmem_add_to_page_cache+0x55e/0xe10 [ 344.146080][T12472] ? shmem_alloc_page+0x300/0x300 [ 344.151083][T12472] ? find_lock_entry+0x4b/0x200 [ 344.155921][T12472] shmem_getpage_gfp+0x8e8/0x2110 [ 344.161044][T12472] shmem_write_begin+0xce/0x1b0 [ 344.165966][T12472] generic_perform_write+0x2be/0x510 [ 344.171237][T12472] ? atime_needs_update+0x5b0/0x5b0 [ 344.176439][T12472] ? grab_cache_page_write_begin+0xb0/0xb0 [ 344.182331][T12472] ? file_remove_privs+0x580/0x580 [ 344.187419][T12472] ? __kasan_check_write+0x14/0x20 [ 344.192506][T12472] ? down_write+0xac/0x110 [ 344.196898][T12472] __generic_file_write_iter+0x24b/0x480 [ 344.202601][T12472] ? generic_write_checks+0x3d4/0x480 [ 344.207975][T12472] generic_file_write_iter+0xa9/0x1d0 [ 344.213338][T12472] __kernel_write+0x55a/0x910 [ 344.217999][T12472] ? vfs_read+0xa10/0xa10 [ 344.222320][T12472] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 344.228478][T12472] ? populate_vma_page_range+0xf0/0xf0 [ 344.234018][T12472] ? cgroup_freezing+0x86/0xb0 [ 344.238888][T12472] ? freezing_slow_path+0x10a/0x150 [ 344.244344][T12472] dump_emit+0x240/0x360 [ 344.248599][T12472] ? wait_for_dump_helpers+0x390/0x390 [ 344.254242][T12472] ? dump_emit+0xa/0x360 [ 344.258590][T12472] dump_user_range+0x6a/0x1a0 [ 344.263267][T12472] elf_core_dump+0x278a/0x2bc0 [ 344.268048][T12472] ? load_elf_binary+0x2890/0x2890 [ 344.273233][T12472] ? __fsnotify_parent+0x5ff/0x6c0 [ 344.278329][T12472] ? shmem_unused_huge_scan+0xa0/0xa0 [ 344.283694][T12472] ? do_truncate+0x1ad/0x210 [ 344.288264][T12472] ? putname+0xfe/0x150 [ 344.292496][T12472] ? __kasan_check_read+0x11/0x20 [ 344.297688][T12472] ? cgroup_freezing+0x86/0xb0 [ 344.302523][T12472] ? freezing_slow_path+0x10a/0x150 [ 344.307806][T12472] do_coredump+0x1ac9/0x27f0 [ 344.312477][T12472] ? simple_acl_create+0x1c0/0x1c0 [ 344.317570][T12472] ? debug_smp_processor_id+0x17/0x20 [ 344.322920][T12472] ? kmem_cache_free+0x100/0x2d0 [ 344.327833][T12472] ? ____kasan_slab_free+0x130/0x160 [ 344.333096][T12472] ? get_signal+0xb98/0x12e0 [ 344.337663][T12472] ? kmem_cache_free+0x100/0x2d0 [ 344.342591][T12472] get_signal+0xf23/0x12e0 [ 344.346994][T12472] arch_do_signal_or_restart+0xbf/0x10f0 [ 344.352605][T12472] ? __bad_area_nosemaphore+0x2b0/0x420 [ 344.358126][T12472] ? down_read_trylock+0x100/0x150 [ 344.363217][T12472] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 344.368827][T12472] ? bad_area+0x6a/0x80 [ 344.373006][T12472] exit_to_user_mode_loop+0xa2/0xe0 [ 344.378181][T12472] exit_to_user_mode_prepare+0x76/0xa0 [ 344.383618][T12472] irqentry_exit_to_user_mode+0x9/0x10 [ 344.389053][T12472] irqentry_exit+0x12/0x60 [ 344.393453][T12472] exc_page_fault+0x67/0xc0 [ 344.397955][T12472] ? asm_exc_page_fault+0x8/0x30 [ 344.402872][T12472] asm_exc_page_fault+0x1e/0x30 [ 344.407701][T12472] RIP: 0033:0x9c0a [ 344.411405][T12472] Code: Unable to access opcode bytes at RIP 0x9be0. [ 344.418050][T12472] RSP: 002b:00002000000000a8 EFLAGS: 00010217 [ 344.424112][T12472] RAX: 0000000000000000 RBX: 00007f30eb392090 RCX: 00007f30eb14aba9 [ 344.432091][T12472] RDX: 0000200000000240 RSI: 00002000000000a0 RDI: 0000000000200000 [ 344.440162][T12472] RBP: 00007f30eb1cde19 R08: 00002000000002c0 R09: 00002000000002c0 [ 344.448113][T12472] R10: 0000200000000280 R11: 0000000000000206 R12: 0000000000000000 [ 344.456064][T12472] R13: 00007f30eb392128 R14: 00007f30eb392090 R15: 00007ffd6f393348 [ 344.590380][T13239] device veth1_macvtap entered promiscuous mode [ 344.608568][T13239] device macsec0 entered promiscuous mode [ 344.660026][T12472] memory: usage 307200kB, limit 307200kB, failcnt 26495 [ 344.752095][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 344.767542][T12472] memory+swap: usage 425996kB, limit 9007199254740988kB, failcnt 0 [ 344.809263][T12472] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 344.839912][T12472] Memory cgroup stats for /syz0: [ 344.840032][T12472] anon 270336 [ 344.840032][T12472] file 307912704 [ 344.840032][T12472] kernel_stack 0 [ 344.840032][T12472] percpu 0 [ 344.840032][T12472] sock 0 [ 344.840032][T12472] shmem 307912704 [ 344.840032][T12472] file_mapped 0 [ 344.840032][T12472] file_dirty 0 [ 344.840032][T12472] file_writeback 0 [ 344.840032][T12472] anon_thp 0 [ 344.840032][T12472] inactive_anon 306860032 [ 344.840032][T12472] active_anon 7569408 [ 344.840032][T12472] inactive_file 81920 [ 344.840032][T12472] active_file 0 [ 344.840032][T12472] unevictable 0 [ 344.840032][T12472] slab_reclaimable 0 [ 344.840032][T12472] slab_unreclaimable 0 [ 344.840032][T12472] slab 0 [ 344.840032][T12472] workingset_refault_anon 33 [ 344.840032][T12472] workingset_refault_file 10362 [ 344.840032][T12472] workingset_activate_anon 0 [ 344.840032][T12472] workingset_activate_file 6270 [ 344.840032][T12472] workingset_restore_anon 0 [ 344.840032][T12472] workingset_restore_file 4785 [ 344.968754][T13252] device veth0_vlan left promiscuous mode [ 344.986090][T13252] device veth0_vlan entered promiscuous mode [ 345.029116][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 345.030500][T12472] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.3261,pid=12447,uid=0 [ 345.089185][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 345.097110][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 345.179234][T12472] Memory cgroup out of memory: Killed process 12447 (syz.0.3261) total-vm:90100kB, anon-rss:1080kB, file-rss:33456kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 345.356416][ T27] oom_reaper: reaped process 12447 (syz.0.3261), now anon-rss:0kB, file-rss:35184kB, shmem-rss:0kB [ 345.375380][T12442] syz.0.3261 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 345.447864][T12442] CPU: 1 PID: 12442 Comm: syz.0.3261 Tainted: G W syzkaller #0 [ 345.456816][T12442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 345.466966][T12442] Call Trace: [ 345.470247][T12442] __dump_stack+0x21/0x24 [ 345.474671][T12442] dump_stack_lvl+0x169/0x1d8 [ 345.479487][T12442] ? show_regs_print_info+0x18/0x18 [ 345.484657][T12442] ? ___ratelimit+0x3d1/0x560 [ 345.489318][T12442] ? __kasan_check_write+0x14/0x20 [ 345.494416][T12442] ? _raw_spin_lock+0x8e/0xe0 [ 345.499275][T12442] dump_stack+0x15/0x1c [ 345.503420][T12442] dump_header+0xdd/0x650 [ 345.507742][T12442] oom_kill_process+0x1fa/0x2c0 [ 345.512583][T12442] out_of_memory+0x94a/0xd70 [ 345.517182][T12442] ? unregister_oom_notifier+0x20/0x20 [ 345.522630][T12442] ? mutex_lock_killable+0xd3/0xe0 [ 345.527751][T12442] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 345.534249][T12442] mem_cgroup_out_of_memory+0x260/0x310 [ 345.539790][T12442] ? mem_cgroup_oom_trylock+0x350/0x350 [ 345.545329][T12442] ? _raw_spin_lock+0x8e/0xe0 [ 345.550074][T12442] ? _raw_spin_trylock_bh+0x130/0x130 [ 345.555421][T12442] ? _raw_spin_unlock+0x4d/0x70 [ 345.560249][T12442] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 345.565769][T12442] ? _raw_spin_unlock_irq+0x4e/0x70 [ 345.570945][T12442] try_charge+0xf61/0x14e0 [ 345.575338][T12442] ? __memcg_kmem_charge+0x140/0x140 [ 345.580602][T12442] ? percpu_counter_add_batch+0x13c/0x160 [ 345.586304][T12442] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 345.591909][T12442] __mem_cgroup_charge+0x14c/0x6d0 [ 345.596999][T12442] shmem_add_to_page_cache+0x55e/0xe10 [ 345.602439][T12442] ? shmem_alloc_page+0x300/0x300 [ 345.607446][T12442] ? _raw_spin_lock_irqsave+0x110/0x110 [ 345.612973][T12442] ? find_lock_entry+0x4b/0x200 [ 345.617798][T12442] ? lru_cache_add+0x164/0x380 [ 345.622542][T12442] ? shmem_getpage_gfp+0x8f3/0x2110 [ 345.627727][T12442] shmem_getpage_gfp+0x8e8/0x2110 [ 345.632737][T12442] shmem_write_begin+0xce/0x1b0 [ 345.637563][T12442] generic_perform_write+0x2be/0x510 [ 345.642827][T12442] ? atime_needs_update+0x5b0/0x5b0 [ 345.648006][T12442] ? grab_cache_page_write_begin+0xb0/0xb0 [ 345.653789][T12442] ? file_remove_privs+0x580/0x580 [ 345.658878][T12442] ? __kasan_check_write+0x14/0x20 [ 345.663963][T12442] ? down_write+0xac/0x110 [ 345.668365][T12442] __generic_file_write_iter+0x24b/0x480 [ 345.674237][T12442] ? generic_write_checks+0x3d4/0x480 [ 345.679672][T12442] generic_file_write_iter+0xa9/0x1d0 [ 345.685024][T12442] __kernel_write+0x55a/0x910 [ 345.689703][T12442] ? vfs_read+0xa10/0xa10 [ 345.694011][T12442] ? populate_vma_page_range+0xf0/0xf0 [ 345.699447][T12442] ? cgroup_freezing+0x86/0xb0 [ 345.704190][T12442] ? freezing_slow_path+0x10a/0x150 [ 345.709367][T12442] dump_emit+0x240/0x360 [ 345.713679][T12442] ? wait_for_dump_helpers+0x390/0x390 [ 345.719121][T12442] dump_user_range+0x6a/0x1a0 [ 345.723798][T12442] elf_core_dump+0x278a/0x2bc0 [ 345.728800][T12442] ? load_elf_binary+0x2890/0x2890 [ 345.733973][T12442] ? __fsnotify_parent+0x5ff/0x6c0 [ 345.739066][T12442] ? shmem_unused_huge_scan+0xa0/0xa0 [ 345.744423][T12442] ? do_truncate+0x1ad/0x210 [ 345.748994][T12442] ? putname+0xfe/0x150 [ 345.753127][T12442] ? __kasan_check_read+0x11/0x20 [ 345.758132][T12442] ? cgroup_freezing+0x86/0xb0 [ 345.762872][T12442] ? freezing_slow_path+0x10a/0x150 [ 345.768043][T12442] do_coredump+0x1ac9/0x27f0 [ 345.772609][T12442] ? simple_acl_create+0x1c0/0x1c0 [ 345.777694][T12442] ? debug_smp_processor_id+0x17/0x20 [ 345.783045][T12442] ? kmem_cache_free+0x100/0x2d0 [ 345.788058][T12442] ? ____kasan_slab_free+0x130/0x160 [ 345.793321][T12442] ? get_signal+0xb98/0x12e0 [ 345.797885][T12442] ? kmem_cache_free+0x100/0x2d0 [ 345.802797][T12442] get_signal+0xf23/0x12e0 [ 345.807201][T12442] arch_do_signal_or_restart+0xbf/0x10f0 [ 345.812809][T12442] ? __bad_area_nosemaphore+0x2b0/0x420 [ 345.818328][T12442] ? down_read_trylock+0x100/0x150 [ 345.823413][T12442] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 345.829017][T12442] ? bad_area+0x6a/0x80 [ 345.833149][T12442] exit_to_user_mode_loop+0xa2/0xe0 [ 345.838321][T12442] exit_to_user_mode_prepare+0x76/0xa0 [ 345.843754][T12442] irqentry_exit_to_user_mode+0x9/0x10 [ 345.849187][T12442] irqentry_exit+0x12/0x60 [ 345.853581][T12442] exc_page_fault+0x67/0xc0 [ 345.858060][T12442] ? asm_exc_page_fault+0x8/0x30 [ 345.862977][T12442] asm_exc_page_fault+0x1e/0x30 [ 345.867800][T12442] RIP: 0033:0x9c0a [ 345.871516][T12442] Code: Unable to access opcode bytes at RIP 0x9be0. [ 345.878172][T12442] RSP: 002b:00002000000000a8 EFLAGS: 00010217 [ 345.884225][T12442] RAX: 0000000000000000 RBX: 00007f30eb392090 RCX: 00007f30eb14aba9 [ 345.892266][T12442] RDX: 0000200000000240 RSI: 00002000000000a0 RDI: 0000000000200000 [ 345.901410][T12442] RBP: 00007f30eb1cde19 R08: 00002000000002c0 R09: 00002000000002c0 [ 345.909453][T12442] R10: 0000200000000280 R11: 0000000000000206 R12: 0000000000000000 [ 345.917405][T12442] R13: 00007f30eb392128 R14: 00007f30eb392090 R15: 00007ffd6f393348 [ 346.056119][T12442] memory: usage 307044kB, limit 307200kB, failcnt 26595 [ 346.103828][T12442] memory+swap: usage 414152kB, limit 9007199254740988kB, failcnt 0 [ 346.123059][T12442] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 346.150626][T12442] Memory cgroup stats for /syz0: [ 346.150752][T12442] anon 270336 [ 346.150752][T12442] file 299937792 [ 346.150752][T12442] kernel_stack 0 [ 346.150752][T12442] percpu 0 [ 346.150752][T12442] sock 0 [ 346.150752][T12442] shmem 299937792 [ 346.150752][T12442] file_mapped 0 [ 346.150752][T12442] file_dirty 0 [ 346.150752][T12442] file_writeback 0 [ 346.150752][T12442] anon_thp 0 [ 346.150752][T12442] inactive_anon 299057152 [ 346.150752][T12442] active_anon 6893568 [ 346.150752][T12442] inactive_file 81920 [ 346.150752][T12442] active_file 0 [ 346.150752][T12442] unevictable 0 [ 346.150752][T12442] slab_reclaimable 0 [ 346.150752][T12442] slab_unreclaimable 0 [ 346.150752][T12442] slab 0 [ 346.150752][T12442] workingset_refault_anon 33 [ 346.150752][T12442] workingset_refault_file 10362 [ 346.150752][T12442] workingset_activate_anon 0 [ 346.150752][T12442] workingset_activate_file 6270 [ 346.150752][T12442] workingset_restore_anon 0 [ 346.150752][T12442] workingset_restore_file 4785 [ 346.446653][T12442] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.3261,pid=12444,uid=0 [ 346.468471][T12442] Memory cgroup out of memory: Killed process 12444 (syz.0.3261) total-vm:90100kB, anon-rss:1080kB, file-rss:32268kB, shmem-rss:0kB, UID:0 pgtables:196kB oom_score_adj:1000 [ 347.280022][T13318] device veth0_vlan left promiscuous mode [ 347.403601][T13318] device veth0_vlan entered promiscuous mode [ 347.610980][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.621659][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.631104][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.342568][T13339] device veth1_macvtap left promiscuous mode [ 348.349472][T13339] device macsec0 left promiscuous mode [ 349.126997][T13359] device sit0 left promiscuous mode [ 349.275854][T13360] device sit0 entered promiscuous mode [ 349.766615][T13382] @0Ù: renamed from bond_slave_1 [ 350.925576][T13405] device sit0 left promiscuous mode [ 351.216883][T13410] device wg2 left promiscuous mode [ 351.402222][T13410] device wg2 entered promiscuous mode [ 351.431899][T13414] device veth1_macvtap entered promiscuous mode [ 351.452477][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 351.697490][T13444] tap0: tun_chr_ioctl cmd 2147767507 [ 351.751346][T13444] tap0: tun_chr_ioctl cmd 35108 [ 351.777824][T13444] tap0: tun_chr_ioctl cmd 1074025673 [ 351.911688][T13457] device wg2 entered promiscuous mode [ 352.084999][T13476] FAULT_INJECTION: forcing a failure. [ 352.084999][T13476] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 352.110340][T13476] CPU: 1 PID: 13476 Comm: syz.2.3539 Tainted: G W syzkaller #0 [ 352.119396][T13476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 352.129450][T13476] Call Trace: [ 352.132756][T13476] __dump_stack+0x21/0x24 [ 352.137180][T13476] dump_stack_lvl+0x169/0x1d8 [ 352.141850][T13476] ? thaw_kernel_threads+0x220/0x220 [ 352.147140][T13476] ? show_regs_print_info+0x18/0x18 [ 352.152327][T13476] ? string+0x292/0x2b0 [ 352.156486][T13476] dump_stack+0x15/0x1c [ 352.160639][T13476] should_fail+0x3c1/0x510 [ 352.165060][T13476] should_fail_usercopy+0x1a/0x20 [ 352.170162][T13476] _copy_to_user+0x20/0x90 [ 352.174566][T13476] bpf_verifier_vlog+0x1b4/0x330 [ 352.179501][T13476] __btf_verifier_log+0xd1/0x120 [ 352.184435][T13476] ? unwind_get_return_address+0x4d/0x90 [ 352.190071][T13476] ? btf_check_sec_info+0x330/0x330 [ 352.195259][T13476] ? put_dec+0xd7/0xe0 [ 352.199328][T13476] __btf_verifier_log_type+0x387/0x610 [ 352.204863][T13476] ? format_decode+0x1bb/0x1520 [ 352.209744][T13476] ? btf_int_show+0x2bf0/0x2bf0 [ 352.214606][T13476] ? sort_r+0xe04/0xe20 [ 352.218780][T13476] btf_var_check_meta+0x379/0x550 [ 352.223806][T13476] btf_check_all_metas+0x230/0x820 [ 352.228908][T13476] ? __btf_verifier_log+0x120/0x120 [ 352.234095][T13476] btf_parse_type_sec+0xea/0x15a0 [ 352.239112][T13476] ? btf_check_sec_info+0x27a/0x330 [ 352.244320][T13476] ? btf_check_sec_info+0x330/0x330 [ 352.249520][T13476] ? btf_verifier_log+0x2a0/0x2a0 [ 352.254534][T13476] ? memcpy+0x56/0x70 [ 352.258520][T13476] ? btf_parse_hdr+0x5d6/0x7b0 [ 352.263277][T13476] ? btf_parse_str_sec+0x1aa/0x260 [ 352.268394][T13476] btf_new_fd+0x562/0xa00 [ 352.272715][T13476] bpf_btf_load+0x5e/0x70 [ 352.277037][T13476] __se_sys_bpf+0x48a/0x680 [ 352.281526][T13476] ? __x64_sys_bpf+0x90/0x90 [ 352.286130][T13476] ? debug_smp_processor_id+0x17/0x20 [ 352.291493][T13476] __x64_sys_bpf+0x7b/0x90 [ 352.295894][T13476] do_syscall_64+0x31/0x40 [ 352.300298][T13476] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 352.306197][T13476] RIP: 0033:0x7fb3299aaba9 [ 352.310605][T13476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 352.330207][T13476] RSP: 002b:00007fb328413038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 352.338620][T13476] RAX: ffffffffffffffda RBX: 00007fb329bf1fa0 RCX: 00007fb3299aaba9 [ 352.346587][T13476] RDX: 0000000000000028 RSI: 00002000000001c0 RDI: 0000000000000012 [ 352.354787][T13476] RBP: 00007fb328413090 R08: 0000000000000000 R09: 0000000000000000 [ 352.362744][T13476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 352.370792][T13476] R13: 00007fb329bf2038 R14: 00007fb329bf1fa0 R15: 00007fff97b2c408 [ 353.062018][T13500] ±ÿ: renamed from team_slave_1 [ 355.702732][T13606] tap0: tun_chr_ioctl cmd 1074025677 [ 355.708093][T13606] tap0: linktype set to 23 [ 355.758833][T13609] device syzkaller0 entered promiscuous mode [ 356.087222][T13641] device wg2 left promiscuous mode [ 358.301601][T13726] device sit0 entered promiscuous mode [ 358.530733][T13732] device pim6reg1 entered promiscuous mode [ 359.362929][T13756] device sit0 left promiscuous mode [ 359.526607][T13760] device sit0 entered promiscuous mode [ 359.876647][T13817] device pim6reg1 entered promiscuous mode [ 360.339606][T13830] device pim6reg1 entered promiscuous mode [ 360.992962][T13856] device sit0 left promiscuous mode [ 361.133687][T13862] device sit0 entered promiscuous mode [ 361.277952][T13866] device veth0_vlan left promiscuous mode [ 361.284466][T13866] device veth0_vlan entered promiscuous mode [ 362.893508][T13944] device veth0_vlan left promiscuous mode [ 362.900178][T13944] device veth0_vlan entered promiscuous mode [ 362.907613][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 362.959007][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 362.969785][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.284070][T13976] device pim6reg1 entered promiscuous mode [ 365.182024][T14062] device syzkaller0 entered promiscuous mode [ 365.822532][T14063] ÿÿÿÿÿÿ: renamed from vlan1 [ 365.911650][T14066] device pim6reg1 entered promiscuous mode [ 366.113731][T14086] device sit0 left promiscuous mode [ 366.198161][T14091] device sit0 entered promiscuous mode [ 366.927262][T14117] device pim6reg1 entered promiscuous mode [ 368.303911][T14176] device pim6reg1 entered promiscuous mode [ 369.200941][T14238] tap0: tun_chr_ioctl cmd 1074025677 [ 369.206273][T14238] tap0: linktype set to 769 [ 369.299438][T14242] device veth1_macvtap left promiscuous mode [ 369.490446][T14265] device syzkaller0 entered promiscuous mode [ 369.647677][T14287] device syzkaller0 entered promiscuous mode [ 369.775331][T14307] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.782896][T14307] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.788959][T14315] syz.3.3767[14315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.790794][T14315] syz.3.3767[14315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.809917][T14307] device bridge_slave_1 left promiscuous mode [ 369.834502][T14307] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.843386][T14307] device bridge_slave_0 left promiscuous mode [ 369.850707][T14307] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.360471][T14359] device sit0 left promiscuous mode [ 370.695728][T14363] device sit0 entered promiscuous mode [ 371.858514][T14404] device veth0_vlan left promiscuous mode [ 371.961722][T14404] device veth0_vlan entered promiscuous mode [ 372.929289][T14457] device sit0 left promiscuous mode [ 373.056515][T14464] device sit0 entered promiscuous mode [ 373.091161][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.131298][T14462] device veth0_vlan left promiscuous mode [ 373.137578][T14462] device veth0_vlan entered promiscuous mode [ 373.223738][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.246030][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.302601][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 373.321103][T14474] device veth1_macvtap left promiscuous mode [ 373.329345][T14474] device macsec0 entered promiscuous mode [ 374.048905][T14505] device pim6reg1 entered promiscuous mode [ 374.060793][T14507] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 374.174931][T14507] device syzkaller0 entered promiscuous mode [ 374.303629][T14516] device syzkaller0 entered promiscuous mode [ 375.459589][T14591] device wg2 left promiscuous mode [ 376.043000][T14638] syz.3.3854[14638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.043071][T14638] syz.3.3854[14638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.230097][T14647] device sit0 left promiscuous mode [ 376.622869][T14647] device sit0 entered promiscuous mode [ 377.368553][ T24] audit: type=1400 audit(1757931173.329:169): avc: denied { create } for pid=14692 comm="syz.3.3868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 377.400347][T14702] device veth1_macvtap left promiscuous mode [ 377.646605][T14702] -1: renamed from syzkaller0 [ 377.920058][T14721] device sit0 left promiscuous mode [ 378.474715][T14748] device syzkaller0 entered promiscuous mode [ 378.673716][T14755] device sit0 left promiscuous mode [ 379.077588][T14781] device syzkaller0 entered promiscuous mode [ 379.472439][T14801] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.479655][T14801] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.017369][T14833] device pim6reg1 entered promiscuous mode [ 380.496107][T14861] device sit0 left promiscuous mode [ 380.683768][T14856] device sit0 entered promiscuous mode [ 381.309225][T14898] device syzkaller0 entered promiscuous mode [ 381.963810][T14923] device sit0 entered promiscuous mode [ 383.296379][T14950] device syzkaller0 entered promiscuous mode [ 383.314615][T14962] device wg2 entered promiscuous mode [ 383.824133][T14981] device wg2 entered promiscuous mode [ 384.963500][T15046] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 385.173668][T15086] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 385.235282][ T5446] syzkaller0: tun_net_xmit 76 [ 385.240438][T15085] syzkaller0: create flow: hash 559742993 index 1 [ 385.247016][ T5446] syzkaller0: tun_net_xmit 48 [ 385.259232][ C0] syzkaller0: tun_net_xmit 76 [ 385.272576][T15085] device pim6reg1 entered promiscuous mode [ 385.286545][T15086] device veth1_macvtap left promiscuous mode [ 385.302738][T15085] syzkaller0: delete flow: hash 559742993 index 1 [ 385.985548][T15162] device syzkaller0 entered promiscuous mode [ 386.103384][T15141] ªªªªªª: renamed from vlan0 [ 387.529282][T15252] lo: mtu less than device minimum [ 391.799234][T15399] device sit0 entered promiscuous mode [ 392.313542][T15427] device wg2 left promiscuous mode [ 395.431590][T15493] device syzkaller0 entered promiscuous mode [ 395.768042][T15524] device syzkaller0 entered promiscuous mode [ 396.071597][T15542] device syzkaller0 entered promiscuous mode [ 396.739043][T15551] syz.0.4108[15551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.755669][T15551] syz.0.4108[15551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.919870][T15607] device veth1_macvtap left promiscuous mode [ 397.968795][T15607] device macsec0 entered promiscuous mode [ 398.137161][T15609] device sit0 left promiscuous mode [ 400.006295][T15665] device sit0 left promiscuous mode [ 400.085612][T15679] syz.3.4146[15679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.085695][T15679] syz.3.4146[15679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.179672][T15683] device sit0 entered promiscuous mode [ 400.289725][T15680] syz.3.4146[15680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.289828][T15680] syz.3.4146[15680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.774923][T15766] device wg2 left promiscuous mode [ 402.918104][T15772] syz.0.4174[15772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.918448][T15772] syz.0.4174[15772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.628735][T15818] device sit0 left promiscuous mode [ 408.087625][T15910] device veth0_vlan left promiscuous mode [ 408.105171][T15910] device veth0_vlan entered promiscuous mode [ 408.146503][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 408.270510][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 408.373237][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 408.700996][T15918] tun0: tun_chr_ioctl cmd 1074025676 [ 408.706391][T15918] tun0: owner set to 0 [ 408.909243][T15931] device wg2 entered promiscuous mode [ 410.833708][T16029] device pim6reg1 entered promiscuous mode [ 411.048442][T16037] device pim6reg1 entered promiscuous mode [ 411.329820][T16059] syz.2.4252[16059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.329875][T16059] syz.2.4252[16059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.448919][T16066] sit0: mtu less than device minimum [ 412.888862][T16121] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.903005][T16121] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.048386][T16121] device bridge_slave_0 entered promiscuous mode [ 413.314129][T16121] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.411022][T16121] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.418306][T16121] device bridge_slave_1 entered promiscuous mode [ 414.161342][T16161] syz.4.4280[16161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.161406][T16161] syz.4.4280[16161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.196817][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 414.267095][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 414.298741][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 414.319419][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 414.327654][ T1496] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.334705][ T1496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 414.368913][T16121] device veth0_vlan entered promiscuous mode [ 414.383284][T16121] device veth1_macvtap entered promiscuous mode [ 414.410108][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 414.428852][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 414.438145][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 414.456954][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.469673][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.487403][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.519646][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 414.533466][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 414.547993][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 414.564386][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 414.619973][ T1496] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.627084][ T1496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 414.655775][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 414.670383][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 415.041127][T16187] syz.1.4286[16187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.041216][T16187] syz.1.4286[16187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.650712][ T304] device veth0_to_team left promiscuous mode [ 415.737128][ T304] Ÿë: port 1(veth0_to_team) entered disabled state [ 416.125720][T16211] device wg2 entered promiscuous mode [ 416.226896][T16227] syz.1.4295[16227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.226956][T16227] syz.1.4295[16227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.289503][T16233] syz.2.4298[16233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.337896][T16233] syz.2.4298[16233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.366362][T16226] device veth0_vlan left promiscuous mode [ 416.386437][T16226] device veth0_vlan entered promiscuous mode [ 416.394958][T16231] device wg2 left promiscuous mode [ 416.412956][T16223] device wg2 entered promiscuous mode [ 416.434559][T16233] device pim6reg1 entered promiscuous mode [ 417.223502][T16275] device wg2 left promiscuous mode [ 417.678852][T16290] @ÿ: renamed from bond_slave_0 [ 417.697138][T16300] bridge0: port 3(veth1) entered blocking state [ 417.710139][T16300] bridge0: port 3(veth1) entered disabled state [ 417.814127][T16300] device veth1 entered promiscuous mode [ 417.848200][T16300] bridge0: port 3(veth1) entered blocking state [ 417.858825][T16300] bridge0: port 3(veth1) entered forwarding state [ 418.545747][ T24] audit: type=1400 audit(1757931214.509:170): avc: denied { associate } for pid=16347 comm="syz.1.4333" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 419.369037][T16400] device syzkaller0 entered promiscuous mode [ 420.232308][T16451] tap0: tun_chr_ioctl cmd 35108 [ 420.415564][T16469] device sit0 left promiscuous mode [ 420.466896][T16460] device sit0 entered promiscuous mode [ 420.901031][T16475] device sit0 entered promiscuous mode [ 421.150109][T16506] device wg2 left promiscuous mode [ 421.205888][T16506] device wg2 entered promiscuous mode [ 421.218985][T16516] device pim6reg1 entered promiscuous mode [ 422.202729][T16589] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.925512][T16597] device syzkaller0 entered promiscuous mode [ 424.249055][T16664] device pim6reg1 entered promiscuous mode [ 424.267500][T16671] device pim6reg1 entered promiscuous mode [ 424.384374][T16683] device wg2 left promiscuous mode [ 424.563374][T16683] device wg2 entered promiscuous mode [ 425.431774][T16730] device syzkaller0 entered promiscuous mode [ 425.475177][T16730] device pim6reg1 entered promiscuous mode [ 426.417902][T16774] device macsec0 left promiscuous mode [ 426.495211][T16787] Â: renamed from pim6reg1 [ 430.108838][T16942] device pim6reg1 entered promiscuous mode [ 430.504098][T16951] device lo entered promiscuous mode [ 430.683162][T16972] device pim6reg1 entered promiscuous mode [ 432.924403][T17082] device bridge_slave_1 left promiscuous mode [ 432.954313][T17082] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.969959][T17082] device bridge_slave_0 left promiscuous mode [ 432.976327][T17082] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.062354][T17085] device syzkaller0 entered promiscuous mode [ 433.926192][T17100] device syzkaller0 entered promiscuous mode [ 434.046826][T17125] device syzkaller0 entered promiscuous mode [ 434.245335][T17132] device wg2 left promiscuous mode [ 434.758773][T17174] ÿÿÿÿÿÿ: renamed from vlan1 [ 435.495878][T17190] device syzkaller0 entered promiscuous mode [ 435.686353][T17212] device wg2 entered promiscuous mode [ 435.938776][T17232] device wg2 entered promiscuous mode [ 436.455720][T17275] device pim6reg1 entered promiscuous mode [ 437.562799][T17328] device syzkaller0 entered promiscuous mode [ 437.836988][T17348] device pim6reg1 entered promiscuous mode [ 439.254504][T17390] device sit0 entered promiscuous mode [ 439.384205][T17395] device sit0 left promiscuous mode [ 439.484797][T17395] device sit0 entered promiscuous mode [ 440.398147][T17407] device syzkaller0 entered promiscuous mode [ 441.901718][T17493] syz.2.4656[17493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.901794][T17493] syz.2.4656[17493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.950887][T17495] syz.2.4656[17495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.726034][T17525] Ÿë: port 1(veth0_to_team) entered blocking state [ 442.759265][T17525] Ÿë: port 1(veth0_to_team) entered disabled state [ 442.775612][T17525] device veth0_to_team entered promiscuous mode [ 443.128813][T17566] device syzkaller0 entered promiscuous mode [ 443.421699][T17578] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 443.441229][T17587] device syzkaller0 entered promiscuous mode [ 444.220807][T17659] syz.3.4705[17659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.220860][T17659] syz.3.4705[17659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.786647][T17669] syz.3.4705[17669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.847302][T17669] syz.3.4705[17669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.049771][T17705] syz.2.4718[17705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.063696][T17705] syz.2.4718[17705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.516680][T17729] device pim6reg1 entered promiscuous mode [ 450.495244][T17766] device sit0 left promiscuous mode [ 450.630758][T17774] device pim6reg1 entered promiscuous mode [ 450.638536][T17766] device sit0 entered promiscuous mode [ 454.571107][T17925] device syzkaller0 entered promiscuous mode [ 455.129730][T17987] device sit0 left promiscuous mode [ 455.154218][T17987] device sit0 entered promiscuous mode [ 457.096353][T18045] device syzkaller0 entered promiscuous mode [ 458.213699][T18084] device syzkaller0 entered promiscuous mode [ 458.316151][T18078] device syzkaller0 entered promiscuous mode [ 458.966552][T18096] device macsec0 left promiscuous mode [ 459.421850][T18132] device veth0_vlan left promiscuous mode [ 459.514181][T18132] device veth0_vlan entered promiscuous mode [ 459.829963][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 459.856576][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 459.928906][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 460.395560][T18164] device syzkaller0 entered promiscuous mode [ 461.755288][T18216] device sit0 left promiscuous mode [ 461.835129][T18221] device sit0 left promiscuous mode [ 461.858106][T18230] device sit0 entered promiscuous mode [ 462.152707][T18255] device pim6reg1 entered promiscuous mode [ 463.445144][T18284] tap0: tun_chr_ioctl cmd 1074025677 [ 463.454725][T18284] tap0: linktype set to 825 [ 463.635028][T18302] device syzkaller0 entered promiscuous mode [ 465.815849][T18357] device syzkaller0 entered promiscuous mode [ 468.000368][T18410] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.007441][T18410] bridge0: port 1(bridge_slave_0) entered forwarding state [ 468.049278][T18410] device bridge0 entered promiscuous mode [ 468.292435][T18449] device veth1_macvtap entered promiscuous mode [ 468.322496][T18449] device macsec0 entered promiscuous mode [ 468.400787][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 468.576872][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 469.147070][T18503] device sit0 entered promiscuous mode [ 469.357315][T18517] device wg2 entered promiscuous mode [ 469.775871][T18541] device wg2 left promiscuous mode [ 470.267337][T18558] device syzkaller0 entered promiscuous mode [ 471.341134][T18617] device sit0 left promiscuous mode [ 471.354219][T18620] syz.1.4976[18620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.354290][T18620] syz.1.4976[18620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.158268][T18621] device sit0 entered promiscuous mode [ 472.832432][T18667] device syzkaller0 entered promiscuous mode [ 474.041784][T18742] syz.0.5008[18742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.041843][T18742] syz.0.5008[18742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.105440][T18746] device wg2 left promiscuous mode [ 474.191468][T18751] device pim6reg1 entered promiscuous mode [ 475.212849][T18775] device veth0_vlan left promiscuous mode [ 475.377907][T18775] device veth0_vlan entered promiscuous mode [ 476.085255][T18827] syz.1.5032[18827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.085312][T18827] syz.1.5032[18827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.262343][T18895] device wg2 left promiscuous mode [ 477.369457][T18899] syz.0.5053[18899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.369540][T18899] syz.0.5053[18899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.452290][T18895] device wg2 entered promiscuous mode [ 478.342327][T18966] device sit0 entered promiscuous mode [ 480.468606][T19052] device pim6reg1 entered promiscuous mode [ 480.504790][T19045] device pim6reg1 entered promiscuous mode [ 480.722247][T19060] syz.3.5098[19060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.722307][T19060] syz.3.5098[19060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.758404][T19060] syz.3.5098[19060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.787525][T19060] syz.3.5098[19060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.162035][T19087] bridge0: port 1(bridge_slave_0) entered disabled state [ 481.203138][T19087] device bridge0 left promiscuous mode [ 481.365823][T19093] device bridge_slave_1 left promiscuous mode [ 481.373451][T19093] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.381755][T19093] device bridge_slave_0 left promiscuous mode [ 481.388015][T19093] bridge0: port 1(bridge_slave_0) entered disabled state [ 481.926274][T19132] device sit0 left promiscuous mode [ 481.977321][T19132] device sit0 entered promiscuous mode [ 482.653331][T19154] syz.3.5123[19154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.658094][T19154] syz.3.5123[19154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.723447][T19159] device pim6reg1 entered promiscuous mode [ 483.973646][T19203] device syzkaller0 entered promiscuous mode [ 484.065855][T19202] device pim6reg1 entered promiscuous mode [ 485.029939][T19211] device pim6reg1 entered promiscuous mode [ 485.967544][ T24] audit: type=1400 audit(1757931281.929:171): avc: denied { setattr } for pid=19228 comm="syz.0.5144" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 485.992638][T19229] device pim6reg1 entered promiscuous mode [ 486.041307][T19239] device sit0 entered promiscuous mode [ 486.580400][T19247] device syzkaller0 entered promiscuous mode [ 486.603046][T19253] device pim6reg1 entered promiscuous mode [ 486.657328][T19262] sock: sock_set_timeout: `syz.4.5154' (pid 19262) tries to set negative timeout [ 486.714243][T19267] tap0: tun_chr_ioctl cmd 2147767507 [ 487.791789][T19328] device syzkaller0 entered promiscuous mode [ 488.267993][T19340] device wg2 left promiscuous mode [ 488.313043][T19349] cgroup: fork rejected by pids controller in /syz3 [ 488.937958][T19472] device syzkaller0 entered promiscuous mode [ 489.317769][T19480] device syzkaller0 entered promiscuous mode [ 489.507743][T19487] bridge0: port 1(bridge_slave_0) entered blocking state [ 489.515020][T19487] bridge0: port 1(bridge_slave_0) entered disabled state [ 489.522924][T19487] device bridge_slave_0 entered promiscuous mode [ 489.538241][T19487] bridge0: port 2(bridge_slave_1) entered blocking state [ 489.589198][T19487] bridge0: port 2(bridge_slave_1) entered disabled state [ 489.596834][T19487] device bridge_slave_1 entered promiscuous mode [ 489.903959][T19487] bridge0: port 2(bridge_slave_1) entered blocking state [ 489.911063][T19487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 489.918349][T19487] bridge0: port 1(bridge_slave_0) entered blocking state [ 489.925516][T19487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 490.238375][ T1496] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.249039][ T1496] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.557658][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 490.579520][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 490.599695][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 490.629358][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 490.637753][ T1496] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.644986][ T1496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 490.652827][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 490.661490][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 490.670155][ T1496] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.677202][ T1496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 490.714820][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 490.734254][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 490.753063][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 490.826636][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 490.896483][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 490.967112][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 491.045023][T19487] device veth0_vlan entered promiscuous mode [ 491.052565][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 491.074638][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 491.105614][T19487] device veth1_macvtap entered promiscuous mode [ 491.122026][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 491.131096][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 491.138932][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 491.157018][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 491.171274][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 491.223445][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 491.235105][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 491.254374][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 491.274073][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 492.117061][T19630] device pim6reg1 entered promiscuous mode [ 492.281864][T19661] syz.3.5230[19661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.281922][T19661] syz.3.5230[19661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.314020][T19659] device wg2 entered promiscuous mode [ 493.559364][T19724] device syzkaller0 entered promiscuous mode [ 494.170230][T19761] device wg2 left promiscuous mode [ 494.229856][T19761] device wg2 entered promiscuous mode [ 494.588399][T19784] device veth0_vlan left promiscuous mode [ 494.759391][T19784] device veth0_vlan entered promiscuous mode [ 495.039707][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 495.060083][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 495.069094][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 495.118340][T19802] device pim6reg1 entered promiscuous mode [ 500.226160][T19954] device veth0_vlan left promiscuous mode [ 500.379971][T19954] device veth0_vlan entered promiscuous mode [ 500.386856][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 500.406058][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 500.482573][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 501.356074][T19994] device syzkaller0 entered promiscuous mode [ 501.389750][T19987] device wg2 entered promiscuous mode [ 501.848396][T20021] syz.4.5325[20021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.848526][T20021] syz.4.5325[20021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 502.771493][T20057] device wg2 entered promiscuous mode [ 504.314349][T20118] device syzkaller0 entered promiscuous mode [ 504.650004][T20123] device wg2 left promiscuous mode [ 504.657663][T20123] syz.1.5354[20123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.657701][T20123] syz.1.5354[20123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.750938][T20123] device wg2 entered promiscuous mode [ 505.025465][T20144] device wg2 left promiscuous mode [ 505.060313][T20140] device wg2 entered promiscuous mode [ 505.304755][T20157] device syzkaller0 entered promiscuous mode [ 505.592237][T20205] device sit0 left promiscuous mode [ 506.688634][T20239] device syzkaller0 entered promiscuous mode [ 506.993894][T20256] device sit0 left promiscuous mode [ 507.276753][T20254] device sit0 entered promiscuous mode [ 508.514296][T20281] device pim6reg1 entered promiscuous mode [ 508.632434][T20288] device syzkaller0 entered promiscuous mode [ 508.741023][T20301] device pim6reg1 entered promiscuous mode [ 508.807643][T20316] ÿÿÿÿÿÿ: renamed from vlan1 [ 508.859198][T20324] device bridge0 entered promiscuous mode [ 509.140671][T20342] syz.1.5415[20342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.140767][T20342] syz.1.5415[20342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.159870][T20344] device veth1_macvtap left promiscuous mode [ 509.303268][T20352] device veth1_macvtap entered promiscuous mode [ 509.312864][T20352] device macsec0 entered promiscuous mode [ 509.702074][T20366] syz.1.5421[20366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.702161][T20366] syz.1.5421[20366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.270064][T20432] device syzkaller0 entered promiscuous mode [ 511.332655][T20432] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 512.377565][T20486] ref_ctr_offset mismatch. inode: 0x53d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 512.710116][T20515] syz.1.5463[20515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 512.710173][T20515] syz.1.5463[20515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 513.134355][T20515] device veth0_vlan left promiscuous mode [ 513.213338][T20515] device veth0_vlan entered promiscuous mode [ 513.272828][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 513.282528][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 513.290292][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 514.649734][T20608] syz.0.5493[20608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 514.649820][T20608] syz.0.5493[20608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 514.724088][T20616] device syzkaller0 entered promiscuous mode [ 515.056639][T20641] device veth1_macvtap left promiscuous mode [ 515.063323][T20641] device macsec0 entered promiscuous mode [ 515.407259][T20709] device wg2 left promiscuous mode [ 515.446904][T20714] device wg2 entered promiscuous mode [ 515.464533][T20716] device syzkaller0 entered promiscuous mode [ 515.575767][T20721] device sit0 left promiscuous mode [ 516.157027][T20743] device sit0 left promiscuous mode [ 517.178545][T20782] device syzkaller0 entered promiscuous mode [ 517.320635][T20786] device pim6reg1 entered promiscuous mode [ 518.050948][T20812] device macsec0 left promiscuous mode [ 518.140927][T20830] device pim6reg1 entered promiscuous mode [ 518.155676][T20825] device sit0 entered promiscuous mode [ 518.228705][T20840] device wg2 entered promiscuous mode [ 519.093596][T20864] device macsec0 left promiscuous mode [ 519.204359][T20868] device wg2 left promiscuous mode [ 519.444728][T20876] syz.2.5571[20876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 519.444779][T20876] syz.2.5571[20876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 520.194029][T20933] bridge0: port 3(veth1) entered disabled state [ 520.221167][T20933] bridge0: port 2(bridge_slave_1) entered disabled state [ 520.236195][T20933] bridge0: port 1(bridge_slave_0) entered disabled state [ 520.582161][T20939] device veth1 left promiscuous mode [ 520.587553][T20939] bridge0: port 3(veth1) entered disabled state [ 520.612942][T20939] device bridge_slave_1 left promiscuous mode [ 520.669285][T20939] bridge0: port 2(bridge_slave_1) entered disabled state [ 520.679541][T20939] device bridge_slave_0 left promiscuous mode [ 520.689444][T20939] bridge0: port 1(bridge_slave_0) entered disabled state [ 520.977290][T20960] device pim6reg1 entered promiscuous mode [ 521.067454][T20968] device pim6reg1 entered promiscuous mode [ 521.219539][T20973] device sit0 left promiscuous mode [ 522.072497][T20982] device sit0 entered promiscuous mode [ 522.086894][T20983] device sit0 entered promiscuous mode [ 523.464709][T21047] device wg2 left promiscuous mode [ 523.559875][T21047] device wg2 entered promiscuous mode [ 523.568527][T21054] syz.1.5623[21054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 523.568590][T21054] syz.1.5623[21054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.462931][T21109] device syzkaller0 entered promiscuous mode [ 525.074294][T21153] device wg2 left promiscuous mode [ 525.088818][T21143] ref_ctr_offset mismatch. inode: 0x1f5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 525.767080][T21172] device pim6reg1 entered promiscuous mode [ 525.808623][T21174] device veth0_vlan left promiscuous mode [ 525.819704][T21174] device veth0_vlan entered promiscuous mode [ 525.841448][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 525.884647][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 525.918236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 527.314514][T21257] device sit0 entered promiscuous mode [ 527.916551][T21279] device wg2 left promiscuous mode [ 527.971141][T21279] device wg2 entered promiscuous mode [ 528.356985][T21300] device pim6reg1 entered promiscuous mode [ 528.507905][T21308] device syzkaller0 entered promiscuous mode [ 532.139658][T21505] device syzkaller0 entered promiscuous mode [ 532.618865][ T24] audit: type=1400 audit(1757931328.579:172): avc: denied { create } for pid=21544 comm="syz.0.5763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 532.884519][T21553] Ÿë: port 1(veth0_vlan) entered blocking state [ 532.895671][T21553] Ÿë: port 1(veth0_vlan) entered disabled state [ 534.253114][T21612] device veth1_to_team entered promiscuous mode [ 534.270225][T21613] device pim6reg1 entered promiscuous mode [ 534.343185][T21626] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 534.355236][T21626] device syzkaller0 entered promiscuous mode [ 534.881157][T21656] device pim6reg1 entered promiscuous mode [ 535.350535][T21681] device pim6reg1 entered promiscuous mode [ 536.442462][T21715] device syzkaller0 entered promiscuous mode [ 537.128699][T21746] device syzkaller0 entered promiscuous mode [ 538.489573][T21837] device syzkaller0 entered promiscuous mode [ 539.325328][T21890] device wg2 left promiscuous mode [ 539.333251][T21890] device wg2 entered promiscuous mode [ 539.993290][T21914] device wg2 left promiscuous mode [ 540.140120][T21920] device wg2 entered promiscuous mode [ 541.593167][T21998] device pim6reg1 entered promiscuous mode [ 541.787098][T22023] device pim6reg1 entered promiscuous mode [ 542.041534][T22047] device macsec0 entered promiscuous mode [ 542.669511][T22087] syz.4.5912[22087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.669600][T22087] syz.4.5912[22087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.965179][T22098] syz.0.5916[22098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.043074][T22089] syz.1.5913[22089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.102978][T22098] syz.0.5916[22098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.155547][T22089] syz.1.5913[22089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.379194][T22115] device wg2 entered promiscuous mode [ 544.331020][T22138] device syzkaller0 entered promiscuous mode [ 544.658777][T22158] bridge0: port 1(bridge_slave_0) entered blocking state [ 544.673258][T22158] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.685134][T22158] device bridge_slave_0 entered promiscuous mode [ 544.707729][T22158] bridge0: port 2(bridge_slave_1) entered blocking state [ 544.729899][T22158] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.756150][T22158] device bridge_slave_1 entered promiscuous mode [ 544.898041][T22158] bridge0: port 2(bridge_slave_1) entered blocking state [ 544.905129][T22158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 544.912611][T22158] bridge0: port 1(bridge_slave_0) entered blocking state [ 544.919789][T22158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 544.943186][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 544.951004][ T1496] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.958276][ T1496] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.967403][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 544.975819][ T1496] bridge0: port 1(bridge_slave_0) entered blocking state [ 544.982888][ T1496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 544.993027][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 545.001397][ T1496] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.008432][ T1496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 545.020135][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 545.029815][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 545.044747][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 545.056405][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 545.064785][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 545.072478][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 545.082568][T22158] device veth0_vlan entered promiscuous mode [ 545.092647][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 545.101795][T22158] device veth1_macvtap entered promiscuous mode [ 545.111438][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 545.126602][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 545.674219][T22206] device syzkaller0 entered promiscuous mode [ 545.709276][T22214] device pim6reg1 entered promiscuous mode [ 546.068276][T22218] device pim6reg1 entered promiscuous mode [ 546.087360][T22215] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.100644][T22215] bridge0: port 1(bridge_slave_0) entered disabled state [ 546.108017][T22215] device bridge_slave_0 entered promiscuous mode [ 546.124678][T22220] device wg2 entered promiscuous mode [ 546.142313][T22215] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.150042][T22215] bridge0: port 2(bridge_slave_1) entered disabled state [ 546.157573][T22215] device bridge_slave_1 entered promiscuous mode [ 546.174196][T22220] 7B’ç÷ï: renamed from syzkaller0 [ 546.210795][T22227] device pim6reg1 entered promiscuous mode [ 546.350066][ T7] device veth1_macvtap left promiscuous mode [ 546.532352][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 546.544793][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 546.553187][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 546.560946][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 546.568375][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 546.577115][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 546.585336][ T1496] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.592584][ T1496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 546.600339][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 546.608817][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 546.617039][ T1496] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.624194][ T1496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 546.631872][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 546.652359][T22215] device veth0_vlan entered promiscuous mode [ 546.672188][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 546.749895][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 546.765291][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 546.774216][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 546.785679][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 546.809481][T22263] device veth1_macvtap left promiscuous mode [ 546.816173][T22263] device macsec0 left promiscuous mode [ 547.010565][T22215] device veth1_macvtap entered promiscuous mode [ 547.027060][T22263] device veth1_macvtap entered promiscuous mode [ 547.049235][T22263] device macsec0 entered promiscuous mode [ 547.154820][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 547.193364][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 548.519955][T22328] device sit0 entered promiscuous mode [ 549.198890][ T7] Ÿë: port 1(veth0_vlan) entered disabled state [ 549.805574][ T24] audit: type=1400 audit(1757931345.769:173): avc: denied { create } for pid=22380 comm="syz.3.5990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 550.557515][T22405] ÿ: renamed from bond_slave_0 [ 550.954236][T22420] device sit0 left promiscuous mode [ 551.136762][T22420] device sit0 entered promiscuous mode [ 553.368237][T22527] device pim6reg1 entered promiscuous mode [ 554.359628][T22557] device lo entered promiscuous mode [ 554.762061][T22584] device syzkaller0 entered promiscuous mode [ 556.102680][T22654] device syzkaller0 entered promiscuous mode [ 556.684107][T22668] device sit0 left promiscuous mode [ 559.982433][T22810] device pim6reg1 entered promiscuous mode [ 560.063774][T22827] device pim6reg1 entered promiscuous mode [ 560.243695][T22839] device wg2 left promiscuous mode [ 560.308798][T22842] device pim6reg1 entered promiscuous mode [ 561.472084][T22899] bridge0: port 2(bridge_slave_1) entered disabled state [ 561.479286][T22899] bridge0: port 1(bridge_slave_0) entered disabled state [ 561.787663][T22899] device bridge_slave_1 left promiscuous mode [ 561.896625][T22899] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.146633][T22899] device bridge_slave_0 left promiscuous mode [ 562.161050][T22899] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.342399][T22905] device syzkaller0 entered promiscuous mode [ 563.310732][T22945] device wg2 entered promiscuous mode [ 563.999652][T23012] device wg2 left promiscuous mode [ 564.050231][T23012] device wg2 entered promiscuous mode [ 564.093240][T23030] device wg2 left promiscuous mode [ 564.423520][T23036] device wg2 left promiscuous mode [ 564.675880][T23082] device pim6reg1 entered promiscuous mode [ 565.159373][T23100] device veth1_macvtap left promiscuous mode [ 565.761295][T23117] device syzkaller0 entered promiscuous mode [ 568.741545][T23260] device pim6reg1 entered promiscuous mode [ 568.978860][T23260] ÿÿÿÿÿÿ: renamed from vlan1 [ 569.583376][T23277] syz.1.6243[23277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 569.583436][T23277] syz.1.6243[23277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 570.263270][T23308] ÿ: renamed from team_slave_1 [ 570.630600][T23323] device pim6reg1 entered promiscuous mode [ 570.913493][T23363] device pim6reg1 entered promiscuous mode [ 571.774615][T23391] device syzkaller0 entered promiscuous mode [ 572.701391][T23412] device wg2 entered promiscuous mode [ 572.819580][T23415] device pim6reg1 entered promiscuous mode [ 573.136786][T23422] Ÿë: port 1(veth0_vlan) entered blocking state [ 573.145159][T23422] Ÿë: port 1(veth0_vlan) entered disabled state [ 573.610864][T23447] device veth1_macvtap left promiscuous mode [ 576.576205][T23595] device pim6reg1 entered promiscuous mode [ 579.408011][T23727] device veth1_macvtap entered promiscuous mode [ 579.537140][T23727] device macsec0 entered promiscuous mode [ 579.582270][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 580.560994][T23758] device sit0 left promiscuous mode [ 582.194549][T23811] device syzkaller0 entered promiscuous mode [ 583.031023][T23887] device wg2 left promiscuous mode [ 583.072608][T23887] device wg2 entered promiscuous mode [ 583.631136][T23903] syz.3.6422[23903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.631227][T23903] syz.3.6422[23903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.672683][T23903] device pim6reg1 entered promiscuous mode [ 584.393059][T23941] cgroup: fork rejected by pids controller in /syz2 [ 584.712166][T24011] device syzkaller0 entered promiscuous mode [ 585.186436][ T24] audit: type=1400 audit(1757931381.139:174): avc: denied { create } for pid=24052 comm="syz.2.6457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 586.910270][T24126] device pim6reg1 entered promiscuous mode [ 586.921539][T24128] device pim6reg1 entered promiscuous mode [ 587.171157][T24153] bridge0: port 1(bridge_slave_0) entered blocking state [ 587.178268][T24153] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.186167][T24153] device bridge_slave_0 entered promiscuous mode [ 587.193837][T24153] bridge0: port 2(bridge_slave_1) entered blocking state [ 587.201274][T24153] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.209585][T24153] device bridge_slave_1 entered promiscuous mode [ 587.276155][T24153] bridge0: port 2(bridge_slave_1) entered blocking state [ 587.283269][T24153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 587.290631][T24153] bridge0: port 1(bridge_slave_0) entered blocking state [ 587.297740][T24153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 587.326968][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 587.415811][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.494190][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.578803][T24153] device veth0_vlan entered promiscuous mode [ 587.591354][T24153] device veth1_macvtap entered promiscuous mode [ 588.029682][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 588.038343][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 588.047254][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 588.056357][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 588.064611][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 588.072108][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 588.079900][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 588.088148][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 588.096453][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.103610][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.111076][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 588.119521][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.126566][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.134129][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 588.142297][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 588.898637][T24216] device pim6reg1 entered promiscuous mode [ 589.034804][T24223] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.041935][T24223] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.051359][T24223] device bridge_slave_0 entered promiscuous mode [ 589.058709][T24223] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.065864][T24223] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.073351][T24223] device bridge_slave_1 entered promiscuous mode [ 589.241370][ T1496] Ÿë: port 1(veth0_vlan) entered disabled state [ 589.250774][ T1496] device veth0_vlan left promiscuous mode [ 589.411207][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 589.429035][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 589.459961][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 589.478533][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 589.498582][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.505674][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 589.523446][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 589.600805][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 589.671240][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.678278][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 589.791415][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 589.853810][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 589.937960][T24223] device veth0_vlan entered promiscuous mode [ 590.060506][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 590.118815][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 590.150728][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 590.172331][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 590.180104][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 590.197592][T24223] device veth1_macvtap entered promiscuous mode [ 590.214123][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 590.270622][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 590.316768][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 590.340251][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 590.358962][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 590.421568][T24298] syz.2.6527[24298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 590.421658][T24298] syz.2.6527[24298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.570439][T24337] device pim6reg1 entered promiscuous mode [ 591.615234][ T1496] device bridge_slave_1 left promiscuous mode [ 591.648799][ T1496] bridge0: port 2(bridge_slave_1) entered disabled state [ 591.658691][ T1496] device bridge_slave_0 left promiscuous mode [ 591.668812][ T1496] bridge0: port 1(bridge_slave_0) entered disabled state [ 591.695854][ T1496] device veth1_macvtap left promiscuous mode [ 591.710062][ T1496] device veth0_vlan left promiscuous mode [ 591.958346][T24360] device syzkaller0 entered promiscuous mode [ 592.235303][T24390] device sit0 entered promiscuous mode [ 593.108071][T24435] device sit0 left promiscuous mode [ 593.252350][T24440] syz.4.6570[24440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.252417][T24440] syz.4.6570[24440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.714991][T24445] device veth0_vlan left promiscuous mode [ 593.788689][T24445] device veth0_vlan entered promiscuous mode [ 593.944279][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 593.956829][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 593.970993][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 594.127591][T24474] device syzkaller0 entered promiscuous mode [ 594.778453][T24504] device syzkaller0 entered promiscuous mode [ 594.847525][T24513] device sit0 entered promiscuous mode [ 596.229993][T24579] syz.2.6613[24579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.230054][T24579] syz.2.6613[24579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.253545][T24579] syz.2.6613[24579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.286556][T24579] syz.2.6613[24579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.324500][T24579] syz.2.6613[24579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.399832][T24579] syz.2.6613[24579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 597.019096][T24601] device syzkaller0 entered promiscuous mode [ 597.686418][T24610] device syzkaller0 entered promiscuous mode [ 597.819644][T24624] device wg2 left promiscuous mode [ 598.277577][T24639] device wg2 entered promiscuous mode [ 604.714749][T24808] device sit0 left promiscuous mode [ 604.866755][T24808] device sit0 entered promiscuous mode [ 605.658981][T24822] device syzkaller0 entered promiscuous mode [ 605.749180][T24821] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 605.755014][T24821] syzkaller0: Linktype set failed because interface is up [ 606.174580][T24840] device wg2 left promiscuous mode [ 607.009478][T24867] device syzkaller0 entered promiscuous mode [ 607.436860][T24888] device pim6reg1 entered promiscuous mode [ 607.481738][T24899] device syzkaller0 entered promiscuous mode [ 608.221175][T24935] device veth0_vlan left promiscuous mode [ 608.239635][T24935] device veth0_vlan entered promiscuous mode [ 608.279250][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 608.376192][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 608.466189][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 608.924348][T24954] ÿÿÿÿÿÿ: renamed from vlan1 [ 610.000414][T24969] device pim6reg1 entered promiscuous mode [ 610.088723][T24981] device veth0_vlan left promiscuous mode [ 610.137061][T24981] device veth0_vlan entered promiscuous mode [ 610.446562][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 610.456465][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 610.466137][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 612.306081][T25082] device sit0 left promiscuous mode [ 612.484510][T25082] device sit0 entered promiscuous mode [ 613.111315][T25093] lo: mtu less than device minimum [ 613.386545][T25120] device macsec0 entered promiscuous mode [ 615.297274][T25211] syz.3.6799[25211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 615.297330][T25211] syz.3.6799[25211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 615.876143][T25211] device veth0_vlan left promiscuous mode [ 615.942050][T25211] device veth0_vlan entered promiscuous mode [ 616.069922][T25226] device sit0 entered promiscuous mode [ 616.086884][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 616.095464][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 616.104122][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 616.767446][T25289] device veth0_vlan left promiscuous mode [ 616.798811][T25289] device veth0_vlan entered promiscuous mode [ 616.897735][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 616.927750][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 616.976053][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 618.831223][T25401] tap0: tun_chr_ioctl cmd 1074812118 [ 619.314987][T25429] syz.4.6858[25429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.319682][T25429] syz.4.6858[25429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.811191][T25453] : renamed from pim6reg1 [ 621.295211][T25517] device veth0_vlan left promiscuous mode [ 621.303308][T25517] device veth0_vlan entered promiscuous mode [ 621.312474][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 621.320924][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 621.328614][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 622.254936][T25562] syz.4.6894[25562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 622.255006][T25562] syz.4.6894[25562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 622.649346][T25572] device sit0 left promiscuous mode [ 624.456284][T25665] device syzkaller0 entered promiscuous mode [ 625.368976][T25699] device veth0_vlan left promiscuous mode [ 625.383633][T25699] device veth0_vlan entered promiscuous mode [ 625.404878][T25708] device veth1_macvtap left promiscuous mode [ 625.429189][T25708] device macsec0 entered promiscuous mode [ 625.512006][T25718] device syzkaller0 entered promiscuous mode [ 626.887839][T25764] device syzkaller0 entered promiscuous mode [ 628.715824][T25852] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.764640][T25852] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.822793][T25852] device bridge_slave_0 entered promiscuous mode [ 628.952012][T25852] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.959058][T25852] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.984911][T25852] device bridge_slave_1 entered promiscuous mode [ 629.147770][T25852] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.154857][T25852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.162146][T25852] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.169273][T25852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.249861][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.289307][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.359781][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 629.373680][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 629.399699][T16491] device veth0_to_team left promiscuous mode [ 629.406561][T16491] Ÿë: port 1(veth0_to_team) entered disabled state [ 629.835243][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 629.887908][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.923872][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.930944][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.949247][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 629.964571][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.971663][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.979361][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.987406][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 630.006872][T25852] device veth0_vlan entered promiscuous mode [ 630.155202][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 630.166269][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 630.174468][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 630.182018][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 630.202818][T25852] device veth1_macvtap entered promiscuous mode [ 630.247115][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 630.267767][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 630.276270][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 630.284775][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 630.335556][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 630.351597][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 630.366945][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 630.606040][T25953] device syzkaller0 entered promiscuous mode [ 630.790349][T25994] syz.4.7018[25994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.790399][T25994] syz.4.7018[25994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.964820][T26006] device wg2 entered promiscuous mode [ 631.068815][T26029] syz.1.7025[26029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.068868][T26029] syz.1.7025[26029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.427746][T26056] device veth1_macvtap left promiscuous mode [ 633.339841][T26160] device sit0 entered promiscuous mode [ 633.724526][T26162] device wg2 entered promiscuous mode [ 633.820266][T26162] device veth0_vlan left promiscuous mode [ 633.909721][T26162] device veth0_vlan entered promiscuous mode [ 635.378911][T26205] device macsec0 left promiscuous mode [ 635.686555][T26240] device sit0 entered promiscuous mode [ 637.172714][T26335] device veth0_vlan left promiscuous mode [ 637.183262][T26335] device veth0_vlan entered promiscuous mode [ 637.196206][T25925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.215039][T25925] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 637.249648][T25925] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 638.346146][T26372] device syzkaller0 entered promiscuous mode [ 638.534567][T26402] device vlan1 entered promiscuous mode [ 643.938364][T26489] device pim6reg1 entered promiscuous mode [ 644.717370][T26529] device wg2 left promiscuous mode [ 644.921610][T26553] device wg2 entered promiscuous mode [ 647.833141][T26714] device sit0 left promiscuous mode [ 648.270754][T26720] device sit0 entered promiscuous mode [ 648.975439][ T24] audit: type=1400 audit(1757931444.939:175): avc: denied { read } for pid=26729 comm="syz.0.7222" name="cgroup.type" dev="cgroup2" ino=1117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 649.061385][T26731] device syzkaller0 entered promiscuous mode [ 649.254635][T26771] GPL: port 1(erspan0) entered blocking state [ 649.261599][T26771] GPL: port 1(erspan0) entered disabled state [ 649.268045][T26771] device erspan0 entered promiscuous mode [ 649.541405][T26797] device veth0_vlan left promiscuous mode [ 649.624732][T26797] device veth0_vlan entered promiscuous mode [ 649.785789][T26797] device syzkaller0 entered promiscuous mode [ 650.028721][T26842] syz.1.7253[26842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 650.028779][T26842] syz.1.7253[26842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 650.235903][T26857] ÿ: renamed from bond_slave_0 [ 650.893409][T26872] device wg2 left promiscuous mode [ 651.233877][T26877] device syzkaller0 entered promiscuous mode [ 651.320034][T26872] device veth1_to_team entered promiscuous mode [ 651.845469][T26963] device veth0_vlan left promiscuous mode [ 651.853274][T26963] device veth0_vlan entered promiscuous mode [ 651.869001][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 651.877368][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 651.886433][ T1496] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 653.268893][T27074] ªªªªªª: renamed from vlan0 [ 654.614634][T27147] device pim6reg1 entered promiscuous mode [ 655.807626][T27185] device wg2 left promiscuous mode [ 655.813868][T27186] device wg2 entered promiscuous mode [ 656.249402][T27226] device pim6reg1 entered promiscuous mode [ 670.685552][T27362] device wg2 entered promiscuous mode [ 671.931624][T27404] device syzkaller0 entered promiscuous mode [ 672.182994][T27420] device pim6reg1 entered promiscuous mode [ 672.318681][T27422] device syzkaller0 entered promiscuous mode [ 674.171774][T27554] device veth0_vlan left promiscuous mode [ 674.216788][T27554] device veth0_vlan entered promiscuous mode [ 674.465951][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 674.487307][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 674.495601][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 675.283744][T27599] device sit0 left promiscuous mode [ 676.347404][T27652] device wg2 left promiscuous mode [ 679.579694][T27800] device syzkaller0 entered promiscuous mode [ 680.390564][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 680.409072][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 680.427161][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 681.176856][T27892] device syzkaller0 entered promiscuous mode [ 683.412162][T27989] device syzkaller0 entered promiscuous mode [ 683.425984][T27989] device syzkaller0 left promiscuous mode [ 683.432607][T27989] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 684.177850][T28013] device veth0_vlan left promiscuous mode [ 684.285539][T28013] device veth0_vlan entered promiscuous mode [ 684.357755][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 684.374169][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 684.424665][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 684.474208][T28026] device wg2 entered promiscuous mode [ 685.638939][T28083] device syzkaller0 entered promiscuous mode [ 685.735137][T28091] device pim6reg1 entered promiscuous mode [ 687.125474][T28168] syz.0.7626[28168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 687.125533][T28168] syz.0.7626[28168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.240147][T28212] ªªªªªª: renamed from vlan0 [ 688.911580][T28260] device pim6reg1 entered promiscuous mode [ 689.990367][T28337] device syzkaller0 entered promiscuous mode [ 690.424918][T28350] device syzkaller0 entered promiscuous mode [ 692.259482][T28436] syz.2.7698[28436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 692.259582][T28436] syz.2.7698[28436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 692.329228][T28436] device pim6reg1 entered promiscuous mode [ 692.498385][T28445] device pim6reg1 entered promiscuous mode [ 693.084895][T28471] device syzkaller0 entered promiscuous mode [ 694.084602][T28555] device wg2 left promiscuous mode [ 694.279332][T28556] device wg2 entered promiscuous mode [ 694.934781][T28601] syz.1.7739[28601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.934840][T28601] syz.1.7739[28601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 698.407660][T28749] bridge0: port 3(veth0) entered blocking state [ 698.425556][T28749] bridge0: port 3(veth0) entered disabled state [ 698.432666][T28749] device veth0 entered promiscuous mode [ 698.438506][T28749] bridge0: port 3(veth0) entered blocking state [ 698.444800][T28749] bridge0: port 3(veth0) entered forwarding state [ 699.790363][T28792] device syzkaller0 entered promiscuous mode [ 699.919584][T28792] syz.3.7793[28792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.919675][T28792] syz.3.7793[28792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.145939][T28792] device pim6reg1 entered promiscuous mode [ 700.420891][T28802] device syzkaller0 entered promiscuous mode [ 703.993330][T28938] device sit0 entered promiscuous mode [ 704.205403][T28945] device veth0_to_bridge entered promiscuous mode [ 704.638671][T28984] Ÿë: port 1(veth0_vlan) entered blocking state [ 704.646346][T28984] Ÿë: port 1(veth0_vlan) entered disabled state [ 705.145337][T29024] device sit0 left promiscuous mode [ 706.629210][T29060] device veth1_macvtap left promiscuous mode [ 706.902977][T29064] device wg2 entered promiscuous mode [ 707.570463][T29102] device bridge0 entered promiscuous mode [ 708.609469][T29149] bridge0: port 1(bridge_slave_0) entered disabled state [ 710.310797][T29203] device pim6reg1 left promiscuous mode [ 711.559808][T29245] syz.3.7925[29245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 711.559889][T29245] syz.3.7925[29245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 711.578029][T29244] device pim6reg1 entered promiscuous mode