last executing test programs: 33.64390055s ago: executing program 3 (id=1263): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000d00000000000000", @ANYRES32, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200035acc62ca00000300"/28], 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x40049409, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b4000000000000700", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x7, 0x0, 0x1, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2}, 0x50) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1d, 0x2, 0x1, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x143842, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) ioctl$TUNSETSTEERINGEBPF(r8, 0x800454e0, &(0x7f00000001c0)=r9) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r7, &(0x7f0000000280)=ANY=[@ANYBLOB="1e03d3ffbc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x9, 0x8, 0xfa18, 0x10, r4, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0xa927, 0x5}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 33.281196799s ago: executing program 3 (id=1269): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x10000) sendmsg$inet(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d0", 0x1}], 0x1}, 0x20000801) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00'}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000700), 0x8) 32.333700313s ago: executing program 3 (id=1282): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000180)={'macsec0\x00', 0x400}) close(r1) 32.128900759s ago: executing program 3 (id=1285): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000840)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x2000c011) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r2}, 0x18) r4 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r4, r3, 0x0, 0x3, 0xfffffffffffffffe}, 0x42) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) 31.384707747s ago: executing program 3 (id=1298): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) close(0x4) 31.213587081s ago: executing program 3 (id=1299): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1b, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000500), 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000680), 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="03000000040000000559400ec035b23fbabf4f51ce1c8be3c763ea965bd7d2abf38b518049e0ee96a05ca394abcb50d235b76020e9a3270d3c0e20a353ebfc47e69b134bfa8cf0f600390f91d9111b7b458c1285fc2f234d347f5b89cd815b252e4800"/108], 0x48) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000040)) socketpair(0x11, 0xa, 0x9, &(0x7f00000001c0)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r8}, 0x10) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x6, 0x7, 0x3, 0x8001, 0x1, 0x87b, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x2, 0xe, @value=r9}, 0x50) 31.049438193s ago: executing program 32 (id=1299): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1b, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000500), 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000680), 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="03000000040000000559400ec035b23fbabf4f51ce1c8be3c763ea965bd7d2abf38b518049e0ee96a05ca394abcb50d235b76020e9a3270d3c0e20a353ebfc47e69b134bfa8cf0f600390f91d9111b7b458c1285fc2f234d347f5b89cd815b252e4800"/108], 0x48) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000040)) socketpair(0x11, 0xa, 0x9, &(0x7f00000001c0)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r8}, 0x10) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x6, 0x7, 0x3, 0x8001, 0x1, 0x87b, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x2, 0xe, @value=r9}, 0x50) 2.732824697s ago: executing program 2 (id=1584): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'macsec0\x00', 0x400}) close(r2) 2.605096046s ago: executing program 2 (id=1589): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000a00)={@ifindex, 0x16, 0x0, 0x4, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0xfffffdb9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1436, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000540), 0x2}, 0x1882a, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r4, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000040)='%pI4 \x00'}, 0x2a) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, &(0x7f00000007c0)=0x5927) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1f, 0x3, 0x4, &(0x7f0000000180)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r5, 0x58, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r9) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x3, 0x7, 0xbc, 0x40, 0x1, 0x2, '\x00', r8, r9, 0x2, 0x1, 0x1, 0xe}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={r10}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r10, 0xffffffffffffff9d, &(0x7f0000000640)}, 0xfffffffffffffe0c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) 2.166511081s ago: executing program 2 (id=1591): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000840)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x2000c011) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r2}, 0x18) r4 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r4, r3, 0x0, 0x3, 0xfffffffffffffffe}, 0x42) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) 2.142354963s ago: executing program 0 (id=1592): r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000), 0x4) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0xf, &(0x7f0000000040)=@raw=[@ringbuf_query, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffff8}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0xf7, &(0x7f0000000100)=""/247, 0x1f00, 0x64, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x6, 0x4, 0xfffffff0}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x8}, 0x94) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000400)={r0, r1, 0x0, r2}, 0x10) syz_clone(0x85184880, &(0x7f0000000440)="e180f8b955105c85fcf7e7f3c47a21652379aa71eeab781b0439260d8005308a86dd98bdf3ad521de28e8d4625e0eb5d2476053bec7922316a781df183ec1dd9eaeaa45585935c48b0fbd7e8c2e488ef1533dcd8d62670072403c114941c1685f27d45d92dc317f183829847602542da0d330c978da28a185f95607d38e6b082acfea4bea270ad2451221fdab61c95c69e8b5afee050cc848e82a7b07e69ff23b82b09e52d1600344546a7b607d8e9c794", 0xb1, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="f8b1d08fdf1f8a2fb2f261268e6ef3f100ee0a4bb53e4f3e283b6c56f695f7ee51ef3ba5927e5958873bfd6178a9061e07892f446979baf1be4f929bdf619ef970e6a128fbff50afc9abf42e4a5dcdb3f13c664c2ad2ac4b0374dbf0e04c03c54f0bd8db31eeb85997622ebd5c7fd3e75fe9811e6104e0f6f1426dedaf96feae9375084bd9edf27b4a976cd637874a8a735f7ce501f9fc18cdfecf0b75dfc6a3550177c47cdcbf20f9bf140ac95a8142c2325af8bab7fe700a9838f8d237c536a0a5d10e460266a278157ce0d34e78b37139eb744bfe8772d903d5bd8d") bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680)={r0, r2, 0x4, r2}, 0x10) socketpair(0x22, 0xa, 0xffffffff, &(0x7f00000006c0)={0xffffffffffffffff}) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700)=0xffffffffffffffff, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000740)=r4, 0x4) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@var={0x4, 0x0, 0x0, 0xe, 0x4, 0x3}, @func={0x10, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x30, 0x61, 0x30, 0x30, 0x61, 0x0]}}, &(0x7f00000007c0)=""/167, 0x3c, 0xa7, 0x1, 0x4}, 0x28) r6 = perf_event_open(&(0x7f0000000900)={0x4, 0x80, 0x6, 0x0, 0x40, 0x7, 0x0, 0x7fffffff, 0x80, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000008c0), 0x7}, 0x16050, 0x4, 0x0, 0x2, 0x0, 0x10, 0x2, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x9, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000a80)={@map=0xffffffffffffffff, 0x14, 0x0, 0x0, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0, 0x0], &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000b40)=@raw=[@map_val={0x18, 0xc, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}, @alu={0x2, 0x0, 0x4, 0xb, 0xa, 0x40}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0544}], &(0x7f0000000b80)='GPL\x00', 0x8, 0x0, &(0x7f0000000bc0), 0x40f00, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000c40)={0x1, 0xb, 0x4, 0x2}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000c80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000cc0)=[{0x0, 0x5, 0xd, 0xb}, {0x5, 0x2, 0x10, 0xa}, {0x2, 0x5, 0x4}, {0x4, 0x4, 0x7, 0xb}, {0x1, 0x1, 0x5, 0x1}, {0x4, 0x4, 0xb, 0xc}, {0x3, 0x3, 0x2, 0x7}, {0x0, 0x4, 0x6, 0x8}, {0x2, 0x5, 0xf, 0x6}], 0x10, 0xffff}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)={@cgroup=r9, r2, 0x13, 0x10, r2, @void, @value=r10, @void, @void, r8}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001100)={r10, 0x0, 0xe1, 0x37, &(0x7f0000000e40)="2d9b0031aae59eadc2421b97c0526aded74d9a555f5b6a52327a05e1e4bef87b50a9402fce3fb9b67fed98bd69fb718046b27709dd8c4086a0a4a8c69748ee13c0ffb1a7e4b8571fc9a34544a6d1998bde824ca0f954e90975c25f2778e5f1af2a03e6bc47e7e78b261742d926557ae602b978ec8206351dbf9fe3d31db773fbe186bf63713c50fbef6a773eaf13f71ed25d0ef4c41998e7a0440a77cf403118d14267d1eb1a513c78a35b07baacf4e8a62e43d465d6dbced4cefe22b4cd4baa4c9251c11d436353dd1918a7c01fbe1a3557b853432a3a8966fe4946033aab7651", &(0x7f0000000f40)=""/55, 0x3, 0x0, 0x82, 0x8b, &(0x7f0000000f80)="e81b9c66a9ae0a293bacf58bcb02c343244170060c66fe85e11b9984eb02e2f02e8bff3075b44dc4bd4fe54737f24523e3d3176d64b0a141f9722117d6b8ea8fb6c7712db7ca23c2fc88b79682a49c2861ee6d53eacb46f198474b0abac700fd46c618ac73852f921d020bde91564c679d7bfdb9bf1f9fa5014d68ad95f31abe0a7d", &(0x7f0000001040)="6ecc9c47b6178032c9a22f58144c4d9f94501de25522ee56c26ac7935664ff54f7131d25c27698658582c60cad69998a0e31f90e4adc9497f94406a5ceb693c29bdc44ae23f1df58c57fcf36710ae3f0348ba42d361233b0a22f1c20770242cd83acc6517cf88541f65d27b944e0ea8fdd73ee439040082960bf6c3a29f414c4feee20603f207c6ddef333", 0x4}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x20, 0xd, &(0x7f0000001180)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}], &(0x7f0000001200)='syzkaller\x00', 0x7, 0x8a, &(0x7f0000001240)=""/138, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x1c, r5, 0x8, &(0x7f0000001300)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001340)={0x5, 0xb, 0x3, 0xfffff1e9}, 0x10, 0x0, r1, 0x4, &(0x7f0000001380)=[r7, r7], &(0x7f00000013c0)=[{0x0, 0x5, 0x3, 0x5}, {0x2, 0x2, 0x8, 0x4}, {0x4, 0x2, 0xd}, {0x3, 0x5, 0x6, 0x2}], 0x10, 0x62}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001780)={r11, 0xe0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000001500)=[0x0], &(0x7f0000001540)=[0x0, 0x0, 0x0], 0x0, 0x87, &(0x7f0000001580)=[{}, {}], 0x10, 0x10, &(0x7f00000015c0), &(0x7f0000001600), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000001640)}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000018c0)={@ifindex=r12, 0x1e, 0x0, 0x1000, &(0x7f00000017c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r15 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a40)={0x11, 0x7, &(0x7f0000001940)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_val={0x18, 0x7, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0xc63}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x200}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ldst={0x0, 0x0, 0x6, 0x4, 0xb, 0x6}], &(0x7f0000001980)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', r12, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f00000019c0)={0x2, 0xe, 0xf, 0xfffffff7}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001a00)=[{0x1, 0x3, 0x5, 0x8}, {0x3, 0x4, 0xc, 0x7}, {0x5, 0x5, 0x8, 0x7}, {0x3, 0x4, 0x9, 0x5}], 0x10, 0x9}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001900)={@map=r7, r1, 0x23, 0x0, 0x0, @void, @value=r15, @void, @void, r14}, 0x20) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@bloom_filter={0x1e, 0x2, 0x9, 0x4c0, 0x5, 0x1, 0x401, '\x00', 0x0, r5, 0x5, 0x0, 0x0, 0xc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001e00)={0x4, 0x10, &(0x7f0000001b00)=@raw=[@jmp={0x5, 0x1, 0x1, 0x1, 0x221a08024fee5cca}, @map_fd={0x18, 0x9, 0x1, 0x0, r7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffff9}], &(0x7f0000001b80)='GPL\x00', 0x0, 0xa1, &(0x7f0000001bc0)=""/161, 0x40f00, 0x45, '\x00', 0x0, @fallback=0x11, r5, 0x8, &(0x7f0000001c80)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000001cc0)={0x1, 0x10, 0x4, 0x6cba}, 0x10, 0x0, r1, 0x0, &(0x7f0000001d80)=[0xffffffffffffffff, r11, r7, r7, r7, r9, r7, r16], &(0x7f0000001dc0), 0x10, 0x3}, 0x94) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000002280)={0x1f, 0x26, &(0x7f0000001ec0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @map_val={0x18, 0x5, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x54}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffe}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r16}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r16}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r16}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r16}}, @jmp={0x5, 0x0, 0xa, 0x2, 0x1, 0x100, 0xfffffffffffffffc}]}, &(0x7f0000002000)='GPL\x00', 0x1, 0xce, &(0x7f0000002040)=""/206, 0x40f00, 0x6, '\x00', r13, @fallback=0x34, r3, 0x8, &(0x7f0000002140)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000002180)={0x5, 0x0, 0x8, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f00000021c0)=[r7], &(0x7f0000002200)=[{0x3, 0x4, 0x2, 0x9}, {0x3, 0x3, 0x0, 0x6}, {0x3, 0x2, 0xf, 0xb}, {0x3, 0x2, 0x7, 0x3}, {0x0, 0x3, 0x1, 0x3}, {0x0, 0x4, 0xd, 0x1}, {0x5, 0x2, 0x1, 0x1}, {0x5, 0x2, 0xd, 0x3}], 0x10, 0x9}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002440)={@cgroup=r9, 0x9, 0x1, 0x57c0, &(0x7f0000002340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000002380)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000023c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002480)={@fallback=r2, r2, 0x18, 0x5, r17, @void, @value=r2, @void, @void, r18}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002540)={{r16, 0xffffffffffffffff}, &(0x7f00000024c0), &(0x7f0000002500)=r1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002800)={0x11, 0x1d, &(0x7f0000002580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@generic={0xb, 0x7, 0x8, 0x1}, @alu={0x7, 0x0, 0x2, 0x2, 0x3, 0x30, 0x2}, @ldst={0x3, 0x3, 0x4, 0x2, 0xb, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x4f}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r16}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r19}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}]}, &(0x7f0000002680)='GPL\x00', 0x5, 0x69, &(0x7f00000026c0)=""/105, 0x41000, 0x8, '\x00', r13, 0x0, r1, 0x8, &(0x7f0000002740)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000002780)={0x3, 0x3, 0xa2f, 0x4}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000027c0)=[{0x5, 0x4}], 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000028c0)=@bloom_filter={0x1e, 0x6, 0x1, 0x8, 0x4000, r19, 0x5, '\x00', r13, r5, 0x0, 0x3, 0x2, 0xf}, 0x50) 2.126024144s ago: executing program 5 (id=1593): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000700)=ANY=[@ANYBLOB="1805000000f790906a0000007b8af8ff00002000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="020000000400000004f133fb03fb5207e99fc78ae5df18c06fe4af28d8b4ea0000000800000014100083feaca6f8f5ce03b3a0b72d64d5187cef31d04409eb5de49301c245333eab98d4c8f13cabd97c0343afe6b5a071c1fe51f9de9426bda8f44208ef", @ANYRESHEX=r8, @ANYRESOCT=r1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c00000004000000040000000700000000000000", @ANYRES32=r9, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/22], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r10, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r9}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r11, &(0x7f0000000080), 0x0}, 0x20) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r12, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) write$cgroup_devices(r5, &(0x7f00000005c0)=ANY=[], 0xfffffeff) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r13}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.04229637s ago: executing program 0 (id=1594): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001000)='blkio.bfq.idle_time\x00', 0x0, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001000)='blkio.bfq.idle_time\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001100)=r2, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x10, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="61122800000000006113480000000000bf1000000000000015000200091bfbff3d030100000000008701000257000000bc26000000000000bf67000000000000140300000ee600f06702000014000000160302000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad4301000000000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x8, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) 2.041289901s ago: executing program 4 (id=1595): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}, 0x1000, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB], 0x0, 0xfc5f}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095", @ANYRES8], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) ioctl$SIOCSIFHWADDR(r2, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) gettid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x3f}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3ff}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 1.184813138s ago: executing program 5 (id=1597): bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r3}, 0x18) close(0x4) 1.182368788s ago: executing program 4 (id=1598): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) (async) socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907003675f37538e486dd6317ce623900fe800000002000e0865a6596aff57b00000000000000000000000000ac1414"], 0xfe1b) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000012c0)=ANY=[], 0xfe1b) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff010000007110430000b0fd5618000000000000"], 0x0, 0x4}, 0x94) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async) socketpair$tipc(0x1e, 0x3, 0x0, &(0x7f00000002c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r4) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000100)="b9ff03c4702d8b3f00137df088a847e088f7", 0x0, 0xfffffffe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.180630778s ago: executing program 0 (id=1599): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0100000042000000060000000800000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="09000000000000002300006f00fb6cc6afebcb5ca843ed1e20e2074e"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYRES16=r0, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="180900000000007c000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r6}, &(0x7f0000000540), &(0x7f0000000580)=r3}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r6, &(0x7f0000000780)}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0c00000004000000040000000180000000000000", @ANYRES32=r4, @ANYBLOB="00000000a17e6714dd8db7a2d7187276030ee0af357b9281eeaf5a8969047f4b9f6e0a5ef186e3fdca630d1c81b881c2bdfae3f5c3182b53c07ebccea7d1376e3fc50d3b8c72e81170e31fb0c3b6dddab48fa2f043812f28d1e161142245434cbf1ac883469330ba3db53560f5704b154129", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r7}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', r2}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_type(r8, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r9, &(0x7f0000000280), 0xfdef) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r10}, 0x18) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) close(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 1.177476348s ago: executing program 4 (id=1601): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="180200000000e1ff0000000000000000850000005300000085000000070000009500000000000000a94be0c51261be6a99e5e06bb0a232d5e1f5bc0b6e76f82e9a7cde9e8f1b547edf612a03f1737d951d7a617558b674e1c4fdfd771ebe7c33af3e4917be59ac67f0bbabcb8f41c23ba8d91633a8b9c70e804744dc081ac69cfea08e4e5a06003771bc3f325a6386a9d49e3c13b32461acf0be4b31638c29187d748841f4395494cdac15e52a4b6a2981eb4afadbbdf9157fa588f475c4cd2e44e2129dc6b93993909613e8d95f5610c067d9b97c524c210af077707d71e8512e00"/240], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9092dc1b6dbe9ab5becdcc777", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xffd, 0x6}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d0000008500000007000000bfe719c9fed7eddc5bded30d708f3ab0abb799f87f6c233c5879d7696eeca527b07aa1996ecdfdd639735a6c5aaf89633d36c377f83b385eeba46dc7d701acd8007d8a22a9857744a19253c8ff1a5c4f22eefe36ef2cdf1f1f2d186ed9b2c719190b6ff32e99fea4b94eefa06a74974160af"], &(0x7f00000005c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, 0x2}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000900000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000060000008500000061000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0xa, 0x0, 0x0, 0x939e0ff475704f7d, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000001800000090000000500000000000100", @ANYRESOCT, @ANYBLOB='\a\x00'/20, @ANYRES32, @ANYRES32, @ANYBLOB="01eeff0004000000040000000600"/24, @ANYRES32=r8, @ANYRES16=r5], 0x50) 1.176625868s ago: executing program 5 (id=1602): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="180200000000e1ff0000000000000000850000005300000085000000070000009500000000000000a94be0c51261be6a99e5e06bb0a232d5e1f5bc0b6e76f82e9a7cde9e8f1b547edf612a03f1737d951d7a617558b674e1c4fdfd771ebe7c33af3e4917be59ac67f0bbabcb8f41c23ba8d91633a8b9c70e804744dc081ac69cfea08e4e5a06003771bc3f325a6386a9d49e3c13b32461acf0be4b31638c29187d748841f4395494cdac15e52a4b6a2981eb4afadbbdf9157fa588f475c4cd2e44e2129dc6b93993909613e8d95f5610c067d9b97c524c210af077707d71e8512e00"/240], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9092dc1b6dbe9ab5becdcc777", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xffd, 0x6}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d0000008500000007000000bfe719c9fed7eddc5bded30d708f3ab0abb799f87f6c233c5879d7696eeca527b07aa1996ecdfdd639735a6c5aaf89633d36c377f83b385eeba46dc7d701acd8007d8a22a9857744a19253c8ff1a5c4f22eefe36ef2cdf1f1f2d186ed9b2c719190b6ff32e99fea4b94eefa06a74974160af"], &(0x7f00000005c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, 0x2}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000900000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000060000008500000061000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0xa, 0x0, 0x0, 0x939e0ff475704f7d, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000001800000090000000500000000000100", @ANYRESOCT, @ANYBLOB='\a\x00'/20, @ANYRES32, @ANYRES32, @ANYBLOB="01eeff0004000000040000000600"/24, @ANYRES32=r8, @ANYRES16=r5], 0x50) 1.174284628s ago: executing program 2 (id=1603): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0xff1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x1020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0xe42b9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x5}, 0x8000, 0x5, 0x43a0bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000002003f13c7160d7f89c701ff0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r5, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x7}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x2, 0x300}, {0x6e}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x240, 0x0, r3, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xa, 0x9, &(0x7f0000000580)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @ldst={0x3, 0x2, 0x2, 0xa, 0x6, 0x6, 0x10}, @jmp={0x5, 0x0, 0x4, 0xb, 0x6, 0x40, 0x8}, @alu={0x4, 0x0, 0x2, 0x7, 0x0, 0x30, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0xd2}], &(0x7f00000004c0)='syzkaller\x00', 0x5, 0xae, &(0x7f0000000600)=""/174, 0x40f00, 0x42, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0x10, 0x4, 0x8}, 0x10, 0x0, r7, 0x2, &(0x7f00000009c0)=[r8, r1, r3, r0], &(0x7f0000000a00)=[{0x3, 0x2, 0x7, 0xb}, {0x2, 0x5, 0x5}], 0x10, 0xbd2}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='track_foreign_dirty\x00', r9, 0x0, 0x6}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0x8, 0xa}, 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x14, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4d518c0e}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r12}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0xfffffecb) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r9, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.173494428s ago: executing program 0 (id=1604): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc6751dfb265a0e3ccae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce935b0f327cb3f011a7d06602e2fd52347125907000000000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df262ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71d20fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada12f7a1525320e716660000000000b02b001500a710eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d3294000000000000000000000000000000000000000000000000000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18a904c0e585a66c3b84b138efc20a546d3d5227e23b03f2a834391ad24fe7d9b20cf92cb151763d41f5c76e2ff3e93ee296c4082ee73e7e197253a2b66c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1c77a211bfa02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0843b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f04c7f0be31491eb8c9ff68236c8600000000000000000000000066e034c81c3cab4e33fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f2243471221c15fa12313ffbfa7c2730302b66a99f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca20508"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000880), 0x12) openat$cgroup_procs(r1, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000007f00000000000000040000007110"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22ffc4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x8, 0xa7c, 0x7fffffff, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r9}, 0x10) ioctl$TUNGETVNETLE(r6, 0x40047451, &(0x7f0000000180)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000300)=@abs={0x0, 0x5c, 0x1}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x24004080}, 0x20000) ioctl$TUNGETVNETLE(r4, 0x40047451, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x6d, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) 1.172461959s ago: executing program 1 (id=1605): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='tegra_dma_complete_cb\x00', r1}, 0x18) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000004000000dd0000000a00000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) close(r0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="090000000700000000800000010000000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000d00394cbf6438ddc83edcc6660d8d47000000000000b4a518110000ee661c021f", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) (async) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfee, 0x0, 0x0, 0x3ff, 0x0, 0x100000000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0xb) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="08001c0000ffffffffffffffeb00000000000000b8907dd349d44d62f1148f9720375f2e2ce04f1b4908f105665df1b342f9f290e495bf658a37a674a2d4ffd43f9e1b1c9ba5220e1ed0008df35cad77a631b912ca95706828961515139b5546ccac6e0c68c1947e41892a5eda7e112ea08bde58dcae2be07a374be3884b930f2994509c46658057bd7ac7479ffb56e1b05189206b95140bcd3a7ec1f8bb5bdada395afba25ee84030", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001400000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70200000000df00850000008600000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.167014389s ago: executing program 1 (id=1606): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) write$cgroup_int(r3, &(0x7f00000001c0), 0xfffffdef) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000600000001000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000000002000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000001800000090000000500000000000100", @ANYRESOCT=r5, @ANYBLOB='\a\x00'/20, @ANYRES32, @ANYRES32, @ANYBLOB="01eeff0004000000040000000600"/24, @ANYRES32=r3, @ANYRES16=r0], 0x50) 1.135591671s ago: executing program 4 (id=1607): socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000400000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x6420, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x9, 0x8000000000000001}, 0x12000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffff}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000540)='(pu&00\t||') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa, &(0x7f0000000280)=[{}], 0x8, 0x10, &(0x7f00000002c0), 0x0, 0x0, 0xa, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000700000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.093083685s ago: executing program 5 (id=1608): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x20140, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000002c0)) (async) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x195bc015a5a66c38) (async, rerun: 32) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1601, 0x0) (async) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000340)=ANY=[@ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x64d3, 0x0, 0x1, 0xf5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x3}, 0x50) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x20, &(0x7f0000000880)={&(0x7f0000000700)=""/83, 0x53, 0x0, &(0x7f0000000780)=""/219, 0xdb}}, 0x10) (async, rerun: 32) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@generic={&(0x7f0000000900)='./file0\x00', 0x0, 0x8}, 0x18) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000280)=@raw=[@alu={0x7, 0x1, 0x9, 0x5, 0x0, 0x50, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x9}, @jmp={0x5, 0x1, 0xa, 0x2, 0x9, 0x8, 0xfffffffffffffff0}], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 1.02721861s ago: executing program 0 (id=1609): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRESDEC=0x0, @ANYRESOCT, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x1b, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="180000009a000000000000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b700000000000000950000000000000076e26cbf8e2b19383b8a00d96be772480d7b581cff5e93b630585038a38c43888fa742ed1221ac6b4e63b1b354dc08572702f51e77653118"], 0x0, 0x8, 0x5e, &(0x7f00000009c0)=""/94, 0x41000, 0x3, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x5, 0x9, 0x901, 0xf}, 0x10, 0x0, r2}, 0x94) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='signal_deliver\x00', r7}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() 1.015839191s ago: executing program 5 (id=1610): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0xe, &(0x7f0000001540)=ANY=[@ANYRES8=r1], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x1}, 0x10}, 0x94) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={0xffffffffffffffff, 0x0, 0x0}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000d3d23ab98bbcea3a478193c3c8893ad66fc9e14f9653bffe4ffd8cdc11ccb7e166d63336dea056f455ee6a8bd422bb9fd283bc581a46b519d04401bd630d29363972"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0, r2}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x1) (async) mkdir(&(0x7f0000000300)='./file0\x00', 0x1) socketpair$unix(0x1, 0x2, 0x0, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r3) (async) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) (async) recvmsg$unix(r5, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, 0x0) sendmsg$inet(r4, &(0x7f0000000540)={&(0x7f0000000380)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="f05ba4eb081a52cf531c9078e2d84bb96343221bdf72e011969d94a16551e1692cd37a1396777f220ca2408a4cb112ee9252b20b7f66856f268fd5b82c1b11bb28e3b7c883db3ef02f96016aec68d0f94ecccdaa10aaea5b0637675bf6", 0x5d}], 0x1, &(0x7f0000000500)=[@ip_ttl={{0x14, 0x0, 0x2, 0xf2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}], 0x30}, 0x8000) write$cgroup_devices(r3, &(0x7f00000005c0)=ANY=[], 0xfffffeff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB="85100000040000009500000000000000180000000000000000000000000000009500000000"], &(0x7f00000000c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0}, 0x50) recvmsg(0xffffffffffffffff, 0x0, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x94) 826.457946ms ago: executing program 2 (id=1611): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100000000000000000000000000001812"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}, 0x108001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="00000000fc1d00001000080000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/1664], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x4, 0x4}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x4, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) 272.440829ms ago: executing program 1 (id=1612): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000010000000000000000000000711817000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./file0\x00', r1}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r3, 0x3e, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xfffffffffffffe93) sendmsg$inet(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000600)="ba19b70649ca29340fd6ce0c69ba6c5b59a5fb0e157e80e48ef9eadefdeadcd687cbdd385e4b281c0a489e6024ce9d825b25de0e932a1b9788de67cc5d00d18bcb2be4c12d670f8d29dec94f3c3c61b5cd73ada22611586f4b8f9656c6a07e46a1185574cf8a8b7d540e2eee5849328a3c2d2e00c5bbc3e9c2ae099e9ee1b01bdd9fbb664b7c8b30d85ba06d124aa22600314e3ca771725f1e37d50716df79a5654147f3bf008f5f83fa88ee621a561a3a99995e8609c35be72acfaabec884c09bd2ff1bad6ed38e", 0xc8}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @empty}}}], 0x58}, 0x4020054) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}], 0x40}, 0x0) (async) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 142.154109ms ago: executing program 0 (id=1613): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000840)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x2000c011) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r2}, 0x18) r4 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r4, r3, 0x0, 0x3, 0xfffffffffffffffe}, 0x42) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) 141.837979ms ago: executing program 1 (id=1614): bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r3}, 0x18) close(0x4) 118.057371ms ago: executing program 1 (id=1615): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) close(0x4) 116.467691ms ago: executing program 4 (id=1616): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000180)={'macsec0\x00', 0x400}) close(r1) 98.008042ms ago: executing program 2 (id=1617): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="180200000000e1ff0000000000000000850000005300000085000000070000009500000000000000a94be0c51261be6a99e5e06bb0a232d5e1f5bc0b6e76f82e9a7cde9e8f1b547edf612a03f1737d951d7a617558b674e1c4fdfd771ebe7c33af3e4917be59ac67f0bbabcb8f41c23ba8d91633a8b9c70e804744dc081ac69cfea08e4e5a06003771bc3f325a6386a9d49e3c13b32461acf0be4b31638c29187d748841f4395494cdac15e52a4b6a2981eb4afadbbdf9157fa588f475c4cd2e44e2129dc6b93993909613e8d95f5610c067d9b97c524c210af077707d71e8512e00"/240], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9092dc1b6dbe9ab5becdcc777", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xffd, 0x6}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d0000008500000007000000bfe719c9fed7eddc5bded30d708f3ab0abb799f87f6c233c5879d7696eeca527b07aa1996ecdfdd639735a6c5aaf89633d36c377f83b385eeba46dc7d701acd8007d8a22a9857744a19253c8ff1a5c4f22eefe36ef2cdf1f1f2d186ed9b2c719190b6ff32e99fea4b94eefa06a74974160af"], &(0x7f00000005c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, 0x2}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r6}, 0x10) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r7}, 0x8) write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000900000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000060000008500000061000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00'}, 0x10) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0xa, 0x0, 0x0, 0x939e0ff475704f7d, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000001800000090000000500000000000100", @ANYRESOCT, @ANYBLOB='\a\x00'/20, @ANYRES32, @ANYRES32, @ANYBLOB="01eeff0004000000040000000600"/24, @ANYRES32=r8, @ANYRES16=r5], 0x50) 32.400938ms ago: executing program 5 (id=1618): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) close(0x4) (fail_nth: 1) 14.604669ms ago: executing program 4 (id=1619): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b0000000000000000000000008000000000", @ANYBLOB="00000000000000000000000000000000000000000ac9d336ca0f86fc4dba", @ANYRES32, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) r3 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001cc0), 0x0, 0x4000, 0x0, 0xd, 0x9, &(0x7f0000001ac0)="9c01bd6f9a6028c80d7364240f", &(0x7f0000001a40)="408fd0050dc7945b48", 0x1, 0x0, 0x13}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r5}, 0x10) syz_open_procfs$namespace(r4, &(0x7f0000001380)='ns/mnt\x00') bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r2, 0x58, &(0x7f0000000400)}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a000000000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400"/18], 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x800}) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x3f, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b40000000000000073114e0000000000160000000000000095007400000000001690d3823e7e89a93309c68ee1b282ed7b63029fd0ac620f19aab66bda50579b561e04800cd71846e23506a05e3f2d396e0d29d21e521d4c4b9bdc10154f093a8f5722ffb78d66cf2aac587c2c74b224b7fe9d72578164052c58cd43dd86d61fc9335e9425cffae9381679d1f1c7cfa5d649460b6f2757cd92a149a5490bea6b8a"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x48) 0s ago: executing program 1 (id=1620): openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x7, 0x4, 0x208, 0xa}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000004000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="4a5bf2cc0b0000000000000004aa52b732c10b6f5ff85e378c09e6d3c2928731", @ANYRESHEX=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0xc, 0x0, &(0x7f0000000380)="cc9f4d42d0e005000000bb03", 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="0200000004000000060000000500000001240000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000d96d6d2142d30579109671dc1f6b0967265bc00ee3adfc3fe504bcb7c32610651003794bb87c18d08ff1e01bfa5dd1edab91e9aafed4ca9ef91d5a26", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0100000004001000040122000b00000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000cc2a400067991b07671894fb17a46993f9523708b420370592d21a9a3b53c66d7486d9cd9f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000002800100"/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00'}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000014c0)=[0x0], &(0x7f0000000480)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000001680)}}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='freezer.parent_freezing\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) sendmsg$inet(r3, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000280)="db", 0x1}], 0x1}, 0x41) recvmsg(r2, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x10001) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r5, 0x400454d1, 0x0) sendmsg$inet(r3, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x40000c1) recvmsg(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/244, 0xf4}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000000)=""/9, 0x9}, {&(0x7f0000000480)=""/249, 0xf9}, {&(0x7f0000000880)=""/25, 0x19}, {&(0x7f0000000940)=""/212, 0xd4}], 0x8, &(0x7f0000000a40)=""/193, 0xc1}, 0x18040) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.43' (ED25519) to the list of known hosts. [ 33.289167][ T28] audit: type=1400 audit(1765631226.129:64): avc: denied { mounton } for pid=274 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.290610][ T274] cgroup: Unknown subsys name 'net' [ 33.313394][ T28] audit: type=1400 audit(1765631226.129:65): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.344834][ T28] audit: type=1400 audit(1765631226.169:66): avc: denied { unmount } for pid=274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.345102][ T274] cgroup: Unknown subsys name 'devices' [ 33.498109][ T274] cgroup: Unknown subsys name 'hugetlb' [ 33.505145][ T274] cgroup: Unknown subsys name 'rlimit' [ 33.611580][ T28] audit: type=1400 audit(1765631226.449:67): avc: denied { setattr } for pid=274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.637551][ T28] audit: type=1400 audit(1765631226.449:68): avc: denied { mounton } for pid=274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.650354][ T276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 33.665917][ T28] audit: type=1400 audit(1765631226.449:69): avc: denied { mount } for pid=274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 33.702691][ T28] audit: type=1400 audit(1765631226.519:70): avc: denied { relabelto } for pid=276 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 33.732687][ T28] audit: type=1400 audit(1765631226.519:71): avc: denied { write } for pid=276 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 33.761073][ T274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 33.762801][ T28] audit: type=1400 audit(1765631226.579:72): avc: denied { read } for pid=274 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 33.804275][ T28] audit: type=1400 audit(1765631226.579:73): avc: denied { open } for pid=274 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 35.281484][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.289425][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.298151][ T284] device bridge_slave_0 entered promiscuous mode [ 35.307050][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.314462][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.322795][ T284] device bridge_slave_1 entered promiscuous mode [ 35.333726][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.341200][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.350474][ T282] device bridge_slave_0 entered promiscuous mode [ 35.359136][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.366503][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.374627][ T282] device bridge_slave_1 entered promiscuous mode [ 35.486402][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.493950][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.502203][ T283] device bridge_slave_0 entered promiscuous mode [ 35.518307][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.526206][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.535096][ T285] device bridge_slave_0 entered promiscuous mode [ 35.551320][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.559142][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.567197][ T283] device bridge_slave_1 entered promiscuous mode [ 35.575998][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.583265][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.591200][ T285] device bridge_slave_1 entered promiscuous mode [ 35.706630][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.714153][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.723620][ T286] device bridge_slave_0 entered promiscuous mode [ 35.731482][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.739414][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.747620][ T286] device bridge_slave_1 entered promiscuous mode [ 35.783128][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.790895][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.798564][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.806341][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.861652][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.868940][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.876466][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.883776][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.965981][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.974106][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.982477][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.990808][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.999287][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.012306][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.020483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.046955][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.057056][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.065398][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.089739][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.098769][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.106315][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.114373][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.124094][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.132157][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.140461][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.149661][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.158396][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.183883][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.219950][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.228368][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.237546][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.244917][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.253884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.262635][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.271611][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.296338][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.305956][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.315213][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 36.324521][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.334414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 36.343293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.353459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.362988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.371542][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.381515][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.390250][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.401066][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.412123][ T284] device veth0_vlan entered promiscuous mode [ 36.437234][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.445219][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.453532][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 36.463664][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.478845][ T282] device veth0_vlan entered promiscuous mode [ 36.496836][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 36.505570][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.514922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 36.525816][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.534491][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.542399][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.550681][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.559974][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.569328][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.577493][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.585848][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.595729][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.604840][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.613236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.621219][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.640199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.649619][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.658045][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 36.666813][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.676513][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.683673][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.691633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.700585][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.710138][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.717834][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.727562][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.747249][ T284] device veth1_macvtap entered promiscuous mode [ 36.760100][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 36.768424][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.777310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.786763][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.795839][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.804303][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.813714][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.822953][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 36.831837][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.853040][ T282] device veth1_macvtap entered promiscuous mode [ 36.874258][ T285] device veth0_vlan entered promiscuous mode [ 36.881180][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 36.889606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.898910][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.907428][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 36.916056][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.925055][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 36.933758][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.942432][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.951833][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.961003][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.970044][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 36.978749][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.987725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 36.996757][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.006236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.014894][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.023429][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.032244][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.041103][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.049111][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.056905][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.064942][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.092042][ T283] device veth0_vlan entered promiscuous mode [ 37.106307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.116456][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.126341][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.135245][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.144771][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.153598][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.166931][ T285] device veth1_macvtap entered promiscuous mode [ 37.177563][ T286] device veth0_vlan entered promiscuous mode [ 37.185091][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 37.193245][ T283] device veth1_macvtap entered promiscuous mode [ 37.210845][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.227911][ C1] hrtimer: interrupt took 16354 ns [ 37.233711][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.242403][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.251517][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.260632][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.268486][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.328707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.337574][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.350552][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.365248][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.375206][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.384163][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.422523][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 37.431842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.442763][ T286] device veth1_macvtap entered promiscuous mode [ 37.494907][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 37.510128][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 37.526083][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.552988][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 37.587397][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.946240][ T383] device pim6reg1 entered promiscuous mode [ 39.272655][ T28] kauditd_printk_skb: 39 callbacks suppressed [ 39.272672][ T28] audit: type=1400 audit(1765631232.109:113): avc: denied { write } for pid=437 comm="syz.0.29" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.358639][ T441] device pim6reg1 entered promiscuous mode [ 39.641214][ T450] bond_slave_1: mtu less than device minimum [ 40.688768][ T490] Driver unsupported XDP return value 0 on prog (id 77) dev N/A, expect packet loss! [ 43.032418][ T28] audit: type=1400 audit(1765631235.869:114): avc: denied { create } for pid=565 comm="syz.3.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 43.169464][ T28] audit: type=1400 audit(1765631235.999:115): avc: denied { read } for pid=573 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 43.217987][ T28] audit: type=1400 audit(1765631236.059:116): avc: denied { write } for pid=573 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 43.705967][ T590] device veth1_macvtap left promiscuous mode [ 45.922127][ T28] audit: type=1400 audit(1765631238.759:117): avc: denied { create } for pid=647 comm="syz.4.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 47.588885][ T692] FAULT_INJECTION: forcing a failure. [ 47.588885][ T692] name failslab, interval 1, probability 0, space 0, times 1 [ 47.632712][ T692] CPU: 0 PID: 692 Comm: syz.0.110 Not tainted syzkaller #0 [ 47.640051][ T692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 47.650462][ T692] Call Trace: [ 47.654042][ T692] [ 47.657020][ T692] __dump_stack+0x21/0x24 [ 47.661487][ T692] dump_stack_lvl+0xee/0x150 [ 47.666204][ T692] ? __cfi_dump_stack_lvl+0x8/0x8 [ 47.671351][ T692] dump_stack+0x15/0x24 [ 47.675549][ T692] should_fail_ex+0x3d4/0x520 [ 47.680451][ T692] ? security_inode_alloc+0x33/0x120 [ 47.686128][ T692] __should_failslab+0xac/0xf0 [ 47.690991][ T692] should_failslab+0x9/0x20 [ 47.695529][ T692] kmem_cache_alloc+0x3b/0x330 [ 47.700472][ T692] ? slab_pre_alloc_hook+0x30/0x1e0 [ 47.705818][ T692] security_inode_alloc+0x33/0x120 [ 47.711063][ T692] inode_init_always+0x6fc/0x960 [ 47.716050][ T692] new_inode_pseudo+0xa2/0x1f0 [ 47.721030][ T692] __sock_create+0x12c/0x7c0 [ 47.725660][ T692] __sys_socketpair+0x1a1/0x5b0 [ 47.730630][ T692] __x64_sys_socketpair+0x9b/0xb0 [ 47.735897][ T692] x64_sys_call+0x6e/0x9a0 [ 47.740352][ T692] do_syscall_64+0x4c/0xa0 [ 47.744799][ T692] ? clear_bhb_loop+0x30/0x80 [ 47.749539][ T692] ? clear_bhb_loop+0x30/0x80 [ 47.754521][ T692] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 47.761079][ T692] RIP: 0033:0x7f58cf18f749 [ 47.766235][ T692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.786592][ T692] RSP: 002b:00007f58d00f1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 47.795141][ T692] RAX: ffffffffffffffda RBX: 00007f58cf3e5fa0 RCX: 00007f58cf18f749 [ 47.803242][ T692] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 47.811596][ T692] RBP: 00007f58d00f1090 R08: 0000000000000000 R09: 0000000000000000 [ 47.819788][ T692] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 47.827880][ T692] R13: 00007f58cf3e6038 R14: 00007f58cf3e5fa0 R15: 00007ffc885c7058 [ 47.835994][ T692] [ 47.892149][ T692] socket: no more sockets [ 48.208492][ T28] audit: type=1400 audit(1765631241.049:118): avc: denied { cpu } for pid=707 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 48.392519][ T717] dvmrp1: tun_chr_ioctl cmd 2147767520 [ 49.081804][ T735] FAULT_INJECTION: forcing a failure. [ 49.081804][ T735] name failslab, interval 1, probability 0, space 0, times 0 [ 49.153781][ T735] CPU: 1 PID: 735 Comm: syz.1.124 Not tainted syzkaller #0 [ 49.161147][ T735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 49.171407][ T735] Call Trace: [ 49.174720][ T735] [ 49.177688][ T735] __dump_stack+0x21/0x24 [ 49.182160][ T735] dump_stack_lvl+0xee/0x150 [ 49.187247][ T735] ? __cfi_dump_stack_lvl+0x8/0x8 [ 49.192413][ T735] dump_stack+0x15/0x24 [ 49.196718][ T735] should_fail_ex+0x3d4/0x520 [ 49.201525][ T735] ? sk_prot_alloc+0x5f/0x320 [ 49.206260][ T735] __should_failslab+0xac/0xf0 [ 49.211068][ T735] should_failslab+0x9/0x20 [ 49.215786][ T735] kmem_cache_alloc+0x3b/0x330 [ 49.220804][ T735] sk_prot_alloc+0x5f/0x320 [ 49.225915][ T735] sk_alloc+0x3b/0x460 [ 49.230027][ T735] ? __kasan_slab_alloc+0x72/0x80 [ 49.235095][ T735] tipc_sk_create+0xe6/0x1e60 [ 49.239913][ T735] ? security_inode_alloc+0x33/0x120 [ 49.245238][ T735] ? __kasan_check_write+0x14/0x20 [ 49.250494][ T735] ? _raw_spin_lock+0x8e/0xe0 [ 49.255461][ T735] ? __cfi__raw_spin_lock+0x10/0x10 [ 49.260771][ T735] ? security_inode_alloc+0xd1/0x120 [ 49.266990][ T735] ? inode_init_always+0x714/0x960 [ 49.272408][ T735] __sock_create+0x39e/0x7c0 [ 49.277075][ T735] __sys_socketpair+0x1a1/0x5b0 [ 49.282656][ T735] __x64_sys_socketpair+0x9b/0xb0 [ 49.287895][ T735] x64_sys_call+0x6e/0x9a0 [ 49.293020][ T735] do_syscall_64+0x4c/0xa0 [ 49.297455][ T735] ? clear_bhb_loop+0x30/0x80 [ 49.302232][ T735] ? clear_bhb_loop+0x30/0x80 [ 49.307107][ T735] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 49.313385][ T735] RIP: 0033:0x7f6c1618f749 [ 49.317932][ T735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.337988][ T735] RSP: 002b:00007f6c16f7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 49.346780][ T735] RAX: ffffffffffffffda RBX: 00007f6c163e5fa0 RCX: 00007f6c1618f749 [ 49.355078][ T735] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 49.363639][ T735] RBP: 00007f6c16f7f090 R08: 0000000000000000 R09: 0000000000000000 [ 49.371987][ T735] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 49.380254][ T735] R13: 00007f6c163e6038 R14: 00007f6c163e5fa0 R15: 00007ffed41ddeb8 [ 49.388683][ T735] [ 50.616437][ T768] device pim6reg1 entered promiscuous mode [ 51.075860][ T783] FAULT_INJECTION: forcing a failure. [ 51.075860][ T783] name failslab, interval 1, probability 0, space 0, times 0 [ 51.265447][ T783] CPU: 0 PID: 783 Comm: syz.0.142 Not tainted syzkaller #0 [ 51.272726][ T783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 51.282830][ T783] Call Trace: [ 51.286234][ T783] [ 51.289306][ T783] __dump_stack+0x21/0x24 [ 51.293771][ T783] dump_stack_lvl+0xee/0x150 [ 51.298566][ T783] ? __cfi_dump_stack_lvl+0x8/0x8 [ 51.303627][ T783] dump_stack+0x15/0x24 [ 51.307826][ T783] should_fail_ex+0x3d4/0x520 [ 51.312983][ T783] __should_failslab+0xac/0xf0 [ 51.317869][ T783] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 51.323627][ T783] should_failslab+0x9/0x20 [ 51.328160][ T783] __kmem_cache_alloc_node+0x3d/0x2c0 [ 51.333678][ T783] ? __kasan_slab_alloc+0x72/0x80 [ 51.338840][ T783] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 51.344683][ T783] kmalloc_trace+0x29/0xb0 [ 51.349146][ T783] selinux_sk_alloc_security+0x7e/0x1a0 [ 51.354714][ T783] security_sk_alloc+0x83/0xb0 [ 51.359517][ T783] sk_prot_alloc+0x108/0x320 [ 51.364148][ T783] sk_alloc+0x3b/0x460 [ 51.368247][ T783] ? __kasan_slab_alloc+0x72/0x80 [ 51.373313][ T783] tipc_sk_create+0xe6/0x1e60 [ 51.378097][ T783] ? security_inode_alloc+0x33/0x120 [ 51.383483][ T783] ? __kasan_check_write+0x14/0x20 [ 51.388702][ T783] ? _raw_spin_lock+0x8e/0xe0 [ 51.393728][ T783] ? __cfi__raw_spin_lock+0x10/0x10 [ 51.399328][ T783] ? security_inode_alloc+0xd1/0x120 [ 51.404746][ T783] ? inode_init_always+0x714/0x960 [ 51.409905][ T783] __sock_create+0x39e/0x7c0 [ 51.414534][ T783] __sys_socketpair+0x1a1/0x5b0 [ 51.419491][ T783] __x64_sys_socketpair+0x9b/0xb0 [ 51.424893][ T783] x64_sys_call+0x6e/0x9a0 [ 51.429470][ T783] do_syscall_64+0x4c/0xa0 [ 51.433984][ T783] ? clear_bhb_loop+0x30/0x80 [ 51.438697][ T783] ? clear_bhb_loop+0x30/0x80 [ 51.443511][ T783] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 51.449583][ T783] RIP: 0033:0x7f58cf18f749 [ 51.454466][ T783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.474426][ T783] RSP: 002b:00007f58d00f1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 51.482954][ T783] RAX: ffffffffffffffda RBX: 00007f58cf3e5fa0 RCX: 00007f58cf18f749 [ 51.491027][ T783] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 51.499449][ T783] RBP: 00007f58d00f1090 R08: 0000000000000000 R09: 0000000000000000 [ 51.507509][ T783] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 51.515547][ T783] R13: 00007f58cf3e6038 R14: 00007f58cf3e5fa0 R15: 00007ffc885c7058 [ 51.523711][ T783] [ 51.981562][ T808] device syzkaller0 entered promiscuous mode [ 53.384071][ T854] device sit0 entered promiscuous mode [ 53.890187][ T28] audit: type=1400 audit(1765631246.729:119): avc: denied { create } for pid=852 comm="syz.2.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 54.607147][ T881] bond_slave_1: mtu less than device minimum [ 55.004041][ T892] device pim6reg1 entered promiscuous mode [ 55.229068][ T781] syz.2.135 (781) used greatest stack depth: 21984 bytes left [ 56.391893][ T941] device pim6reg1 entered promiscuous mode [ 57.510304][ T974] bond_slave_1: mtu less than device minimum [ 57.689855][ T28] audit: type=1400 audit(1765631250.519:120): avc: denied { associate } for pid=979 comm="syz.4.203" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 58.275822][ T997] FAULT_INJECTION: forcing a failure. [ 58.275822][ T997] name failslab, interval 1, probability 0, space 0, times 0 [ 58.288896][ T997] CPU: 0 PID: 997 Comm: syz.3.209 Not tainted syzkaller #0 [ 58.296138][ T997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 58.306492][ T997] Call Trace: [ 58.310062][ T997] [ 58.313016][ T997] __dump_stack+0x21/0x24 [ 58.317377][ T997] dump_stack_lvl+0xee/0x150 [ 58.322092][ T997] ? __cfi_dump_stack_lvl+0x8/0x8 [ 58.327254][ T997] dump_stack+0x15/0x24 [ 58.331445][ T997] should_fail_ex+0x3d4/0x520 [ 58.336359][ T997] __should_failslab+0xac/0xf0 [ 58.341331][ T997] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 58.347093][ T997] should_failslab+0x9/0x20 [ 58.351640][ T997] __kmem_cache_alloc_node+0x3d/0x2c0 [ 58.357182][ T997] ? __kasan_slab_alloc+0x72/0x80 [ 58.362423][ T997] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 58.368742][ T997] kmalloc_trace+0x29/0xb0 [ 58.374000][ T997] selinux_sk_alloc_security+0x7e/0x1a0 [ 58.379852][ T997] security_sk_alloc+0x83/0xb0 [ 58.384676][ T997] sk_prot_alloc+0x108/0x320 [ 58.389390][ T997] sk_alloc+0x3b/0x460 [ 58.393493][ T997] ? __kasan_slab_alloc+0x72/0x80 [ 58.398672][ T997] tipc_sk_create+0xe6/0x1e60 [ 58.403465][ T997] ? security_inode_alloc+0x33/0x120 [ 58.408779][ T997] ? __kasan_check_write+0x14/0x20 [ 58.413954][ T997] ? _raw_spin_lock+0x8e/0xe0 [ 58.418664][ T997] ? __cfi__raw_spin_lock+0x10/0x10 [ 58.423891][ T997] ? security_inode_alloc+0xd1/0x120 [ 58.429398][ T997] ? inode_init_always+0x714/0x960 [ 58.434552][ T997] __sock_create+0x39e/0x7c0 [ 58.439176][ T997] __sys_socketpair+0x218/0x5b0 [ 58.444069][ T997] __x64_sys_socketpair+0x9b/0xb0 [ 58.449228][ T997] x64_sys_call+0x6e/0x9a0 [ 58.453688][ T997] do_syscall_64+0x4c/0xa0 [ 58.458138][ T997] ? clear_bhb_loop+0x30/0x80 [ 58.462930][ T997] ? clear_bhb_loop+0x30/0x80 [ 58.467735][ T997] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 58.473804][ T997] RIP: 0033:0x7f0417d8f749 [ 58.478228][ T997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.498130][ T997] RSP: 002b:00007f0418ce6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 58.506561][ T997] RAX: ffffffffffffffda RBX: 00007f0417fe5fa0 RCX: 00007f0417d8f749 [ 58.514746][ T997] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 58.522872][ T997] RBP: 00007f0418ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 58.533640][ T997] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 58.541922][ T997] R13: 00007f0417fe6038 R14: 00007f0417fe5fa0 R15: 00007ffe0abffe48 [ 58.550022][ T997] [ 59.218921][ T1007] device syzkaller0 entered promiscuous mode [ 59.714384][ T1032] device sit0 entered promiscuous mode [ 60.318957][ T1045] device sit0 entered promiscuous mode [ 60.588084][ T1051] FAULT_INJECTION: forcing a failure. [ 60.588084][ T1051] name failslab, interval 1, probability 0, space 0, times 0 [ 60.601584][ T1051] CPU: 0 PID: 1051 Comm: syz.3.222 Not tainted syzkaller #0 [ 60.608925][ T1051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 60.619196][ T1051] Call Trace: [ 60.622516][ T1051] [ 60.625474][ T1051] __dump_stack+0x21/0x24 [ 60.629845][ T1051] dump_stack_lvl+0xee/0x150 [ 60.634562][ T1051] ? __cfi_dump_stack_lvl+0x8/0x8 [ 60.639712][ T1051] ? __sched_text_start+0x8/0x8 [ 60.644709][ T1051] dump_stack+0x15/0x24 [ 60.649079][ T1051] should_fail_ex+0x3d4/0x520 [ 60.653888][ T1051] __should_failslab+0xac/0xf0 [ 60.658882][ T1051] should_failslab+0x9/0x20 [ 60.663611][ T1051] slab_pre_alloc_hook+0x30/0x1e0 [ 60.668857][ T1051] kmem_cache_alloc_lru+0x49/0x280 [ 60.674016][ T1051] ? __d_alloc+0x34/0x6c0 [ 60.678394][ T1051] __d_alloc+0x34/0x6c0 [ 60.682592][ T1051] ? tipc_node_get_mtu+0x2b0/0x2b0 [ 60.687744][ T1051] d_alloc_pseudo+0x1d/0x70 [ 60.692476][ T1051] alloc_file_pseudo+0xc8/0x1f0 [ 60.697385][ T1051] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 60.702885][ T1051] ? tipc_sk_finish_conn+0x576/0x7e0 [ 60.708310][ T1051] sock_alloc_file+0xba/0x270 [ 60.713120][ T1051] __sys_socketpair+0x2d5/0x5b0 [ 60.718013][ T1051] __x64_sys_socketpair+0x9b/0xb0 [ 60.723176][ T1051] x64_sys_call+0x6e/0x9a0 [ 60.727627][ T1051] do_syscall_64+0x4c/0xa0 [ 60.732077][ T1051] ? clear_bhb_loop+0x30/0x80 [ 60.736798][ T1051] ? clear_bhb_loop+0x30/0x80 [ 60.741515][ T1051] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 60.747537][ T1051] RIP: 0033:0x7f0417d8f749 [ 60.751987][ T1051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.771908][ T1051] RSP: 002b:00007f0418ce6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 60.780579][ T1051] RAX: ffffffffffffffda RBX: 00007f0417fe5fa0 RCX: 00007f0417d8f749 [ 60.788668][ T1051] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 60.796863][ T1051] RBP: 00007f0418ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 60.805033][ T1051] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000002 [ 60.813072][ T1051] R13: 00007f0417fe6038 R14: 00007f0417fe5fa0 R15: 00007ffe0abffe48 [ 60.821094][ T1051] [ 61.336064][ T1065] device sit0 left promiscuous mode [ 61.558227][ T1068] device sit0 left promiscuous mode [ 61.878145][ T1070] device sit0 entered promiscuous mode [ 62.538691][ T1093] FAULT_INJECTION: forcing a failure. [ 62.538691][ T1093] name failslab, interval 1, probability 0, space 0, times 0 [ 62.682716][ T1093] CPU: 1 PID: 1093 Comm: syz.0.236 Not tainted syzkaller #0 [ 62.690606][ T1093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 62.701045][ T1093] Call Trace: [ 62.704359][ T1093] [ 62.707406][ T1093] __dump_stack+0x21/0x24 [ 62.711966][ T1093] dump_stack_lvl+0xee/0x150 [ 62.716655][ T1093] ? __cfi_dump_stack_lvl+0x8/0x8 [ 62.721845][ T1093] dump_stack+0x15/0x24 [ 62.726370][ T1093] should_fail_ex+0x3d4/0x520 [ 62.731282][ T1093] ? __alloc_file+0x28/0x2a0 [ 62.736384][ T1093] __should_failslab+0xac/0xf0 [ 62.741215][ T1093] should_failslab+0x9/0x20 [ 62.746030][ T1093] kmem_cache_alloc+0x3b/0x330 [ 62.751036][ T1093] ? __cfi__raw_spin_lock+0x10/0x10 [ 62.756635][ T1093] __alloc_file+0x28/0x2a0 [ 62.761228][ T1093] alloc_empty_file+0x97/0x180 [ 62.766038][ T1093] alloc_file+0x59/0x640 [ 62.770338][ T1093] alloc_file_pseudo+0x17a/0x1f0 [ 62.775323][ T1093] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 62.781427][ T1093] sock_alloc_file+0xba/0x270 [ 62.786157][ T1093] __sys_socketpair+0x2d5/0x5b0 [ 62.791147][ T1093] __x64_sys_socketpair+0x9b/0xb0 [ 62.796234][ T1093] x64_sys_call+0x6e/0x9a0 [ 62.800960][ T1093] do_syscall_64+0x4c/0xa0 [ 62.805688][ T1093] ? clear_bhb_loop+0x30/0x80 [ 62.810631][ T1093] ? clear_bhb_loop+0x30/0x80 [ 62.815448][ T1093] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 62.822263][ T1093] RIP: 0033:0x7f58cf18f749 [ 62.826798][ T1093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.847926][ T1093] RSP: 002b:00007f58d00f1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 62.856734][ T1093] RAX: ffffffffffffffda RBX: 00007f58cf3e5fa0 RCX: 00007f58cf18f749 [ 62.864761][ T1093] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 62.872942][ T1093] RBP: 00007f58d00f1090 R08: 0000000000000000 R09: 0000000000000000 [ 62.881212][ T1093] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000002 [ 62.889396][ T1093] R13: 00007f58cf3e6038 R14: 00007f58cf3e5fa0 R15: 00007ffc885c7058 [ 62.897776][ T1093] [ 63.023476][ T1103] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.031296][ T1103] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.041068][ T1103] device bridge0 entered promiscuous mode [ 63.225260][ T28] audit: type=1400 audit(1765631256.059:121): avc: denied { ioctl } for pid=1112 comm="syz.3.244" path="pid:[4026532288]" dev="nsfs" ino=4026532288 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 63.319017][ T1119] FAULT_INJECTION: forcing a failure. [ 63.319017][ T1119] name failslab, interval 1, probability 0, space 0, times 0 [ 63.353372][ T1119] CPU: 0 PID: 1119 Comm: syz.1.247 Not tainted syzkaller #0 [ 63.360921][ T1119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 63.371200][ T1119] Call Trace: [ 63.374604][ T1119] [ 63.377668][ T1119] __dump_stack+0x21/0x24 [ 63.382131][ T1119] dump_stack_lvl+0xee/0x150 [ 63.387035][ T1119] ? __cfi_dump_stack_lvl+0x8/0x8 [ 63.392208][ T1119] dump_stack+0x15/0x24 [ 63.396418][ T1119] should_fail_ex+0x3d4/0x520 [ 63.401511][ T1119] ? security_file_alloc+0x33/0x130 [ 63.406762][ T1119] __should_failslab+0xac/0xf0 [ 63.411842][ T1119] should_failslab+0x9/0x20 [ 63.416381][ T1119] kmem_cache_alloc+0x3b/0x330 [ 63.421362][ T1119] ? __alloc_file+0x28/0x2a0 [ 63.426079][ T1119] security_file_alloc+0x33/0x130 [ 63.431317][ T1119] __alloc_file+0xb5/0x2a0 [ 63.435771][ T1119] alloc_empty_file+0x97/0x180 [ 63.440333][ T1118] device syzkaller0 entered promiscuous mode [ 63.440665][ T1119] alloc_file+0x59/0x640 [ 63.451018][ T1119] alloc_file_pseudo+0x17a/0x1f0 [ 63.456189][ T1119] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 63.461687][ T1119] sock_alloc_file+0xba/0x270 [ 63.466398][ T1119] __sys_socketpair+0x2d5/0x5b0 [ 63.471267][ T1119] __x64_sys_socketpair+0x9b/0xb0 [ 63.476358][ T1119] x64_sys_call+0x6e/0x9a0 [ 63.480798][ T1119] do_syscall_64+0x4c/0xa0 [ 63.485317][ T1119] ? clear_bhb_loop+0x30/0x80 [ 63.490035][ T1119] ? clear_bhb_loop+0x30/0x80 [ 63.494839][ T1119] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 63.500753][ T1119] RIP: 0033:0x7f6c1618f749 [ 63.505180][ T1119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 63.525243][ T1119] RSP: 002b:00007f6c16f7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 63.534036][ T1119] RAX: ffffffffffffffda RBX: 00007f6c163e5fa0 RCX: 00007f6c1618f749 [ 63.542628][ T1119] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 63.550618][ T1119] RBP: 00007f6c16f7f090 R08: 0000000000000000 R09: 0000000000000000 [ 63.558685][ T1119] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000002 [ 63.566673][ T1119] R13: 00007f6c163e6038 R14: 00007f6c163e5fa0 R15: 00007ffed41ddeb8 [ 63.574671][ T1119] [ 63.777196][ T1130] syz.0.250[1130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.777278][ T1130] syz.0.250[1130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.866221][ T1199] device bridge0 left promiscuous mode [ 66.146166][ T1214] FAULT_INJECTION: forcing a failure. [ 66.146166][ T1214] name failslab, interval 1, probability 0, space 0, times 0 [ 66.207757][ T1206] device sit0 left promiscuous mode [ 66.266534][ T1214] CPU: 0 PID: 1214 Comm: syz.0.273 Not tainted syzkaller #0 [ 66.273966][ T1214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 66.284146][ T1214] Call Trace: [ 66.287553][ T1214] [ 66.290514][ T1214] __dump_stack+0x21/0x24 [ 66.294883][ T1214] dump_stack_lvl+0xee/0x150 [ 66.299610][ T1214] ? __cfi_dump_stack_lvl+0x8/0x8 [ 66.304817][ T1214] dump_stack+0x15/0x24 [ 66.309021][ T1214] should_fail_ex+0x3d4/0x520 [ 66.313761][ T1214] ? security_file_alloc+0x33/0x130 [ 66.319033][ T1214] __should_failslab+0xac/0xf0 [ 66.323858][ T1214] should_failslab+0x9/0x20 [ 66.328505][ T1214] kmem_cache_alloc+0x3b/0x330 [ 66.333492][ T1214] ? __alloc_file+0x28/0x2a0 [ 66.338127][ T1214] security_file_alloc+0x33/0x130 [ 66.343202][ T1214] __alloc_file+0xb5/0x2a0 [ 66.347771][ T1214] alloc_empty_file+0x97/0x180 [ 66.352679][ T1214] alloc_file+0x59/0x640 [ 66.357143][ T1214] alloc_file_pseudo+0x17a/0x1f0 [ 66.362127][ T1214] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 66.367915][ T1214] sock_alloc_file+0xba/0x270 [ 66.372670][ T1214] __sys_socketpair+0x3a9/0x5b0 [ 66.377647][ T1214] __x64_sys_socketpair+0x9b/0xb0 [ 66.382900][ T1214] x64_sys_call+0x6e/0x9a0 [ 66.387545][ T1214] do_syscall_64+0x4c/0xa0 [ 66.392002][ T1214] ? clear_bhb_loop+0x30/0x80 [ 66.396729][ T1214] ? clear_bhb_loop+0x30/0x80 [ 66.401535][ T1214] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 66.407490][ T1214] RIP: 0033:0x7f58cf18f749 [ 66.412024][ T1214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 66.432020][ T1214] RSP: 002b:00007f58d00f1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 66.440485][ T1214] RAX: ffffffffffffffda RBX: 00007f58cf3e5fa0 RCX: 00007f58cf18f749 [ 66.448496][ T1214] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 66.456591][ T1214] RBP: 00007f58d00f1090 R08: 0000000000000000 R09: 0000000000000000 [ 66.464765][ T1214] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000002 [ 66.473047][ T1214] R13: 00007f58cf3e6038 R14: 00007f58cf3e5fa0 R15: 00007ffc885c7058 [ 66.481585][ T1214] [ 66.705395][ T1228] device sit0 entered promiscuous mode [ 68.236764][ T1254] syz.3.285 (1254) used greatest stack depth: 21408 bytes left [ 68.543316][ T28] audit: type=1400 audit(1765631261.379:122): avc: denied { create } for pid=1294 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 68.566780][ T1300] syz.2.300[1300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.567053][ T1300] syz.2.300[1300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.605517][ T1297] device pim6reg1 entered promiscuous mode [ 68.607006][ T1299] syz.2.300[1299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.756687][ T28] audit: type=1400 audit(1765631261.589:123): avc: denied { create } for pid=1303 comm="syz.2.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 70.433088][ T28] audit: type=1400 audit(1765631263.269:124): avc: denied { create } for pid=1340 comm="syz.0.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 71.527910][ T28] audit: type=1400 audit(1765631264.369:125): avc: denied { ioctl } for pid=1374 comm="syz.0.321" path="socket:[19171]" dev="sockfs" ino=19171 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 74.797092][ T28] audit: type=1400 audit(1765631267.639:126): avc: denied { create } for pid=1405 comm="syz.3.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 77.090093][ T1491] device sit0 entered promiscuous mode [ 77.420712][ T1488] device sit0 entered promiscuous mode [ 77.561563][ T1510] device sit0 left promiscuous mode [ 77.598305][ T1510] device sit0 entered promiscuous mode [ 77.971967][ T1541] device sit0 left promiscuous mode [ 78.175815][ T28] audit: type=1400 audit(1765631271.009:127): avc: denied { create } for pid=1550 comm="syz.3.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 79.550132][ T28] audit: type=1400 audit(1765631272.339:128): avc: denied { create } for pid=1604 comm="syz.2.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 79.615479][ T28] audit: type=1400 audit(1765631272.429:129): avc: denied { create } for pid=1604 comm="syz.2.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 80.715964][ T28] audit: type=1400 audit(1765631273.559:130): avc: denied { create } for pid=1653 comm="syz.4.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 80.789677][ T1657] device pim6reg1 entered promiscuous mode [ 80.887997][ T1659] device syzkaller0 entered promiscuous mode [ 81.446205][ T1689] device pim6reg1 entered promiscuous mode [ 81.609207][ T1693] : port 1(erspan0) entered blocking state [ 81.662950][ T1693] : port 1(erspan0) entered disabled state [ 81.729497][ T1693] device erspan0 entered promiscuous mode [ 81.799746][ T1694] : port 1(erspan0) entered blocking state [ 81.806991][ T1694] : port 1(erspan0) entered forwarding state [ 81.873711][ T1701] device pim6reg1 entered promiscuous mode [ 82.061397][ T1707] device sit0 entered promiscuous mode [ 82.411186][ T1726] syz.3.424[1726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.411302][ T1726] syz.3.424[1726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.438631][ T1726] syz.3.424[1726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.450788][ T28] audit: type=1400 audit(1765631275.289:131): avc: denied { create } for pid=1727 comm="syz.4.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 82.486298][ T1726] syz.3.424[1726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.029169][ T1743] device pim6reg1 entered promiscuous mode [ 83.547720][ T1761] bridge0: port 3(veth1_macvtap) entered blocking state [ 83.555523][ T1761] bridge0: port 3(veth1_macvtap) entered disabled state [ 83.783404][ T1761] device veth0_vlan left promiscuous mode [ 83.790554][ T1761] device veth0_vlan entered promiscuous mode [ 83.811462][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.840611][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.879654][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.043328][ T1789] device pim6reg1 entered promiscuous mode [ 85.305895][ T1817] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.317356][ T1817] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.715471][ T1827] device pim6reg1 entered promiscuous mode [ 85.940504][ T1833] device macsec0 entered promiscuous mode [ 89.379040][ T1951] device pim6reg1 entered promiscuous mode [ 89.999362][ T1970] tap0: tun_chr_ioctl cmd 1074025677 [ 90.009809][ T1970] tap0: linktype set to 774 [ 91.651792][ T2011] device pim6reg1 entered promiscuous mode [ 92.099136][ T2034] FAULT_INJECTION: forcing a failure. [ 92.099136][ T2034] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 92.115818][ T2034] CPU: 1 PID: 2034 Comm: syz.3.522 Not tainted syzkaller #0 [ 92.123261][ T2034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 92.133507][ T2034] Call Trace: [ 92.137159][ T2034] [ 92.140302][ T2034] __dump_stack+0x21/0x24 [ 92.145457][ T2034] dump_stack_lvl+0xee/0x150 [ 92.150539][ T2034] ? __cfi_dump_stack_lvl+0x8/0x8 [ 92.155781][ T2034] dump_stack+0x15/0x24 [ 92.159995][ T2034] should_fail_ex+0x3d4/0x520 [ 92.164994][ T2034] should_fail+0xb/0x10 [ 92.169223][ T2034] should_fail_usercopy+0x1a/0x20 [ 92.174480][ T2034] _copy_to_user+0x1e/0x90 [ 92.179555][ T2034] simple_read_from_buffer+0xe9/0x160 [ 92.185664][ T2034] proc_fail_nth_read+0x19a/0x210 [ 92.191431][ T2034] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 92.197373][ T2034] ? security_file_permission+0x94/0xb0 [ 92.202969][ T2034] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 92.208647][ T2034] vfs_read+0x26e/0x8c0 [ 92.212943][ T2034] ? __cfi_vfs_read+0x10/0x10 [ 92.217760][ T2034] ? __kasan_check_write+0x14/0x20 [ 92.222999][ T2034] ? mutex_lock+0x8d/0x1a0 [ 92.227470][ T2034] ? __cfi_mutex_lock+0x10/0x10 [ 92.232545][ T2034] ? __fdget_pos+0x2cd/0x380 [ 92.237191][ T2034] ? ksys_read+0x71/0x240 [ 92.241657][ T2034] ksys_read+0x140/0x240 [ 92.246051][ T2034] ? __cfi_ksys_read+0x10/0x10 [ 92.250955][ T2034] ? fpregs_restore_userregs+0x128/0x260 [ 92.256630][ T2034] __x64_sys_read+0x7b/0x90 [ 92.261458][ T2034] x64_sys_call+0x2f/0x9a0 [ 92.265930][ T2034] do_syscall_64+0x4c/0xa0 [ 92.270384][ T2034] ? clear_bhb_loop+0x30/0x80 [ 92.275099][ T2034] ? clear_bhb_loop+0x30/0x80 [ 92.279906][ T2034] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 92.285930][ T2034] RIP: 0033:0x7f0417d8e15c [ 92.290456][ T2034] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 92.310288][ T2034] RSP: 002b:00007f0418ce6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 92.318913][ T2034] RAX: ffffffffffffffda RBX: 00007f0417fe5fa0 RCX: 00007f0417d8e15c [ 92.327013][ T2034] RDX: 000000000000000f RSI: 00007f0418ce60a0 RDI: 0000000000000005 [ 92.335191][ T2034] RBP: 00007f0418ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 92.343647][ T2034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.351644][ T2034] R13: 00007f0417fe6038 R14: 00007f0417fe5fa0 R15: 00007ffe0abffe48 [ 92.359661][ T2034] [ 92.698010][ T2057] device pim6reg1 entered promiscuous mode [ 92.769562][ T2060] device sit0 left promiscuous mode [ 93.057500][ T2064] device sit0 entered promiscuous mode [ 97.117140][ T2167] device bridge_slave_1 left promiscuous mode [ 97.123637][ T2167] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.132439][ T2167] device bridge_slave_0 left promiscuous mode [ 97.146186][ T2167] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.219145][ T28] audit: type=1400 audit(1765631290.059:132): avc: denied { create } for pid=2174 comm="syz.1.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 97.923149][ T2207] device pim6reg1 entered promiscuous mode [ 98.383065][ T2217] device sit0 left promiscuous mode [ 98.449210][ T2219] device sit0 entered promiscuous mode [ 98.815026][ T2225] device sit0 left promiscuous mode [ 100.170771][ T28] audit: type=1400 audit(1765631293.009:133): avc: denied { create } for pid=2259 comm="syz.4.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 101.970041][ T2323] device sit0 left promiscuous mode [ 102.017212][ T28] audit: type=1400 audit(1765631294.859:134): avc: denied { create } for pid=2327 comm="syz.2.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 102.256578][ T2339] syz.2.614[2339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.256654][ T2339] syz.2.614[2339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.091829][ T2406] device pim6reg1 entered promiscuous mode [ 103.603592][ T2433] device sit0 entered promiscuous mode [ 103.954944][ T2443] device pim6reg1 entered promiscuous mode [ 104.327299][ T2461] device sit0 left promiscuous mode [ 104.426617][ T2461] device dummy0 entered promiscuous mode [ 104.444371][ T2468] device sit0 left promiscuous mode [ 104.501194][ T2467] device sit0 entered promiscuous mode [ 104.789753][ T2488] device Ÿë entered promiscuous mode [ 105.077466][ T2501] ref_ctr_offset mismatch. inode: 0x2c7 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 105.106134][ T2500] bridge0: port 3(veth1_macvtap) entered blocking state [ 105.155907][ T2500] bridge0: port 3(veth1_macvtap) entered disabled state [ 105.227168][ T2504] device pim6reg1 entered promiscuous mode [ 105.819338][ T2524] device syzkaller0 entered promiscuous mode [ 105.856198][ T2526] device macsec0 left promiscuous mode [ 106.874512][ T2554] device pim6reg1 entered promiscuous mode [ 107.159791][ T2559] device pim6reg1 entered promiscuous mode [ 108.378270][ T2585] device syzkaller0 entered promiscuous mode [ 108.667004][ T2602] device bridge_slave_1 left promiscuous mode [ 108.678329][ T2602] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.739497][ T2602] device bridge_slave_0 left promiscuous mode [ 108.765075][ T2602] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.802928][ T28] audit: type=1400 audit(1765631301.639:135): avc: denied { create } for pid=2614 comm="syz.1.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 108.867826][ T2615] device sit0 left promiscuous mode [ 108.884301][ T2624] device sit0 entered promiscuous mode [ 109.027798][ T2624] bond_slave_1: mtu less than device minimum [ 109.807614][ T2648] device pim6reg1 entered promiscuous mode [ 109.881787][ T2659] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.889239][ T2659] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.638661][ T2700] device pim6reg1 entered promiscuous mode [ 111.614514][ T28] audit: type=1400 audit(1765631304.449:136): avc: denied { create } for pid=2721 comm="syz.2.729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 111.958658][ T2742] device pim6reg1 entered promiscuous mode [ 113.422202][ T2778] device syzkaller0 entered promiscuous mode [ 115.947739][ T2870] device pim6reg1 entered promiscuous mode [ 118.328800][ T2906] -: renamed from syzkaller0 [ 120.645745][ T28] audit: type=1400 audit(1765631313.489:137): avc: denied { write } for pid=2951 comm="syz.4.800" name="cgroup.subtree_control" dev="cgroup2" ino=349 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 120.679317][ T28] audit: type=1400 audit(1765631313.519:138): avc: denied { open } for pid=2951 comm="syz.4.800" path="" dev="cgroup2" ino=349 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 121.465289][ T28] audit: type=1400 audit(1765631314.299:139): avc: denied { create } for pid=2991 comm="syz.2.813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 122.477205][ T3022] device syzkaller0 entered promiscuous mode [ 123.962229][ T3088] device pim6reg1 entered promiscuous mode [ 124.202715][ T3091] device syzkaller0 entered promiscuous mode [ 125.180537][ T3131] device pim6reg1 entered promiscuous mode [ 125.467277][ T3150] syz.1.858[3150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.467363][ T3150] syz.1.858[3150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.576959][ T3175] device pim6reg1 entered promiscuous mode [ 128.134171][ T3206] syz.0.879[3206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.134597][ T3206] syz.0.879[3206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.161137][ T3280] device pim6reg1 entered promiscuous mode [ 130.522272][ T3300] device veth0_vlan left promiscuous mode [ 130.557847][ T3300] device veth0_vlan entered promiscuous mode [ 130.614922][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.642107][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.691056][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.764265][ T3377] FAULT_INJECTION: forcing a failure. [ 132.764265][ T3377] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.780489][ T3377] CPU: 1 PID: 3377 Comm: syz.3.938 Not tainted syzkaller #0 [ 132.787841][ T3377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 132.797927][ T3377] Call Trace: [ 132.801317][ T3377] [ 132.804277][ T3377] __dump_stack+0x21/0x24 [ 132.808647][ T3377] dump_stack_lvl+0xee/0x150 [ 132.813368][ T3377] ? __cfi_dump_stack_lvl+0x8/0x8 [ 132.818455][ T3377] dump_stack+0x15/0x24 [ 132.822721][ T3377] should_fail_ex+0x3d4/0x520 [ 132.827564][ T3377] should_fail+0xb/0x10 [ 132.832247][ T3377] should_fail_usercopy+0x1a/0x20 [ 132.837322][ T3377] _copy_from_user+0x1e/0xc0 [ 132.842030][ T3377] __sys_bpf+0x277/0x780 [ 132.846458][ T3377] ? bpf_link_show_fdinfo+0x320/0x320 [ 132.851845][ T3377] ? __cfi_ksys_write+0x10/0x10 [ 132.856789][ T3377] ? debug_smp_processor_id+0x17/0x20 [ 132.862257][ T3377] __x64_sys_bpf+0x7c/0x90 [ 132.866709][ T3377] x64_sys_call+0x488/0x9a0 [ 132.871226][ T3377] do_syscall_64+0x4c/0xa0 [ 132.875647][ T3377] ? clear_bhb_loop+0x30/0x80 [ 132.880452][ T3377] ? clear_bhb_loop+0x30/0x80 [ 132.885170][ T3377] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 132.891168][ T3377] RIP: 0033:0x7f0417d8f749 [ 132.895593][ T3377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.915463][ T3377] RSP: 002b:00007f0418ce6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 132.923905][ T3377] RAX: ffffffffffffffda RBX: 00007f0417fe5fa0 RCX: 00007f0417d8f749 [ 132.932018][ T3377] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0600000000000000 [ 132.940181][ T3377] RBP: 00007f0418ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 132.948406][ T3377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.956484][ T3377] R13: 00007f0417fe6038 R14: 00007f0417fe5fa0 R15: 00007ffe0abffe48 [ 132.964513][ T3377] [ 135.846669][ T3469] device syzkaller0 entered promiscuous mode [ 136.615895][ T3506] syz.3.982[3506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.621938][ T3506] syz.3.982[3506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.369214][ T3553] device syzkaller0 entered promiscuous mode [ 139.832225][ T3582] device veth0_vlan left promiscuous mode [ 139.888219][ T3582] device veth0_vlan entered promiscuous mode [ 139.942313][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.974187][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.008769][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.793014][ T3615] device pim6reg1 entered promiscuous mode [ 141.700173][ T3650] ref_ctr_offset mismatch. inode: 0x42b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 141.735761][ T3655] device pim6reg1 entered promiscuous mode [ 142.725261][ T3692] device veth1_macvtap left promiscuous mode [ 142.925017][ T3695] device pim6reg1 entered promiscuous mode [ 143.395793][ T28] audit: type=1400 audit(1765631336.239:140): avc: denied { getattr } for pid=3708 comm="syz.4.1042" path="net:[4026532670]" dev="nsfs" ino=4026532670 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 144.036008][ T3731] FAULT_INJECTION: forcing a failure. [ 144.036008][ T3731] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.065372][ T3731] CPU: 1 PID: 3731 Comm: syz.2.1045 Not tainted syzkaller #0 [ 144.072935][ T3731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 144.083602][ T3731] Call Trace: [ 144.087001][ T3731] [ 144.089977][ T3731] __dump_stack+0x21/0x24 [ 144.094337][ T3731] dump_stack_lvl+0xee/0x150 [ 144.098949][ T3731] ? __cfi_dump_stack_lvl+0x8/0x8 [ 144.103996][ T3731] ? ioctl_has_perm+0x391/0x4c0 [ 144.108892][ T3731] dump_stack+0x15/0x24 [ 144.113162][ T3731] should_fail_ex+0x3d4/0x520 [ 144.117863][ T3731] should_fail+0xb/0x10 [ 144.122067][ T3731] should_fail_usercopy+0x1a/0x20 [ 144.127111][ T3731] _copy_from_user+0x1e/0xc0 [ 144.131712][ T3731] __tun_chr_ioctl+0x1ed/0x1e70 [ 144.136574][ T3731] ? tun_flow_create+0x320/0x320 [ 144.141889][ T3731] ? mutex_unlock+0x89/0x220 [ 144.146541][ T3731] tun_chr_ioctl+0x2a/0x40 [ 144.150973][ T3731] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 144.156085][ T3731] __se_sys_ioctl+0x12f/0x1b0 [ 144.160767][ T3731] __x64_sys_ioctl+0x7b/0x90 [ 144.165555][ T3731] x64_sys_call+0x58b/0x9a0 [ 144.170182][ T3731] do_syscall_64+0x4c/0xa0 [ 144.174691][ T3731] ? clear_bhb_loop+0x30/0x80 [ 144.179385][ T3731] ? clear_bhb_loop+0x30/0x80 [ 144.184108][ T3731] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 144.190030][ T3731] RIP: 0033:0x7f6589f8f749 [ 144.194459][ T3731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.214419][ T3731] RSP: 002b:00007f658ad89038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 144.222839][ T3731] RAX: ffffffffffffffda RBX: 00007f658a1e6090 RCX: 00007f6589f8f749 [ 144.230822][ T3731] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000005 [ 144.238820][ T3731] RBP: 00007f658ad89090 R08: 0000000000000000 R09: 0000000000000000 [ 144.246804][ T3731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.254879][ T3731] R13: 00007f658a1e6128 R14: 00007f658a1e6090 R15: 00007ffcd9e1c478 [ 144.262861][ T3731] [ 145.710356][ T28] audit: type=1400 audit(1765631338.549:141): avc: denied { create } for pid=3762 comm="syz.4.1055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 145.901136][ T3773] device syzkaller0 entered promiscuous mode [ 145.932493][ T3771] bridge0: port 3(veth1_macvtap) entered blocking state [ 145.945415][ T3771] bridge0: port 3(veth1_macvtap) entered disabled state [ 146.244335][ T3787] device syzkaller0 entered promiscuous mode [ 147.157877][ T28] audit: type=1400 audit(1765631339.999:142): avc: denied { create } for pid=3815 comm="syz.0.1073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 148.333802][ T3835] device syzkaller0 entered promiscuous mode [ 148.424128][ T3847] device sit0 entered promiscuous mode [ 150.042991][ T3865] device sit0 left promiscuous mode [ 150.257305][ T3876] device veth0_vlan left promiscuous mode [ 150.277146][ T3876] device veth0_vlan entered promiscuous mode [ 150.302063][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.322617][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.338921][ T349] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 150.353700][ T3865] device sit0 entered promiscuous mode [ 150.958654][ T3890] device syzkaller0 entered promiscuous mode [ 153.365407][ T3958] device syzkaller0 entered promiscuous mode [ 153.513532][ T3968] device pim6reg1 entered promiscuous mode [ 154.016371][ T3983] device sit0 left promiscuous mode [ 155.185359][ T4013] device syzkaller0 entered promiscuous mode [ 156.032026][ T4031] device pim6reg1 entered promiscuous mode [ 157.022563][ T4072] device syzkaller0 entered promiscuous mode [ 158.202513][ T4122] device syzkaller0 entered promiscuous mode [ 159.345511][ T4175] device sit0 left promiscuous mode [ 159.472868][ T4182] device sit0 entered promiscuous mode [ 159.687319][ T4192] device syzkaller0 entered promiscuous mode [ 160.084444][ T4196] device syzkaller0 entered promiscuous mode [ 161.607800][ T4236] device syzkaller0 entered promiscuous mode [ 161.775198][ T4242] device syzkaller0 entered promiscuous mode [ 161.991653][ T4257] device sit0 left promiscuous mode [ 162.067264][ T4259] device sit0 entered promiscuous mode [ 163.304774][ T4308] device syzkaller0 entered promiscuous mode [ 163.337555][ T4324] device sit0 entered promiscuous mode [ 164.124028][ T4382] device pim6reg1 entered promiscuous mode [ 165.426360][ T4409] device syzkaller0 entered promiscuous mode [ 166.809903][ T4466] device pim6reg1 entered promiscuous mode [ 167.291735][ T4474] device syzkaller0 entered promiscuous mode [ 167.673475][ T4504] ÿÿÿÿÿÿ: renamed from vlan1 [ 167.809167][ T4509] device pim6reg1 entered promiscuous mode [ 168.517405][ T4554] device sit0 left promiscuous mode [ 170.222440][ T4585] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.238761][ T4585] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.271263][ T4585] device bridge_slave_0 entered promiscuous mode [ 170.335508][ T4585] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.367477][ T4585] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.423696][ T4585] device bridge_slave_1 entered promiscuous mode [ 170.461716][ T28] audit: type=1400 audit(1765631363.299:143): avc: denied { create } for pid=4603 comm="syz.4.1311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 170.557560][ T357] : port 1(erspan0) entered disabled state [ 170.593051][ T357] device erspan0 left promiscuous mode [ 170.610411][ T357] : port 1(erspan0) entered disabled state [ 170.954009][ T357] device veth0_vlan left promiscuous mode [ 171.708223][ T28] audit: type=1400 audit(1765631364.549:144): avc: denied { write } for pid=4585 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 171.868280][ T28] audit: type=1400 audit(1765631364.579:145): avc: denied { read } for pid=4585 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 172.007581][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.016136][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.163264][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.172293][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.181055][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.188147][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.195776][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.206032][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.214337][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.221480][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.269419][ T4653] syzkaller: port 1(erspan0) entered blocking state [ 172.276178][ T4653] syzkaller: port 1(erspan0) entered disabled state [ 172.284827][ T4653] device erspan0 entered promiscuous mode [ 172.293213][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.434333][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.445294][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.487416][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.498365][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.582096][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 172.591065][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 172.621330][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 172.638364][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.683424][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.691714][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.700847][ T4585] device veth0_vlan entered promiscuous mode [ 172.724413][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.736099][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.774118][ T4585] device veth1_macvtap entered promiscuous mode [ 172.834750][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.847112][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.856256][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.898214][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.907328][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.576343][ T4782] device pim6reg1 entered promiscuous mode [ 177.978173][ T4816] FAULT_INJECTION: forcing a failure. [ 177.978173][ T4816] name failslab, interval 1, probability 0, space 0, times 0 [ 177.994043][ T4816] CPU: 1 PID: 4816 Comm: syz.4.1378 Not tainted syzkaller #0 [ 178.001463][ T4816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 178.011625][ T4816] Call Trace: [ 178.015245][ T4816] [ 178.018384][ T4816] __dump_stack+0x21/0x24 [ 178.023012][ T4816] dump_stack_lvl+0xee/0x150 [ 178.028775][ T4816] ? __cfi_dump_stack_lvl+0x8/0x8 [ 178.034024][ T4816] ? format_decode+0xbdc/0x1520 [ 178.039403][ T4816] dump_stack+0x15/0x24 [ 178.043606][ T4816] should_fail_ex+0x3d4/0x520 [ 178.048501][ T4816] __should_failslab+0xac/0xf0 [ 178.053573][ T4816] should_failslab+0x9/0x20 [ 178.058433][ T4816] kmem_cache_alloc_node+0x42/0x340 [ 178.063651][ T4816] ? __alloc_skb+0xea/0x4b0 [ 178.068417][ T4816] ? add_uevent_var+0x27e/0x430 [ 178.073588][ T4816] __alloc_skb+0xea/0x4b0 [ 178.077934][ T4816] alloc_uevent_skb+0x85/0x240 [ 178.082717][ T4816] ? __cfi_rx_queue_namespace+0x10/0x10 [ 178.088570][ T4816] kobject_uevent_net_broadcast+0x1b4/0x5b0 [ 178.094564][ T4816] kobject_uevent_env+0x54f/0x730 [ 178.099603][ T4816] kobject_uevent+0x1d/0x30 [ 178.104635][ T4816] __kobject_del+0xd7/0x2f0 [ 178.109262][ T4816] kobject_put+0x1ee/0x280 [ 178.113716][ T4816] net_rx_queue_update_kobjects+0x45c/0x4d0 [ 178.119802][ T4816] ? netif_set_real_num_tx_queues+0x620/0x7f0 [ 178.125994][ T4816] netif_set_real_num_rx_queues+0x107/0x1f0 [ 178.131991][ T4816] __tun_detach+0xb67/0x1460 [ 178.136898][ T4816] __tun_chr_ioctl+0xaec/0x1e70 [ 178.141773][ T4816] ? tun_flow_create+0x320/0x320 [ 178.146711][ T4816] ? mutex_unlock+0x89/0x220 [ 178.151414][ T4816] tun_chr_ioctl+0x2a/0x40 [ 178.155946][ T4816] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 178.161073][ T4816] __se_sys_ioctl+0x12f/0x1b0 [ 178.165769][ T4816] __x64_sys_ioctl+0x7b/0x90 [ 178.170382][ T4816] x64_sys_call+0x58b/0x9a0 [ 178.174910][ T4816] do_syscall_64+0x4c/0xa0 [ 178.179597][ T4816] ? clear_bhb_loop+0x30/0x80 [ 178.184295][ T4816] ? clear_bhb_loop+0x30/0x80 [ 178.188995][ T4816] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 178.194953][ T4816] RIP: 0033:0x7f1fb178f749 [ 178.199554][ T4816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.219370][ T4816] RSP: 002b:00007f1fb260c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 178.227981][ T4816] RAX: ffffffffffffffda RBX: 00007f1fb19e5fa0 RCX: 00007f1fb178f749 [ 178.236394][ T4816] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000005 [ 178.244370][ T4816] RBP: 00007f1fb260c090 R08: 0000000000000000 R09: 0000000000000000 [ 178.252430][ T4816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.260401][ T4816] R13: 00007f1fb19e6038 R14: 00007f1fb19e5fa0 R15: 00007ffef223d178 [ 178.268594][ T4816] [ 178.543266][ T4840] syz.4.1386 (4840) used obsolete PPPIOCDETACH ioctl [ 179.587383][ T4890] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.595880][ T4890] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.742953][ T4888] device bridge_slave_1 left promiscuous mode [ 179.771080][ T4888] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.848072][ T4888] device bridge_slave_0 left promiscuous mode [ 179.854623][ T4888] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.852950][ T5012] device sit0 entered promiscuous mode [ 184.419069][ T28] audit: type=1400 audit(1765631377.259:146): avc: denied { create } for pid=5034 comm="syz.2.1451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 185.208981][ T5058] device pim6reg1 entered promiscuous mode [ 185.635954][ T5073] device wg2 entered promiscuous mode [ 185.649950][ T5069] device pim6reg1 entered promiscuous mode [ 185.735740][ T5070] device veth0_vlan left promiscuous mode [ 185.753370][ T5070] device veth0_vlan entered promiscuous mode [ 185.753972][ T5079] FAULT_INJECTION: forcing a failure. [ 185.753972][ T5079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 185.774763][ T5079] CPU: 1 PID: 5079 Comm: syz.0.1466 Not tainted syzkaller #0 [ 185.782549][ T5079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 185.793172][ T5079] Call Trace: [ 185.796937][ T5079] [ 185.800552][ T5079] __dump_stack+0x21/0x24 [ 185.805265][ T5079] dump_stack_lvl+0xee/0x150 [ 185.810418][ T5079] ? __cfi_dump_stack_lvl+0x8/0x8 [ 185.815680][ T5079] dump_stack+0x15/0x24 [ 185.820791][ T5079] should_fail_ex+0x3d4/0x520 [ 185.826272][ T5079] should_fail+0xb/0x10 [ 185.830653][ T5079] should_fail_usercopy+0x1a/0x20 [ 185.836050][ T5079] _copy_from_user+0x1e/0xc0 [ 185.841194][ T5079] sock_do_ioctl+0x186/0x310 [ 185.845918][ T5079] ? sock_show_fdinfo+0xb0/0xb0 [ 185.850976][ T5079] ? selinux_file_ioctl+0x377/0x480 [ 185.856560][ T5079] sock_ioctl+0x4d8/0x6e0 [ 185.861328][ T5079] ? __cfi_sock_ioctl+0x10/0x10 [ 185.867172][ T5079] ? __fget_files+0x2d5/0x330 [ 185.872662][ T5079] ? security_file_ioctl+0x95/0xc0 [ 185.878606][ T5079] ? __cfi_sock_ioctl+0x10/0x10 [ 185.884294][ T5079] __se_sys_ioctl+0x12f/0x1b0 [ 185.890244][ T5079] __x64_sys_ioctl+0x7b/0x90 [ 185.895465][ T5079] x64_sys_call+0x58b/0x9a0 [ 185.901493][ T5079] do_syscall_64+0x4c/0xa0 [ 185.907145][ T5079] ? clear_bhb_loop+0x30/0x80 [ 185.912811][ T5079] ? clear_bhb_loop+0x30/0x80 [ 185.917533][ T5079] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 185.925324][ T5079] RIP: 0033:0x7f58cf18f749 [ 185.930690][ T5079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.953535][ T5079] RSP: 002b:00007f58d00d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 185.962970][ T5079] RAX: ffffffffffffffda RBX: 00007f58cf3e6090 RCX: 00007f58cf18f749 [ 185.972702][ T5079] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 185.981736][ T5079] RBP: 00007f58d00d0090 R08: 0000000000000000 R09: 0000000000000000 [ 185.990068][ T5079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 186.000061][ T5079] R13: 00007f58cf3e6128 R14: 00007f58cf3e6090 R15: 00007ffc885c7058 [ 186.009580][ T5079] [ 186.064961][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.077877][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.087033][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.671908][ T5120] device pim6reg1 entered promiscuous mode [ 186.728789][ T5123] device macsec0 entered promiscuous mode [ 186.771107][ T5125] FAULT_INJECTION: forcing a failure. [ 186.771107][ T5125] name failslab, interval 1, probability 0, space 0, times 0 [ 186.826002][ T5125] CPU: 1 PID: 5125 Comm: syz.4.1481 Not tainted syzkaller #0 [ 186.833460][ T5125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 186.844028][ T5125] Call Trace: [ 186.847697][ T5125] [ 186.850674][ T5125] __dump_stack+0x21/0x24 [ 186.855048][ T5125] dump_stack_lvl+0xee/0x150 [ 186.859784][ T5125] ? __cfi_dump_stack_lvl+0x8/0x8 [ 186.865493][ T5125] ? avc_has_perm_noaudit+0x2f4/0x460 [ 186.872553][ T5125] dump_stack+0x15/0x24 [ 186.877450][ T5125] should_fail_ex+0x3d4/0x520 [ 186.882173][ T5125] __should_failslab+0xac/0xf0 [ 186.887900][ T5125] ? qdisc_alloc+0x79/0x780 [ 186.893234][ T5125] should_failslab+0x9/0x20 [ 186.898043][ T5125] __kmem_cache_alloc_node+0x3d/0x2c0 [ 186.903923][ T5125] ? qdisc_alloc+0x79/0x780 [ 186.909293][ T5125] __kmalloc_node+0xa1/0x1e0 [ 186.914171][ T5125] qdisc_alloc+0x79/0x780 [ 186.918636][ T5125] ? vlan_device_event+0x49e/0x1ba0 [ 186.924466][ T5125] ? mutex_unlock+0x89/0x220 [ 186.929285][ T5125] ? br_device_event+0x15f/0x770 [ 186.935413][ T5125] qdisc_create_dflt+0x6b/0x3b0 [ 186.940563][ T5125] dev_activate+0x2cf/0x1040 [ 186.945349][ T5125] __dev_open+0x3ce/0x4f0 [ 186.950094][ T5125] ? dev_open+0x230/0x230 [ 186.954558][ T5125] ? _raw_spin_unlock_bh+0x50/0x60 [ 186.959891][ T5125] ? dev_set_rx_mode+0x223/0x2c0 [ 186.964875][ T5125] ? __kasan_check_read+0x11/0x20 [ 186.970986][ T5125] __dev_change_flags+0x21b/0x6b0 [ 186.977455][ T5125] ? __cfi___dev_change_flags+0x10/0x10 [ 186.984696][ T5125] dev_change_flags+0x88/0x1a0 [ 186.990725][ T5125] dev_ifsioc+0x159/0xed0 [ 186.995713][ T5125] ? dev_ioctl+0xd10/0xd10 [ 187.000477][ T5125] ? __kasan_check_write+0x14/0x20 [ 187.005794][ T5125] ? mutex_lock+0x8d/0x1a0 [ 187.010683][ T5125] ? __cfi_mutex_lock+0x10/0x10 [ 187.016212][ T5125] ? dev_get_by_name_rcu+0xe5/0x130 [ 187.021882][ T5125] dev_ioctl+0x556/0xd10 [ 187.026854][ T5125] sock_do_ioctl+0x23f/0x310 [ 187.032370][ T5125] ? sock_show_fdinfo+0xb0/0xb0 [ 187.037451][ T5125] ? selinux_file_ioctl+0x377/0x480 [ 187.044062][ T5125] sock_ioctl+0x4d8/0x6e0 [ 187.048616][ T5125] ? __cfi_sock_ioctl+0x10/0x10 [ 187.053497][ T5125] ? __fget_files+0x2d5/0x330 [ 187.058460][ T5125] ? security_file_ioctl+0x95/0xc0 [ 187.065615][ T5125] ? __cfi_sock_ioctl+0x10/0x10 [ 187.070864][ T5125] __se_sys_ioctl+0x12f/0x1b0 [ 187.077393][ T5125] __x64_sys_ioctl+0x7b/0x90 [ 187.082124][ T5125] x64_sys_call+0x58b/0x9a0 [ 187.087623][ T5125] do_syscall_64+0x4c/0xa0 [ 187.092153][ T5125] ? clear_bhb_loop+0x30/0x80 [ 187.097311][ T5125] ? clear_bhb_loop+0x30/0x80 [ 187.102993][ T5125] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 187.109087][ T5125] RIP: 0033:0x7f1fb178f749 [ 187.114431][ T5125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 187.138232][ T5125] RSP: 002b:00007f1fb260c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 187.150539][ T5125] RAX: ffffffffffffffda RBX: 00007f1fb19e5fa0 RCX: 00007f1fb178f749 [ 187.158849][ T5125] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 187.167297][ T5125] RBP: 00007f1fb260c090 R08: 0000000000000000 R09: 0000000000000000 [ 187.175501][ T5125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 187.184574][ T5125] R13: 00007f1fb19e6038 R14: 00007f1fb19e5fa0 R15: 00007ffef223d178 [ 187.193569][ T5125] [ 187.209357][ T5125] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 187.218400][ T5125] device pim6reg1 entered promiscuous mode [ 187.737760][ T5163] device pim6reg1 entered promiscuous mode [ 188.683106][ T5189] device sit0 entered promiscuous mode [ 190.194003][ T5224] FAULT_INJECTION: forcing a failure. [ 190.194003][ T5224] name failslab, interval 1, probability 0, space 0, times 0 [ 190.225294][ T5224] CPU: 0 PID: 5224 Comm: syz.4.1513 Not tainted syzkaller #0 [ 190.232842][ T5224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 190.243028][ T5224] Call Trace: [ 190.246330][ T5224] [ 190.249276][ T5224] __dump_stack+0x21/0x24 [ 190.253621][ T5224] dump_stack_lvl+0xee/0x150 [ 190.258222][ T5224] ? __cfi_dump_stack_lvl+0x8/0x8 [ 190.263354][ T5224] dump_stack+0x15/0x24 [ 190.267620][ T5224] should_fail_ex+0x3d4/0x520 [ 190.272346][ T5224] __should_failslab+0xac/0xf0 [ 190.277569][ T5224] ? kvmalloc_node+0x294/0x480 [ 190.282380][ T5224] should_failslab+0x9/0x20 [ 190.287098][ T5224] __kmem_cache_alloc_node+0x3d/0x2c0 [ 190.292486][ T5224] ? kasan_save_alloc_info+0x25/0x30 [ 190.298786][ T5224] ? kvmalloc_node+0x294/0x480 [ 190.303687][ T5224] __kmalloc_node+0xa1/0x1e0 [ 190.308315][ T5224] ? dev_activate+0x2cf/0x1040 [ 190.313188][ T5224] ? __dev_change_flags+0x21b/0x6b0 [ 190.318492][ T5224] kvmalloc_node+0x294/0x480 [ 190.323648][ T5224] ? x64_sys_call+0x58b/0x9a0 [ 190.328359][ T5224] ? do_syscall_64+0x4c/0xa0 [ 190.333601][ T5224] ? __cfi_kvmalloc_node+0x10/0x10 [ 190.338750][ T5224] ? __kasan_check_write+0x14/0x20 [ 190.343885][ T5224] ? qdisc_alloc+0x5ae/0x780 [ 190.349467][ T5224] pfifo_fast_init+0x260/0x7a0 [ 190.354884][ T5224] qdisc_create_dflt+0x150/0x3b0 [ 190.360209][ T5224] dev_activate+0x2cf/0x1040 [ 190.364839][ T5224] __dev_open+0x3ce/0x4f0 [ 190.369404][ T5224] ? dev_open+0x230/0x230 [ 190.373931][ T5224] ? _raw_spin_unlock_bh+0x50/0x60 [ 190.379592][ T5224] ? dev_set_rx_mode+0x223/0x2c0 [ 190.384699][ T5224] ? __kasan_check_read+0x11/0x20 [ 190.390283][ T5224] __dev_change_flags+0x21b/0x6b0 [ 190.396228][ T5224] ? __cfi___dev_change_flags+0x10/0x10 [ 190.403028][ T5224] dev_change_flags+0x88/0x1a0 [ 190.408452][ T5224] dev_ifsioc+0x159/0xed0 [ 190.413874][ T5224] ? dev_ioctl+0xd10/0xd10 [ 190.420072][ T5224] ? __mutex_lock_slowpath+0xe/0x10 [ 190.426035][ T5224] ? mutex_lock+0xf8/0x1a0 [ 190.430568][ T5224] ? __cfi_mutex_lock+0x10/0x10 [ 190.435546][ T5224] ? dev_get_by_name_rcu+0xe5/0x130 [ 190.440787][ T5224] dev_ioctl+0x556/0xd10 [ 190.445076][ T5224] sock_do_ioctl+0x23f/0x310 [ 190.449715][ T5224] ? sock_show_fdinfo+0xb0/0xb0 [ 190.455109][ T5224] ? selinux_file_ioctl+0x377/0x480 [ 190.460323][ T5224] sock_ioctl+0x4d8/0x6e0 [ 190.465456][ T5224] ? __cfi_sock_ioctl+0x10/0x10 [ 190.470376][ T5224] ? __fget_files+0x2d5/0x330 [ 190.475875][ T5224] ? security_file_ioctl+0x95/0xc0 [ 190.481197][ T5224] ? __cfi_sock_ioctl+0x10/0x10 [ 190.486816][ T5224] __se_sys_ioctl+0x12f/0x1b0 [ 190.492064][ T5224] __x64_sys_ioctl+0x7b/0x90 [ 190.497307][ T5224] x64_sys_call+0x58b/0x9a0 [ 190.501852][ T5224] do_syscall_64+0x4c/0xa0 [ 190.506404][ T5224] ? clear_bhb_loop+0x30/0x80 [ 190.511193][ T5224] ? clear_bhb_loop+0x30/0x80 [ 190.516059][ T5224] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 190.522252][ T5224] RIP: 0033:0x7f1fb178f749 [ 190.526897][ T5224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.547101][ T5224] RSP: 002b:00007f1fb260c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 190.555646][ T5224] RAX: ffffffffffffffda RBX: 00007f1fb19e5fa0 RCX: 00007f1fb178f749 [ 190.563727][ T5224] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 190.572405][ T5224] RBP: 00007f1fb260c090 R08: 0000000000000000 R09: 0000000000000000 [ 190.580662][ T5224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 190.589018][ T5224] R13: 00007f1fb19e6038 R14: 00007f1fb19e5fa0 R15: 00007ffef223d178 [ 190.597028][ T5224] [ 190.607502][ T5224] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 190.615736][ T5224] device pim6reg1 entered promiscuous mode [ 190.988442][ T5243] device bridge_slave_1 left promiscuous mode [ 191.005162][ T5243] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.031778][ T5243] device bridge_slave_0 left promiscuous mode [ 191.039844][ T5243] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.157326][ T5237] device pim6reg1 entered promiscuous mode [ 191.691437][ T5265] FAULT_INJECTION: forcing a failure. [ 191.691437][ T5265] name failslab, interval 1, probability 0, space 0, times 0 [ 191.705500][ T5265] CPU: 0 PID: 5265 Comm: syz.4.1526 Not tainted syzkaller #0 [ 191.712927][ T5265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 191.723449][ T5265] Call Trace: [ 191.726752][ T5265] [ 191.729751][ T5265] __dump_stack+0x21/0x24 [ 191.734105][ T5265] dump_stack_lvl+0xee/0x150 [ 191.739164][ T5265] ? __cfi_dump_stack_lvl+0x8/0x8 [ 191.744225][ T5265] dump_stack+0x15/0x24 [ 191.748496][ T5265] should_fail_ex+0x3d4/0x520 [ 191.753410][ T5265] __should_failslab+0xac/0xf0 [ 191.758370][ T5265] ? kvmalloc_node+0x294/0x480 [ 191.763245][ T5265] should_failslab+0x9/0x20 [ 191.767764][ T5265] __kmem_cache_alloc_node+0x3d/0x2c0 [ 191.773239][ T5265] ? kvmalloc_node+0x294/0x480 [ 191.778136][ T5265] __kmalloc_node+0xa1/0x1e0 [ 191.783759][ T5265] ? dev_activate+0x2cf/0x1040 [ 191.788731][ T5265] ? __dev_change_flags+0x21b/0x6b0 [ 191.793952][ T5265] kvmalloc_node+0x294/0x480 [ 191.798604][ T5265] ? x64_sys_call+0x58b/0x9a0 [ 191.803310][ T5265] ? do_syscall_64+0x4c/0xa0 [ 191.807960][ T5265] ? __cfi_kvmalloc_node+0x10/0x10 [ 191.813101][ T5265] ? __kasan_check_write+0x14/0x20 [ 191.818309][ T5265] ? qdisc_alloc+0x5ae/0x780 [ 191.822924][ T5265] pfifo_fast_init+0x3af/0x7a0 [ 191.827754][ T5265] qdisc_create_dflt+0x150/0x3b0 [ 191.832726][ T5265] dev_activate+0x2cf/0x1040 [ 191.837382][ T5265] __dev_open+0x3ce/0x4f0 [ 191.841852][ T5265] ? dev_open+0x230/0x230 [ 191.847103][ T5265] ? _raw_spin_unlock_bh+0x50/0x60 [ 191.852337][ T5265] ? dev_set_rx_mode+0x223/0x2c0 [ 191.857396][ T5265] ? __kasan_check_read+0x11/0x20 [ 191.862534][ T5265] __dev_change_flags+0x21b/0x6b0 [ 191.867676][ T5265] ? __cfi___dev_change_flags+0x10/0x10 [ 191.873287][ T5265] dev_change_flags+0x88/0x1a0 [ 191.878173][ T5265] dev_ifsioc+0x159/0xed0 [ 191.882521][ T5265] ? dev_ioctl+0xd10/0xd10 [ 191.887001][ T5265] ? __mutex_lock_slowpath+0xe/0x10 [ 191.892402][ T5265] ? mutex_lock+0xf8/0x1a0 [ 191.896919][ T5265] ? __cfi_mutex_lock+0x10/0x10 [ 191.901802][ T5265] ? dev_get_by_name_rcu+0xe5/0x130 [ 191.907015][ T5265] dev_ioctl+0x556/0xd10 [ 191.911419][ T5265] sock_do_ioctl+0x23f/0x310 [ 191.916303][ T5265] ? sock_show_fdinfo+0xb0/0xb0 [ 191.921384][ T5265] ? selinux_file_ioctl+0x377/0x480 [ 191.926779][ T5265] sock_ioctl+0x4d8/0x6e0 [ 191.931127][ T5265] ? __cfi_sock_ioctl+0x10/0x10 [ 191.936190][ T5265] ? __fget_files+0x2d5/0x330 [ 191.940877][ T5265] ? security_file_ioctl+0x95/0xc0 [ 191.946019][ T5265] ? __cfi_sock_ioctl+0x10/0x10 [ 191.951024][ T5265] __se_sys_ioctl+0x12f/0x1b0 [ 191.956339][ T5265] __x64_sys_ioctl+0x7b/0x90 [ 191.961029][ T5265] x64_sys_call+0x58b/0x9a0 [ 191.965543][ T5265] do_syscall_64+0x4c/0xa0 [ 191.969967][ T5265] ? clear_bhb_loop+0x30/0x80 [ 191.974658][ T5265] ? clear_bhb_loop+0x30/0x80 [ 191.979362][ T5265] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 191.985288][ T5265] RIP: 0033:0x7f1fb178f749 [ 191.989950][ T5265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 192.010792][ T5265] RSP: 002b:00007f1fb260c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 192.019673][ T5265] RAX: ffffffffffffffda RBX: 00007f1fb19e5fa0 RCX: 00007f1fb178f749 [ 192.028184][ T5265] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 192.036454][ T5265] RBP: 00007f1fb260c090 R08: 0000000000000000 R09: 0000000000000000 [ 192.044718][ T5265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 192.052888][ T5265] R13: 00007f1fb19e6038 R14: 00007f1fb19e5fa0 R15: 00007ffef223d178 [ 192.061098][ T5265] [ 192.064635][ T5265] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 192.072878][ T5265] device pim6reg1 entered promiscuous mode [ 193.549163][ T5313] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.557396][ T5313] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.747862][ T5373] device pim6reg1 entered promiscuous mode [ 195.525809][ T5383] device sit0 left promiscuous mode [ 196.310961][ T5418] device pim6reg1 entered promiscuous mode [ 197.055026][ T5381] syz.2.1563 (5381) used greatest stack depth: 20080 bytes left [ 197.077039][ T28] audit: type=1400 audit(1765631389.919:147): avc: denied { create } for pid=5424 comm="syz.4.1575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 197.108299][ T5425] device sit0 entered promiscuous mode [ 197.941435][ T28] audit: type=1400 audit(1765631390.779:148): avc: denied { create } for pid=5478 comm="syz.4.1590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 197.974855][ T28] audit: type=1400 audit(1765631390.779:149): avc: denied { create } for pid=5474 comm="syz.2.1589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 198.224705][ T28] audit: type=1400 audit(1765631391.059:150): avc: denied { create } for pid=5485 comm="syz.0.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 198.261996][ T5489] device sit0 left promiscuous mode [ 198.295870][ T5490] device sit0 entered promiscuous mode [ 200.336905][ T5573] FAULT_INJECTION: forcing a failure. [ 200.336905][ T5573] name failslab, interval 1, probability 0, space 0, times 0 [ 200.445606][ T5573] CPU: 0 PID: 5573 Comm: syz.5.1618 Not tainted syzkaller #0 [ 200.453795][ T5573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 200.464144][ T5573] Call Trace: [ 200.467450][ T5573] [ 200.470582][ T5573] __dump_stack+0x21/0x24 [ 200.474951][ T5573] dump_stack_lvl+0xee/0x150 [ 200.479587][ T5573] ? __cfi_dump_stack_lvl+0x8/0x8 [ 200.484787][ T5573] ? unwind_get_return_address+0x4d/0x90 [ 200.491696][ T5573] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 200.499124][ T5573] dump_stack+0x15/0x24 [ 200.503504][ T5573] should_fail_ex+0x3d4/0x520 [ 200.508956][ T5573] __should_failslab+0xac/0xf0 [ 200.514920][ T5573] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 200.522032][ T5573] should_failslab+0x9/0x20 [ 200.527185][ T5573] __kmem_cache_alloc_node+0x3d/0x2c0 [ 200.532785][ T5573] ? __cfi_mutex_lock+0x10/0x10 [ 200.537859][ T5573] ? delete_node+0x2f4/0xa60 [ 200.543464][ T5573] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 200.549726][ T5573] __kmalloc+0xa1/0x1e0 [ 200.554730][ T5573] ? __cfi___bpf_trace_hrtimer_init+0x10/0x10 [ 200.561073][ T5573] tracepoint_probe_unregister+0x1e6/0x8b0 [ 200.566939][ T5573] bpf_probe_unregister+0x61/0x70 [ 200.572017][ T5573] bpf_raw_tp_link_release+0x63/0x90 [ 200.577433][ T5573] bpf_link_free+0x13a/0x390 [ 200.582413][ T5573] ? bpf_link_put_deferred+0x20/0x20 [ 200.588363][ T5573] bpf_link_release+0x15f/0x170 [ 200.593278][ T5573] ? __cfi_bpf_link_release+0x10/0x10 [ 200.599000][ T5573] __fput+0x1fc/0x8f0 [ 200.603108][ T5573] ____fput+0x15/0x20 [ 200.607564][ T5573] task_work_run+0x1db/0x240 [ 200.612205][ T5573] ? __cfi_task_work_run+0x10/0x10 [ 200.617370][ T5573] ? fput+0x15b/0x1a0 [ 200.621396][ T5573] exit_to_user_mode_loop+0x9b/0xb0 [ 200.627409][ T5573] exit_to_user_mode_prepare+0x87/0xd0 [ 200.633041][ T5573] syscall_exit_to_user_mode+0x1a/0x30 [ 200.646447][ T5573] do_syscall_64+0x58/0xa0 [ 200.650931][ T5573] ? clear_bhb_loop+0x30/0x80 [ 200.656249][ T5573] ? clear_bhb_loop+0x30/0x80 [ 200.661034][ T5573] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 200.667079][ T5573] RIP: 0033:0x7f8fe458f749 [ 200.673096][ T5573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 200.693165][ T5573] RSP: 002b:00007f8fe54c3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 200.702409][ T5573] RAX: 0000000000000000 RBX: 00007f8fe47e5fa0 RCX: 00007f8fe458f749 [ 200.710821][ T5573] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 200.718833][ T5573] RBP: 00007f8fe54c3090 R08: 0000000000000000 R09: 0000000000000000 [ 200.727641][ T5573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 200.735656][ T5573] R13: 00007f8fe47e6038 R14: 00007f8fe47e5fa0 R15: 00007ffff38adba8 [ 200.744694][ T5573] [ 200.750712][ T5577] CFI failure at __traceiter_hrtimer_init+0x82/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0x98398cdb) [ 200.756300][ T283] CFI failure at __traceiter_hrtimer_init+0x82/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0x98398cdb) [ 200.763318][ T5577] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 200.781317][ T5577] CPU: 0 PID: 5577 Comm: syz.1.1620 Not tainted syzkaller #0 [ 200.789574][ T5577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 200.800077][ T5577] RIP: 0010:__traceiter_hrtimer_init+0x82/0xd0 [ 200.806426][ T5577] Code: 89 f8 48 c1 e8 03 80 3c 18 00 74 05 e8 27 65 53 00 49 8b 7d 08 4c 89 fe 8b 55 d4 8b 4d d0 41 ba 25 73 c6 67 45 03 56 fc 74 02 <0f> 0b 41 ff d6 49 83 c4 18 4c 89 e0 48 c1 e8 03 80 3c 18 00 74 08 [ 200.827678][ T5577] RSP: 0018:ffffc90005197c38 EFLAGS: 00010213 [ 200.833849][ T5577] RAX: 1ffff11022f7a223 RBX: dffffc0000000000 RCX: 0000000000000001 [ 200.842361][ T5577] RDX: 0000000000000000 RSI: ffffc90005197d00 RDI: ffffc900007cd000 [ 200.850520][ T5577] RBP: ffffc90005197c68 R08: dffffc0000000000 R09: fffffbfff0ee4f16 [ 200.859461][ T5577] R10: 000000000d06da31 R11: 1ffffffff0ee4f15 R12: ffff888117bd1110 [ 200.868237][ T5577] R13: ffff888117bd1110 R14: ffffffff81714610 R15: ffffc90005197d00 [ 200.876429][ T5577] FS: 0000555560930500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 200.886347][ T5577] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.893174][ T5577] CR2: 0000000000000000 CR3: 0000000121e1e000 CR4: 00000000003506b0 [ 200.901502][ T5577] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.910473][ T5577] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 200.918638][ T5577] Call Trace: [ 200.921933][ T5577] [ 200.925070][ T5577] hrtimer_init_sleeper+0x320/0x370 [ 200.931454][ T5577] hrtimer_nanosleep+0xa8/0x310 [ 200.936591][ T5577] ? __cfi_hrtimer_nanosleep+0x10/0x10 [ 200.942531][ T5577] ? get_timespec64+0x10e/0x1a0 [ 200.947782][ T5577] ? __cfi_get_timespec64+0x10/0x10 [ 200.953801][ T5577] common_nsleep+0x8f/0xb0 [ 200.958512][ T5577] __se_sys_clock_nanosleep+0x2f7/0x380 [ 200.964223][ T5577] ? __x64_sys_clock_nanosleep+0xb0/0xb0 [ 200.969878][ T5577] ? fpregs_restore_userregs+0x128/0x260 [ 200.976075][ T5577] __x64_sys_clock_nanosleep+0x9b/0xb0 [ 200.981774][ T5577] x64_sys_call+0x186/0x9a0 [ 200.986751][ T5577] do_syscall_64+0x4c/0xa0 [ 200.991449][ T5577] ? clear_bhb_loop+0x30/0x80 [ 200.996300][ T5577] ? clear_bhb_loop+0x30/0x80 [ 201.001390][ T5577] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 201.007670][ T5577] RIP: 0033:0x7f6c161c2005 [ 201.012273][ T5577] Code: 24 0c 89 3c 24 48 89 4c 24 18 e8 f6 54 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 8b 74 24 0c 8b 3c 24 b8 e6 00 00 00 0f 05 <44> 89 c7 48 89 04 24 e8 4f 55 ff ff 48 8b 04 24 48 83 c4 28 f7 d8 [ 201.034569][ T5577] RSP: 002b:00007ffed41ddfb0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 [ 201.043530][ T5577] RAX: ffffffffffffffda RBX: 00007f6c163e5fa0 RCX: 00007f6c161c2005 [ 201.053615][ T5577] RDX: 00007ffed41ddff0 RSI: 0000000000000000 RDI: 0000000000000000 [ 201.062671][ T5577] RBP: 00007f6c163e7da0 R08: 0000000000000000 R09: 0029ed0d423bb566 [ 201.072335][ T5577] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000000311cf [ 201.080767][ T5577] R13: 00007f6c163e6270 R14: ffffffffffffffff R15: 00007ffed41de130 [ 201.089646][ T5577] [ 201.092881][ T5577] Modules linked in: [ 201.097633][ T283] invalid opcode: 0000 [#2] PREEMPT SMP KASAN [ 201.098270][ T5577] ---[ end trace 0000000000000000 ]--- [ 201.103728][ T283] CPU: 1 PID: 283 Comm: syz-executor Tainted: G D syzkaller #0 [ 201.110059][ T5577] RIP: 0010:__traceiter_hrtimer_init+0x82/0xd0 [ 201.118570][ T283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 201.118583][ T283] RIP: 0010:__traceiter_hrtimer_init+0x82/0xd0 [ 201.118606][ T283] Code: 89 f8 48 c1 e8 03 80 3c 18 00 74 05 e8 27 65 53 00 49 8b 7d 08 4c 89 fe 8b 55 d4 8b 4d d0 41 ba 25 73 c6 67 45 03 56 fc 74 02 <0f> 0b 41 ff d6 49 83 c4 18 4c 89 e0 48 c1 e8 03 80 3c 18 00 74 08 [ 201.118624][ T283] RSP: 0018:ffffc9000c69fc38 EFLAGS: 00010213 [ 201.124785][ T5577] Code: 89 f8 48 c1 e8 03 80 3c 18 00 74 05 e8 27 65 53 00 49 8b 7d 08 4c 89 fe 8b 55 d4 8b 4d d0 41 ba 25 73 c6 67 45 03 56 fc 74 02 <0f> 0b 41 ff d6 49 83 c4 18 4c 89 e0 48 c1 e8 03 80 3c 18 00 74 08 [ 201.135790][ T283] [ 201.135802][ T283] RAX: 1ffff11022f7a223 RBX: dffffc0000000000 RCX: 0000000000000001 [ 201.135822][ T283] RDX: 0000000000000000 RSI: ffffc9000c69fd00 RDI: ffffc900007cd000 [ 201.135836][ T283] RBP: ffffc9000c69fc68 R08: dffffc0000000000 R09: fffffbfff0ee4f16 [ 201.135850][ T283] R10: 000000000d06da31 R11: 1ffffffff0ee4f15 R12: ffff888117bd1110 [ 201.135864][ T283] R13: ffff888117bd1110 R14: ffffffff81714610 R15: ffffc9000c69fd00 [ 201.142230][ T5577] RSP: 0018:ffffc90005197c38 EFLAGS: 00010213 [ 201.162798][ T283] FS: 0000555573f06500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 201.162829][ T283] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 201.162843][ T283] CR2: 0000001b2e520ff8 CR3: 000000012e188000 CR4: 00000000003506a0 [ 201.162861][ T283] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 201.169398][ T5577] [ 201.190838][ T283] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 201.190862][ T283] Call Trace: [ 201.190869][ T283] [ 201.190880][ T283] hrtimer_init_sleeper+0x320/0x370 [ 201.193226][ T5577] RAX: 1ffff11022f7a223 RBX: dffffc0000000000 RCX: 0000000000000001 [ 201.201642][ T283] hrtimer_nanosleep+0xa8/0x310 [ 201.201685][ T283] ? __cfi_hrtimer_nanosleep+0x10/0x10 [ 201.201718][ T283] ? get_timespec64+0x10e/0x1a0 [ 201.210093][ T5577] RDX: 0000000000000000 RSI: ffffc90005197d00 RDI: ffffc900007cd000 [ 201.218390][ T283] ? __cfi_get_timespec64+0x10/0x10 [ 201.228892][ T5577] RBP: ffffc90005197c68 R08: dffffc0000000000 R09: fffffbfff0ee4f16 [ 201.238131][ T283] common_nsleep+0x8f/0xb0 [ 201.238166][ T283] __se_sys_clock_nanosleep+0x2f7/0x380 [ 201.244343][ T5577] R10: 000000000d06da31 R11: 1ffffffff0ee4f15 R12: ffff888117bd1110 [ 201.253275][ T283] ? __x64_sys_clock_nanosleep+0xb0/0xb0 [ 201.253304][ T283] __x64_sys_clock_nanosleep+0x9b/0xb0 [ 201.260031][ T5577] R13: ffff888117bd1110 R14: ffffffff81714610 R15: ffffc90005197d00 [ 201.268043][ T283] x64_sys_call+0x186/0x9a0 [ 201.268071][ T283] do_syscall_64+0x4c/0xa0 [ 201.276049][ T5577] FS: 0000555560930500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 201.278352][ T283] ? clear_bhb_loop+0x30/0x80 [ 201.286345][ T5577] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 201.289686][ T283] ? clear_bhb_loop+0x30/0x80 [ 201.292619][ T5577] CR2: 0000000000000000 CR3: 0000000121e1e000 CR4: 00000000003506b0 [ 201.297899][ T283] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 201.297932][ T283] RIP: 0033:0x7f6589fc1fc3 [ 201.306063][ T5577] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 201.311313][ T283] Code: 1f 84 00 00 00 00 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 80 3d 9e 95 1f 00 00 74 14 b8 e6 00 00 00 0f 05 d8 c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec 28 48 89 54 24 10 [ 201.317017][ T5577] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 201.322351][ T283] RSP: 002b:00007ffcd9e1c7b8 EFLAGS: 00000202 [ 201.330387][ T5577] Kernel panic - not syncing: Fatal exception [ 201.335669][ T283] ORIG_RAX: 00000000000000e6 [ 201.335682][ T283] RAX: ffffffffffffffda RBX: 00000000000003e6 RCX: 00007f6589fc1fc3 [ 201.335697][ T283] RDX: 00007ffcd9e1c7d0 RSI: 0000000000000000 RDI: 0000000000000000 [ 201.335710][ T283] RBP: 00007ffcd9e1c83c R08: 00000000000000c8 R09: 0000000000000000 [ 201.335723][ T283] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000001388 [ 201.335735][ T283] R13: 00000000000927c0 R14: 0000000000030f73 R15: 00007ffcd9e1c890 [ 201.335758][ T283] [ 201.335764][ T283] Modules linked in: [ 201.344341][ T5577] Kernel Offset: disabled [ 201.553241][ T5577] Rebooting in 86400 seconds..